The UK’s National Cyber Security Centre Presents Timeline and Roadmap for PQC Migration

The United Kingdom’s National Cyber Security Centre (NCSC) has just released updated guidance on migrating to post-quantum cryptography (PQC) to help the nation prepare for developing threats posed by advances in quantum computing.

Titled Timelines for Migration to Post-Quantum Cryptography, this guidance is important for two key reasons:

A) It sets a clear roadmap for the complete migration to PQC by 2035

B) It breaks down key stages of the migration process to help organizations plan ahead for the inevitable shift

With quantum advancements making headlines every day, the NCSC’s guidance arrives at a crucial moment, offering a structured plan for organizations to begin their PQC readiness journey and safeguard themselves in the years ahead. Let’s dive into what this means for you. 

“Migration will happen, globally. It will not be possible to avoid PQC migration, so preparing and planning now will mean you can migrate securely and in an orderly fashion.”

– National Cyber Security Centre (NCSC), UK

The Critical Three-Phase Timeline

What’s not to miss in the guidance is the timeline for PQC migration. The NCSC has laid out three key milestones that all organizations should aim to meet:

The Critical Three-Phase PQC Timeline

 

2028 Complete Discovery Kick off the migration process. Begin with a thorough discovery and assessment of your current systems to pinpoint critical assets and map out cryptographic dependencies. Establish clear migration goals and draft an initial plan.
2031 Migrate Critical Systems Move into action. Start migrating the high-priority systems and fine-tune your transition strategy. While the focus should be on protecting critical assets, ensure your infrastructure is ready for full PQC adoption.
2035 Complete Transition Achieve complete migration. By this stage, all systems, services, and products should fully adopt PQC, moving entirely away from traditional public-key cryptographic methods for long-term protection against quantum computing threats.

NCSC cautions that while some technologies may take longer to migrate, staying on track for the 2035 deadline is essential. Proactive planning is key – start securing what matters most, now.

Other Key Highlights From the NCSC Guidance You Shouldn’t Miss

Beyond the migration timeline, the NCSC’s guidance delves into the various stages of the migration process,  right from initial planning to execution, offering valuable insights along the way.

Jump right to the section that you want to learn more about:

1. Why Discovery and Assessment Matter More Than You Think
2. Find Solutions that Enable Crypto-Agility
3. Weigh Your Options for Migrating Your Private PKI to PQC
4. Don’t Overlook Testing and Validation During Migration
5. Banking, Financial Services, and Telecom Must Start Preparing Now
6. Expect Industry Readiness and Vendor Roadmaps in 2025

1. Why Discovery and Assessment Matter More Than You Think

Before diving into migration, NCSC emphasizes understanding your current cryptographic estate by conducting a thorough discovery and assessment of all your cryptographic assets. This means identifying:

  • Which services and applications rely on public-key cryptography
  • What data you hold, how long it needs to be protected, and its value to potential attackers
  • How data is secured, both in transit and at rest

To get a complete picture, NCSC recommends evaluating all kinds of assets relying on cryptography, including internal and external-facing systems and services, products that use cryptography for security, communication, or data processing, software applications, networking and communications hardware, mobile devices, servers, and workstations, IoT and ICS devices, and end-user authentication devices and tokens used for embedded systems.

NCSC also suggests assessing factors such as where (cloud or on-premises) and how systems and services are managed (self-managed or MSP-managed). If using a managed service provider, ensure they conduct cryptographic assessments for the systems they manage for you.

Underscoring the importance of the Discovery phase, NCSC notes that fully understanding the nature of each system—including software versions, hardware limitations, and patch levels—is an excellent first step as it helps you:

  • Determine whether a system’s migration will be straightforward or complex
  • Identify which upgrades can be handled by vendors and service providers
  • Develop a clear, step-by-step roadmap for your PQC migration

Get Started with AppViewX AVX ONE CLM Smart Discovery

The AppViewX AVX ONE Certificate Lifecycle Management (CLM) platform allows you to discover and consolidate your cryptographic assets across hybrid and multi-cloud environments into a single inventory. This inventory serves as your Cryptography Bill of Materials (CBOM), providing crucial data for PQC prioritization and future migration, including:

  • Certificate Details: Expiration dates, cryptographic algorithms, Certificate Authorities (CAs), security levels, certificate type, key length, key usage, and associated applications.
  • Cryptographic Compatibility: Alignment with PQC standards
  • Deployment Overview: Identification of associated systems/applications, usage scenarios, active protocols, and vulnerabilities.

