Key Takeaways from the Latest NIST Guidance on Transitioning to Post-Quantum Cryptography

NIST recently released an Initial Public Draft (IPD) report on transitioning from traditional public-key cryptographic algorithms to standardized post-quantum cryptography (PQC). This report details NIST’s roadmap for the PQC adoption, including timelines for deprecating and disallowing a broad set of currently-used algorithms and key considerations for migration. The report aims to guide federal agencies, technology providers, industries, and standards organizations in planning and managing the migration of their products, services, and infrastructure to PQC.

Here are the key takeaways from the report that you need to know:

  • The Purpose of PQC

For decades, encryption algorithms like RSA, DSA, ECDSA, and ECDH have been the backbone of enterprise encryption and security, keeping sensitive information safe from prying eyes. However, a sufficiently large-scale quantum computer, such as a cryptographically relevant quantum computer (CRQC), can break these problems effortlessly in minimal time, exposing all sensitive data and communications. Countering this future quantum capability requires new cryptographic methods that can protect communications and data from both current conventional computers and the quantum computers of tomorrow. This is why transitioning to post-quantum cryptography (PQC) is so critical. The new NIST PQC standards include encryption algorithms designed to protect against attacks from both classical and quantum computers. Implementing quantum-safe certificates with the NIST-approved PQC standards will ensure your critical information systems are protected from both current and future threats.

  • The complexity of PQC adoption

Cryptographic transitions aren’t new—we’ve done it before, whether it was replacing SHA-1 to SHA-2 or TLS 1.2 to TLS 1.3. But, transitioning to post-quantum cryptography (PQC) is a whole new ballgame. The scale of this shift is massive. NIST makes it clear that it’s not just about rolling out new PQC algorithms. It’s also about carefully moving away from the vulnerable algorithms embedded deeply in today’s systems—without causing chaos. This means deprecating legacy algorithms, controlling their usage, and eventually phasing them out.

Starting preparations now is essential. Early action can help reduce disruptions to critical systems and ensure a smoother transition when a CRQC becomes a reality.

  • 2030 is the deadline for the deprecation of legacy encryption algorithms

The clock is ticking on widely-used digital signature and general encryption algorithms like RSA, ECDSA, EdDSA, DH, and ECDH. NIST has set an official timeline for phasing out these quantum-vulnerable methods. By 2030, these algorithms will be deprecated, and by 2035, they’ll be entirely disallowed. This means that organizations will need to switch over to quantum-safe certificates that use the new NIST-approved PQC standards for general encryption (ML-KEM) and digital signatures (ML-DSA and SLH-DSA). Certificates that use legacy encryption algorithms will no longer be trusted.

  • What it takes to transition to Post-Quantum Cryptography

Now that the first set of post-quantum cryptography (PQC) encryption algorithms have been standardized, the heavy lifting begins behind the scenes. A significant amount of backend preparation is required to set the stage for migration.

Many applications rely on standardized network protocols and security technologies, which will need significant updates to support PQC. Beneath these applications are software cryptographic libraries that implement or interface with cryptographic algorithms. These libraries must also be updated to accommodate PQC alongside the hardware cryptographic modules on which they are built.

Applications also depend on infrastructure components like Public Key Infrastructure (PKI), which involves managing digital certificates and keys. These foundational systems must be updated to pave the way for applications to adopt PQC.

In short, the shift to PQC isn’t just a single step—it’s a coordinated effort and phased evolution across applications, libraries, hardware, and infrastructure. Everyone must work together to ensure a smooth, secure transition.

  • Migration consideration – why start preparing now?

You might think, “Quantum computers aren’t here yet—what’s the rush?” While it’s true that a CRQC doesn’t exist today, the migration to post-quantum cryptography (PQC) is still urgent. Here are the two reasons as NIST explains:

    • If history is any guide, past cryptographic migrations like SHA-1 have taken over a decade, and the transition to PQC is even more complex. Starting early is essential to managing the complexity and avoiding operational chaos when CRQCs arrive.
    • Cybercriminals aren’t waiting for quantum computers—they’re already stealing encrypted data today with the intent of decrypting it once quantum computers are operational. This threat, referred to as the “harvest-now, decrypt-later” (HNDL) scheme, is real and serious. Sensitive information like government secrets, financial transactions, and medical records is at risk. If it’s not secured with PQC certificates now, it could be compromised in the future.

