Back to articles
Compliance 2 min read

Post-quantum cryptography: NIST timeline and migration plan

Post-quantum cryptography: time to prepare

Quantum computers capable of breaking RSA and ECC don’t exist yet, but the threat is real today. The “harvest now, decrypt later” strategy involves exfiltrating encrypted data now to decrypt it in a decade when quantum capabilities mature.

Finalized NIST standards

On August 14, 2024, NIST published the first post-quantum cryptography standards:

StandardIDPurposeReplaces
ML-KEMFIPS 203Key encapsulationRSA, ECDH
ML-DSAFIPS 204Digital signatureRSA, ECDSA
SLH-DSAFIPS 205Hash-based signatureML-DSA alternative

Key deadlines

DateMilestone
Aug 2024FIPS 203, 204, 205 published
Dec 2025CISA/NSA publish quantum-safe product categories
Jan 2027US NSS acquisitions must be CNSA 2.0 compliant
Jan 2030Mandatory TLS 1.3 adoption
2033Full NSS compliance
2035Broad PQC adoption target

Why act now

Data exfiltrated today (trade secrets, medical records, diplomatic communications) can be decrypted in 10-15 years. If your data has a lifespan exceeding 10 years, it is already at risk. Migration challenges include larger key sizes, higher computational costs, and protocol compatibility issues that will take years to resolve.

5-step migration plan

  1. Cryptographic inventory: identify all systems using RSA, ECC, DH, or DSA. Map protocols (TLS, SSH, IPsec, S/MIME).
  2. Risk assessment: which data has a lifespan over 10 years? Which systems are exposed to exfiltration?
  3. Hybrid strategy: deploy hybrid solutions (classical + PQC) for progressive transition, starting with the most exposed systems.
  4. Testing: validate PQC algorithm performance in your environment and compatibility with partners.
  5. Progressive deployment: migrate by priority (most sensitive data first), plan certificate renewal with PQC algorithms.

These are affiliate links. If you make a purchase through these links, we may earn a commission at no extra cost to you.

Sources

Advertisement

Related Articles