Get full visibility into your certificate ecosystem

2. Find Solutions that Enable Crypto-Agility

One of the standout recommendations from NCSC as part of the migration planning is to build cryptographic agility. In most cases, you’ll find that traditional public-key cryptography (PKC) and PQC will need to coexist during the transition. Since introducing PQC will likely give rise to interoperability or compatibility challenges, NCSC advises that you choose solutions that offer cryptographic agility and can readily support alternative suites of cryptographic algorithms. This approach lets you determine, on a case-by-case basis, when to phase out legacy algorithms. Ultimately, you achieve full quantum security only when you no longer rely solely on traditional PKC.

Achieve Crypto-Agility with AppViewX AVX ONE CLM

  • Visibility: Full visibility (discovery and inventory) into your cryptographic ecosystem, helping you prioritize PQC migration efforts.
  • Automation: Industry-leading, advanced CLM automation to streamline even the most complex cryptographic transitions.
  • Control: Zero-touch policies that ensure strict PKI compliance, automatically enforcing PQC (or strong) algorithms without deviations.

Explore AVX ONE CLM Crypto-Agility

Achieve Crypto-Agility with AppViewX AVX ONE CLM

3. Weigh Your Options for Migrating Your Private PKI to PQC

For large enterprises, migrating their on-premises private Public Key Infrastructure (PKI) to PQC is a significant challenge. This involves creating a new PQC root-of-trust and issuing PQC certificates across the organization’s infrastructure. Organizations have several migration options: running a parallel PKI with PQC algorithms alongside the legacy PKI or completely switching over to the new PQC-enabled PKI in some highly controlled environments.

More often, however, a phased approach is necessary—where both legacy PKI and PQC-enabled PKI operate concurrently, using protocols like TLS and IKE. Alternatively, NCSC also suggests going for a new PQC root-of-trust that can cross-sign the old one and help verify non-upgraded certificates during the transition. Each approach requires careful security evaluation, as full quantum security is only achieved when the PKI migration is complete, and traditional certificates have been phased out.

Switch to PQC-Enabled PKI with AppViewX AVX ONE PKIaaS

The AVX ONE platform offers a modern, agile, and secure PKI-as-a-Service with full support for the new NIST-standardized PQC encryption algorithms ML-DSA (FIPS 204), SLH-DSA (FIPS 205), and Falcon. This enables seamless issuance of PQC-enabled certificates for internal/private trust use cases, allowing you to proactively begin your PQC migration.

Crypto-Agility and Preparing for Post-Quantum Cryptography

4. Don’t Overlook Testing and Validation During Migration

Testing and validation are non-negotiable aspects of any major IT migration, and the transition to PQC is no exception. NCSC recommends integrating rigorous testing into every phase of your migration plan—not only to confirm that PQC-supporting libraries and hardware modules work correctly within individual systems but also to ensure seamless interoperability across all your services.

Further, NCSC stresses on establishing a robust assurance process to track the success of your PQC migration and broader cybersecurity improvements. It suggests implementing clear metrics—such as measuring the adoption rate of PQC among software clients—to monitor progress, pinpoint any areas requiring corrective action, and ultimately determine when it’s safe to phase out legacy algorithms.

Start Testing with the AppViewX PQC Test Center

Easily set up a quantum-safe PKI hierarchy and generate PQC test certificates to evaluate performance and compatibility within your environment. Visit the AppViewX PQC Test Center to start using our free online tool.

5. Banking, Financial Services, and Telecom Must Start Preparing Now

According to NCSC, regulated sectors in the UK—such as banking, financial services, and telecom companies, and those with predominantly internet-facing services—should prioritize an early migration to PQC. They recommend aligning these efforts with global partners and rolling out the transition as soon as well-implemented PQC solutions become available.

