179D & Passive House: Why High-Performance Design Matters
For years, the Section 179D energy efficient commercial building deduction has been a cornerstone...

Cybersecurity companies developing cryptography technologies can unlock significant tax savings through federal R&D credits. The key is understanding which cryptographic activities qualify and how to properly document them.
To claim R&D credits, your cryptographic work must meet four criteria:
Cryptographic development naturally fits these requirements due to its experimental nature and technical complexity.
Post-Quantum Cryptography represents prime R&D territory. Developing quantum-resistant algorithms involves substantial uncertainty about mathematical approaches, security guarantees, and practical implementation. Activities include designing new encryption schemes, optimizing algorithm parameters, and testing against various attack scenarios.
Advanced Encryption Techniques like homomorphic encryption (computing on encrypted data) and zero-knowledge proofs also qualify. These involve resolving uncertainty about efficiency, security trade-offs, and real-world applicability.
Custom Protocol Development for specific use cases typically qualifies when it addresses uncertainty about security requirements, performance constraints, or interoperability challenges.
Cryptographic Chip Development often qualifies due to the complexity of optimizing for speed, security, and power consumption simultaneously. Key areas include side-channel attack resistance, tamper-proof design, and meeting certification standards.
Hardware Security Modules (HSMs) development qualifies when creating new approaches to key management, secure storage, or cost-effective security solutions.
Even with established algorithms, significant R&D opportunities exist. For example:
Constant-Time Implementations that prevent timing attacks involve uncertainty about achieving both security and performance goals.
Multi-Party Computation Optimization addresses uncertainty in reducing communication overhead and achieving practical performance.
Distributed Cryptography implementations face uncertainty in coordinating multiple parties while maintaining security.
Success requires proper documentation that demonstrates the four-part test:
Cryptography continues evolving rapidly, creating ongoing R&D opportunities in quantum cryptography, blockchain security, privacy-preserving technologies, and next-generation authentication systems.
Companies should recognize that cryptographic development inherently involves the technological uncertainty and systematic experimentation the IRS requires.
With proper documentation showing how activities meet the four-part test, cybersecurity companies can significantly reduce tax burden while advancing critical security capabilities.
At Leyton US, we can help you build a strong case using your existing documentation, helping you unlock that money with minimal overhead.
Reach out to one of our experts to claim R&D tax credits for your cryptography development project!
Explore our latest insights
See more arrow_forward
For years, the Section 179D energy efficient commercial building deduction has been a cornerstone...

Many American businesses are paying more in customs duties than they should. Changing tariffs, co...

Section 179D deduction represents one of the final remaining high-impact incentives before the OB...

Drop shipments are increasingly common in ecommerce and modern supply chains. In a typical drop s...