2030
Gartner's projected date by which quantum computing will render current asymmetric cryptography unsafe for sensitive data protection
Jan 2027
NSS (National Security Systems) compliance deadline for beginning PQC adoption, per CNSA 2.0 guidance
3
NIST-finalized PQC standards as of August 2024: ML-KEM (FIPS 203), ML-DSA (FIPS 204), SLH-DSA (FIPS 205)
10+ years
Timeframe organizations should assume for completing a full cryptographic migration across all systems and dependencies

Post-quantum cryptography (PQC) is not a hypothetical future concern. NIST finalized the first three post-quantum cryptographic standards in August 2024. NSS compliance deadlines begin January 2027. Nation-state adversaries are already executing harvest now, decrypt later attacks, collecting encrypted traffic today to decrypt it once quantum computers reach sufficient scale.

The migration from current asymmetric cryptography (RSA, ECDSA, ECDH) to quantum-resistant algorithms is the largest cryptographic transition since the industry moved from DES to AES. Unlike that transition, which involved a single algorithm replacement in a relatively defined set of cryptographic operations, PQC migration requires inventorying every system, protocol, certificate, key exchange mechanism, and cryptographic library in your environment, then replacing them in a sequenced order that maintains interoperability and avoids service disruption.

This guide is for security architects, cryptographers, and platform engineers who need a concrete framework for building and executing a PQC migration plan before regulatory and threat timelines force an emergency response.

The Three NIST-Finalized PQC Standards You Need to Know

NIST finalized three post-quantum cryptographic standards on August 14, 2024. Understanding their distinct roles is the prerequisite for any migration planning.

ML-KEM (FIPS 203), formerly CRYSTALS-Kyber, is a Key Encapsulation Mechanism. It establishes shared secrets for encrypted communication and is designed to replace RSA and ECDH key exchange in protocols like TLS. ML-KEM is the primary standard for securing data in transit. It operates on lattice-based mathematics (Module Learning With Errors), which is believed to be computationally hard for both classical and quantum computers. ML-KEM is already supported in recent versions of OpenSSL (3.x with liboqs), BoringSSL, and major TLS implementations.

ML-DSA (FIPS 204), formerly CRYSTALS-Dilithium, is a digital signature algorithm. It replaces ECDSA and RSA for signing operations: tokens, certificates, code signing, and authentication artifacts. ML-DSA produces larger signatures than ECDSA (approximately 2.4 KB versus 64 bytes for a 256-bit ECDSA signature), which has bandwidth and storage implications at scale.

SLH-DSA (FIPS 205), formerly SPHINCS+, is a hash-based digital signature algorithm with more conservative security assumptions than ML-DSA. It relies only on the security of its underlying hash function rather than lattice hardness assumptions. SLH-DSA is recommended for high-assurance applications where long-term signature validity matters, such as firmware signing and PKI root certificates, because its security does not depend on the continued hardness of a single mathematical problem.

A fourth standard, FN-DSA (FALCON, FIPS 206), has been finalized and is particularly suited for constrained environments due to its smaller signature size.

Harvest Now, Decrypt Later: Why the Clock Is Already Running

The most urgent argument for beginning PQC migration today is not the threat of a quantum computer breaking your encryption in 2026. It is the threat of adversaries collecting your encrypted traffic right now and storing it for decryption once quantum computing matures.

Harvest now, decrypt later (HNDL) attacks require no quantum capability at collection time. An adversary with access to network traffic intercepts and stores your encrypted TLS sessions, encrypted email, and encrypted file transfers today. When a cryptographically relevant quantum computer (CRQC) becomes available, they decrypt the entire historical collection.

For data with a confidentiality requirement extending beyond 2030 to 2035, the window for protection has already closed if that data is traversing networks today under RSA or ECDH key exchange. This applies acutely to: classified and government data; long-term intellectual property such as drug formulas and chip designs; attorney-client privileged communications; health records subject to decades-long retention requirements; and any data whose exposure would cause lasting harm regardless of when the decryption occurs.

