The National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA) have published comprehensive migration guidance for transitioning to post-quantum cryptography (PQC), establishing concrete timelines and priorities for federal agencies. The guidance addresses the “harvest now, decrypt later” threat posed by future quantum computers.

Why the urgency

Quantum computers capable of breaking current public-key cryptography don’t exist yet—but adversaries are already collecting encrypted data today with the expectation of decrypting it once quantum capability arrives.

ThreatTimeline
Current data collectionOngoing
Quantum decryption capabilityEstimated 10-15 years
Data sensitivity lifespanOften 20+ years
Migration timeline needed10+ years for complex systems

This creates a negative time window: organizations must begin migrating now for data that needs protection beyond the quantum horizon.

Finalized PQC standards

NIST finalized its first three PQC standards in August 2024 after an eight-year evaluation process:

StandardNameTypePrimary Use
FIPS 203ML-KEMKey-Encapsulation MechanismKey exchange, encryption
FIPS 204ML-DSADigital Signature AlgorithmCode signing, certificates, authentication
FIPS 205SLH-DSAHash-Based Digital SignatureBackup signature standard

ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism)

  • Derived from CRYSTALS-Kyber algorithm
  • Primary standard for general encryption
  • Replaces RSA-KEM and ECDH in TLS, VPN, and transport protocols
  • Notable for small encryption keys and fast operation

ML-DSA (Module-Lattice-Based Digital Signature Algorithm)

  • Derived from CRYSTALS-Dilithium algorithm
  • Primary standard for digital signatures
  • Replaces RSA and ECDSA in code signing, certificates, authentication

SLH-DSA (Stateless Hash-Based Digital Signature Algorithm)

  • Based on SPHINCS+ algorithm
  • Conservative backup based on well-understood hash function security
  • Larger signatures but simpler security assumptions

Additional standards in development

AlgorithmDesignationExpectedPurpose
FALCONFN-DSALate 2026Smaller signatures for constrained environments
HQCTBD2027Backup key-encapsulation mechanism

NIST selected HQC (Hamming Quasi-Cyclic) in March 2025 as a backup for ML-KEM, with draft standard expected in early 2026.

CISA directive (January 30, 2026)

CISA released comprehensive guidance pursuant to Executive Order 14306, mandating federal procurement of quantum-resistant technology products.

Key requirements

DeadlineRequirement
December 1, 2025CISA/NSA publish quantum-safe product categories
December 31, 2027Federal agencies complete cryptographic inventory
January 2, 2030TLS 1.3 (or successor) adoption required
December 31, 2035Full PQC migration complete

Migration timeline

NIST SP 1800-38 establishes a phased migration timeline:

Phase 1: Discovery and inventory (Now through 2027)

TaskPriority
Identify all public-key cryptography usageHigh
Catalog libraries, key sizes, algorithm dependenciesHigh
Prioritize by data sensitivityHigh
Assess “harvest now, decrypt later” riskCritical
Submit inventory to CISADeadline: Dec 31, 2027

Phase 2: Planning and testing (2027-2030)

TaskConsideration
Develop system migration roadmapsPer-application planning
Test PQC integrationNon-production environments
Address performance impactsML-KEM keys larger than ECDH
Engage vendorsPQC-ready product timelines

Phase 3: Implementation (2028-2035)

TaskApproach
Deploy to highest-priority systems firstRisk-based prioritization
Implement hybrid key exchangeTransitional measure
Complete full migrationDeadline: Dec 31, 2035

NSA requirements for National Security Systems

The NSA issued complementary guidance through its CNSA 2.0 (Commercial National Security Algorithm Suite 2.0) for national security systems (NSS):

Data ClassificationMigration Deadline
Top Secret2030
Secret2033
All NSSCNSA 2.0 mandatory

CNSA 2.0 timeline

DeadlineRequirement
January 1, 2027All new NSS acquisitions CNSA 2.0 compliant
December 31, 2025Existing NSS meet CNSA 1.0 or request waiver
2033Final mandatory compliance

The NSA guidance explicitly warns against relying on hybrid approaches as a long-term solution—organizations should plan for full PQC deployment.

Hybrid approaches

NIST permits hybrid cryptography during transition:

ApproachStatus
Hybrid key exchange (ML-KEM + X25519)Supported
Hybrid signaturesNot yet supported
FIPS 140-3 validationPermitted if one component NIST-approved

Hybrid approaches provide:

  • Compatibility with systems not yet PQC-ready
  • Downgrade resistance against implementation errors
  • Gradual integration path

However, hybrid adds complexity and should be transitional, not permanent.

Enterprise implications

While timelines are mandatory only for federal agencies, NIST strongly recommends private-sector organizations follow the same phased approach.

TLS and web infrastructure

DevelopmentStatus
Chrome ML-KEM testingHybrid key exchange experiments since 2024
Cloudflare PQC supportActive testing
CA/Browser ForumDeveloping PQC certificate timelines

Certificate authorities

Organizations should monitor CA/Browser Forum developments for:

  • PQC certificate issuance timelines
  • PKI infrastructure impacts
  • Root certificate transitions

Embedded and IoT devices

The greatest migration challenge involves:

  • Long deployment lifetimes (10-20+ years)
  • Limited firmware update capabilities
  • Constrained processing power

Recommendation: Procurement policies should require PQC readiness for all new acquisitions.

Long-term data storage

Organizations storing encrypted data for extended periods face immediate “harvest now, decrypt later” risk:

  • Prioritize encryption-in-transit migration
  • Assess data sensitivity lifespan
  • Consider re-encryption of archived data

Getting started

NIST resources

ResourceURL
PQC Migration Portalpqc.nist.gov
Reference implementationsAvailable on portal
Performance benchmarksAvailable on portal
Interoperability test vectorsAvailable on portal
CBOM templateCryptographic Bill of Materials

Available implementations

LibraryPQC Support
OpenSSL 3.3+NIST standards
BoringSSLNIST standards
Open Quantum Safe (OQS)Comprehensive PQC support
liboqsReference implementation

Recommendations

For federal agencies

PriorityAction
ImmediateBegin cryptographic inventory
2026Engage vendors on PQC roadmaps
2027Submit inventory to CISA
OngoingMonitor NIST guidance updates

For enterprises

PriorityAction
NowInventory cryptographic usage
NowAssess “harvest now, decrypt later” risk
2026-2027Begin testing with available implementations
OngoingFollow federal timelines as best practice

For vendors

PriorityAction
NowIntegrate PQC into product roadmaps
2026Provide customers with migration timelines
2027+Deliver PQC-ready products

Context

The PQC migration represents one of the largest coordinated technology transitions in history—comparable to Y2K in scope but with a longer timeline and more complex technical challenges.

The “harvest now, decrypt later” threat makes this transition time-sensitive despite uncertain quantum timelines. Adversaries collecting encrypted data today will be able to decrypt it whenever quantum capability arrives—whether that’s 10 years or 20 years from now.

Organizations that begin inventory and planning now will have adequate runway for migration. Those that delay may find themselves scrambling as deadlines approach and vendor resources become constrained.

NIST’s message is clear: “[These standards] can and should be put into use now.”