6. Expect Industry Readiness and Vendor Roadmaps in 2025

Looking ahead to 2025, NCSC endorses the widespread adoption of the NIST-standardized PQC algorithms—ML-KEM (FIPS 203), ML-DSA (FIPS 204), and SLH-DSA (FIPS 205). In 2025, NCSC expects to see the market debut of cryptographic hardware roots of trust, including advanced hardware security modules (HSMs) and secure boot solutions built on these new standards. As we move into 2026 and 2027, NCSC expects hardware acceleration to boost the efficiency of these implementations.

Meanwhile, the standardization of PQC within TLS—a widely-used protocol for secure internet communications—is underway at the IETF, with final standards expected around 2027. NCSC sees all major cloud service and hyperscale providers rolling out roadmaps to integrate PQC into their services. On top of that, standards-defining organizations (SDOs) are hard at work incorporating these cutting-edge algorithms into the next generation of security protocols, with new PQC standards for Trusted Platform Modules, X.509 PKI certificates, UEFI Secure Boot, and even 6G cellular communications projected to emerge by 2028.

PQC Countdown Has Begun. Prepare Now.

At the core of the NCSC’s guidance is one simple command: start now. A quantum computer capable of breaking today’s encryption may not be here yet, but waiting until it arrives is a risk you can’t afford. Don’t fall into the trap of thinking there’s no rush. The industry is rapidly evolving as a cohesive ecosystem, and as it matures, every organization must play its part by preparing its infrastructure for the transition to PQC.

Rather than being daunted by the scale and complexity of the PQC transition, invest your time now in completing the initial phases of discovery and assessment. Map your systems, engage your supply chain, and build crypto-agility. This is your ticket to avoiding last-minute surprises and ensuring a smooth, well-planned transition to PQC when the time comes. Remember, 2028 is closer than it seems.

AppViewX can help you implement crypto-agility and start preparing today for Post-Quantum Cryptography

How AppViewX AVX ONE CLM Helps You Prepare for the PQC Transition Across Various Stages in Alignment with the UK NCSC Guidelines

Discovery and Assessment Cryptographic Agility Private PKI Migration Testing and Validation
AVX ONE CLM Smart Discovery Visibility/Automation/Control AppViewX AVX ONE PKIaaS AppViewX PQC Test Center
  • Smart Discovery of all certificates, machines, workloads, and applications across hybrid and multi-cloud environments
  • Comprehensive inventory that serves as your cryptographic
    metadata database, providing crucial data for PQC prioritization and future migration, including:

    • Certificate Details
    • Cryptographic Compatibility
    • Deployment Overview
  • Visibility: Full visibility into your cryptographic ecosystem, helping you prioritize PQC migration efforts.
  • Automation: Industry leading, advanced CLM automation to streamline even the most complex cryptographic transitions.
  • Control: Zero-touch policies that ensure strict PKI compliance, automatically enforcing PQC (or strong) algorithms
    without deviations.
  • A modern, agile, and secure PKIaaS with full support for the new
    NIST-standardized PQC encryption algorithms ML-DSA (FIPS 204), and SLH-DSA (FIPS 205) and Falcon
  • Seamless issuance of PQC-enabled certificates for internal/private
    trust use cases

Easily set up a quantum-safe PKI hierarchy and generate PQC test certificates to evaluate performance and compatibility within your environment.

Tags

  • CLM Automation
  • cryptography
  • Cryptography Bill of Materials (CBOM)
  • NIST-standardized PQC encryption algorithms
  • Post-quantum cryptography (PQC)
  • PQC migration
  • public-key cryptography
  • United Kingdom's National Cyber Security Centre (NCSC)
  • X.509 PKI certificates

About the Author

Krupa Patil

Product Marketing Manager

A content creator focused on providing readers and prospective buyers with accurate, useful, and latest product information to help them make better informed decisions.

More From the Author →

Related Articles

So Many Reasons to Check Out AppViewX at the 2025 RSA Conference

| 5 Min Read

It’s Official: CA/B Forum Votes Yes to 47-Day TLS Certificates

| 6 Min Read

Post-Quantum Cryptography: Preparing for a Quantum Future

| 6 Min Read