Intelligence community assessments indicate that nation-state actors with advanced capabilities have been running HNDL collection operations for years. NIST's NISTIR 8547 draft guidance acknowledges that migration timelines must account for the time value of the data being protected, not just the timeline for quantum computing maturity.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Building a Cryptographic Inventory

You cannot migrate what you have not inventoried. The NIST NCCoE's PQC migration project identifies cryptographic visibility as the foundational workstream, and in practice it is the most time-consuming phase for enterprise organizations.

A cryptographic inventory must capture: every certificate in use and its signing algorithm; every TLS configuration and the key exchange mechanisms it supports; every application that performs its own cryptographic operations rather than delegating to the OS or a central library; every code signing key and the pipeline that uses it; every SSH key and its algorithm; every encrypted storage volume or database and its encryption configuration; and every third-party dependency that includes cryptographic functionality.

Automatic discovery tools can accelerate this process. Venafi, Keyfactor, and AppViewX offer certificate inventory and lifecycle management with quantum readiness assessment capabilities. For application-level crypto, static analysis tools with cryptographic pattern detection (Cryptosense Analyzer, IBM Guardium Key Lifecycle Manager) can identify hardcoded algorithms and library calls that require remediation.

The output of the inventory phase is a prioritized list of cryptographic assets ranked by: data sensitivity (what does this protect?), exposure (is this on public-facing infrastructure?), migration complexity (is this a standard library or custom implementation?), and compliance deadline (is this in scope for NSS or another regulatory framework?).

Hybrid Deployment: The Transitional Architecture

Hybrid cryptography, running classical and post-quantum algorithms in parallel, is the recommended transitional architecture for all organizations beginning PQC migration. It allows you to gain quantum resistance without sacrificing interoperability with systems that have not yet migrated.

In a hybrid TLS deployment, the key exchange uses both ECDH and ML-KEM simultaneously. A session key is derived from both exchanged secrets, typically using a KDF that combines them. An attacker must break both the classical and the post-quantum algorithm to compromise the session. Classical systems that do not support ML-KEM negotiate using ECDH alone. Systems with PQC support use the hybrid mode.

Major TLS libraries already support hybrid modes. Google Chrome has supported X25519Kyber768Draft00 since late 2023. Cloudflare has enabled hybrid PQC in its TLS termination. AWS, Azure, and Google Cloud have PQC roadmaps for their TLS infrastructure. Open-source implementations via the Open Quantum Safe project (liboqs) enable hybrid deployment in OpenSSL 3.x today.

For certificate migration, the hybrid approach involves issuing dual-algorithm certificates during the transition period, where the certificate itself uses a classical algorithm for compatibility but includes a PQC-signed extension. This requires PKI infrastructure updates but maintains compatibility with existing certificate validation chains.

Migration Sequencing: A Practical Roadmap

Given the scope of a full PQC migration, sequencing matters as much as the technical choices. The recommended sequence prioritizes by data sensitivity and protocol exposure.

Phase 1 (now through 2026): Complete cryptographic inventory. Enable hybrid PQC for public-facing TLS endpoints. Migrate code signing infrastructure to ML-DSA or SLH-DSA. Establish cryptographic agility principles in your development standards so new systems are built to support algorithm replacement without major refactoring. Inventory and flag all data protected by RSA or ECDH with a confidentiality requirement beyond 2030.

Phase 2 (2026 through 2028): Migrate PKI root and intermediate CAs to PQC algorithms. Complete TLS migration for internal services. Replace RSA-encrypted data at rest for highest-sensitivity data categories. Update SSH infrastructure. Address third-party vendor cryptographic dependencies through contract requirements and procurement criteria.

Phase 3 (2028 through 2030): Complete migration of all systems to PQC-only (or hybrid where classical compatibility is required). Retire classical-only key exchange mechanisms. Establish ongoing cryptographic monitoring to detect algorithm deprecations and emerging weaknesses in deployed PQC algorithms.