AppViewX can help you implement crypto-agility and start preparing today for Post-Quantum Cryptography

  • Key Use Cases for PQC Adoption

The need for quantum-safe cryptography spans multiple domains within an organization:

    • Code Signing: The devices that install and execute the code may need to be redesigned to use quantum-resistant signatures on the executables if they remain in use once quantum computers are functional.
    • User and Machine Authentication: Authenticating systems on both ends and their supporting infrastructure, such as PKI, will need upgrades. Additionally, hardware cryptographic tokens compatible with quantum-resistant algorithms may need to be procured.
    • Network Security Protocols: Modern network security protocols, like TLS and VPNs, use short-term keys for key establishment and long-term keys for authentication, ensuring past communications remain secure even if long-term keys are compromised. To counter “harvest now, decrypt later” threats, transitioning key-establishment algorithms to quantum-resistant methods should take priority, while authentication algorithm transitions can follow later.
    • Email and Document Signing and Encryption: Email and document signing use digital signatures to confirm authenticity and protect the integrity of electronic communications and documents. Standards like S/MIME ensure end-to-end encryption and authentication, safeguarding content from tampering and unauthorized access. However, like other encryption-based applications, they face the “harvest now, decrypt later” risk. These will need to be updated to PQC.
  • The choice of hybrid solutions

As the transition to post-quantum cryptography (PQC) is more of a phased evolution, one of the early steps in the journey may involve hybrid solutions. These solutions combine both quantum-resistant and quantum-vulnerable algorithms for tasks like key establishment or digital signatures.

Hybrid solutions offer an added layer of security during the transition. As long as at least one algorithm in the hybrid remains secure, the overall solution holds strong. This approach also allows for smoother interoperability, as quantum-resistant and quantum-vulnerable algorithms will likely coexist across applications and systems for years during the migration.

That said, hybrid solutions come with trade-offs: they can increase costs, impact performance, and introduce engineering complexities. NIST recognizes these challenges and leaves it up to each application to decide whether the added effort of implementing hybrid modes, including robust and independent security reviews, is worth it.

In short, hybrid protocols offer a practical bridge to a quantum-secure future—if you’re ready to balance the complexities involved.

Accelerate Your PQC-Readiness Journey with AppViewX

AppViewX is ready to help you prepare for the transition and ensure your security is quantum-safe. To ensure successful PQC implementation in the future, AppViewX offers:

  • AppViewX PQC Test Center: A dedicated free online resource built to help organizations assess their PQC readiness by generating and testing quantum-safe certificates prior to their integration into existing systems, workloads, and machines. You can quickly set up your own quantum-safe PKI hierarchy and generate PQC-ready certificates and keys to test their compatibility in your environment. Visit the AppViewX PQC Test Center and begin your PQC journey today.
  • PQC Certificate Lifecycle Management: The AppViewX AVX ONE platform offers a comprehensive certificate lifecycle management solution to help enable PQC readiness and crypto-agility with complete certificate discovery and inventory, full certificate lifecycle automation, and total certificate control across the enterprise.

If you have more questions, contact us today to talk to one of our PQC experts.

Tags

  • certificate lifecycle management
  • code signing
  • DSA
  • ECDH
  • ECDSA
  • NIST
  • PQC
  • PQC-ready certificates
  • RSA

About the Author

Related Articles

AppViewX AVX ONE PQC Assessment Tool – Kickstart Your PQC Readiness Journey with Complete Cryptographic Visibility

| 5 Min Read

Why the Finance Sector Must Lead the Shift to Post-Quantum Cryptography

| 8 Min Read

So Many Reasons to Check Out AppViewX at the 2025 RSA Conference

| 5 Min Read