For federal agencies and NSS operators, Phase 1 is not optional: CNSA 2.0 mandates beginning PQC adoption by January 2027 with full migration for most NSS use cases by 2033.

The bottom line

The case for starting PQC migration now is not the imminence of a quantum computer breaking your encryption today. It is the combination of harvest now, decrypt later attacks already in progress, regulatory deadlines beginning in 2027, and the 10-plus-year timeline required to complete a full enterprise cryptographic migration. Start with inventory, deploy hybrid TLS for public-facing infrastructure, migrate code signing to ML-DSA, and build cryptographic agility into your development standards. Organizations that treat PQC as a 2029 problem will find themselves in an emergency migration under regulatory pressure.

Frequently asked questions

When will quantum computers actually break current encryption?

The most credible projections place cryptographically relevant quantum computers (CRQCs) capable of breaking 2048-bit RSA somewhere between 2030 and 2035, though uncertainty is high. Gartner's 2026 analysis predicts RSA will become unsafe by 2030. NIST's guidance assumes a 10-year migration timeline, which means organizations need to begin now to complete migration before the threat materializes.

What is the difference between ML-KEM, ML-DSA, and SLH-DSA?

ML-KEM (FIPS 203) is for key encapsulation, replacing RSA/ECDH in key exchange protocols like TLS. ML-DSA (FIPS 204) is for digital signatures in general use, replacing ECDSA. SLH-DSA (FIPS 205) is a hash-based signature scheme with more conservative security assumptions, recommended for high-assurance or long-lived signatures like PKI root certificates and firmware signing.

What is cryptographic agility and why does it matter for PQC?

Cryptographic agility means designing systems so that the cryptographic algorithm can be changed without requiring architectural refactoring. It matters for PQC because PQC algorithms are newer than RSA and ECDSA, and it is plausible that weaknesses will be discovered in specific PQC algorithms over time. Systems built with cryptographic agility can swap algorithms without a full redesign. Systems with hardcoded algorithms require major refactoring for each transition.

How does harvest now, decrypt later affect what I should prioritize first?

Prioritize migrating data and communications where the confidentiality requirement extends beyond 2030. If the data you are protecting today would cause harm if exposed in 2032, it needs quantum-resistant protection now because adversaries may already be collecting it. Public-facing TLS for sensitive transactions, encrypted email for high-value communications, and encrypted storage for long-retention sensitive data should be at the top of your migration priority list.

Can I run post-quantum and classical algorithms simultaneously?

Yes. This hybrid approach is the recommended migration path. In TLS, hybrid key exchange runs ECDH and ML-KEM in parallel, deriving a session key from both. An attacker must break both algorithms to compromise the session. Hybrid deployment maintains compatibility with systems that do not yet support PQC while providing quantum resistance for endpoints that do.

What tools can help with cryptographic inventory?

Commercial tools for certificate and cryptographic inventory include Venafi TLS Protect, Keyfactor Command, and AppViewX Cert+. For application-level cryptographic scanning, IBM Guardium Key Lifecycle Manager and Cryptosense Analyzer detect algorithm usage in code and dependencies. The NIST NCCoE has published reference architectures and a community of interest for organizations building inventory programs.

Are there compliance deadlines I need to meet?

Federal agencies and National Security Systems operators face mandatory timelines under CNSA 2.0: begin PQC adoption by January 2027, complete migration for software and firmware signing by 2025 (already past), and complete full NSS migration by 2033. Private sector organizations do not yet face federal mandates for PQC migration, but financial regulators (OCC, FFIEC) and healthcare regulators are expected to incorporate PQC requirements into guidance updates over the next two years.

Sources & references

  1. NIST: Post-Quantum Cryptography Standards
  2. NIST NCCoE: Migration to Post-Quantum Cryptography
  3. NIST NISTIR 8547 (Draft): Transition to PQC Standards
  4. Security Boulevard: PQC Authentication Migration Guide 2026
  5. Gartner: Top Cybersecurity Trends 2026

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.