Post-Quantum Cryptography: Migrating Before It's Too Late

NIST has finalized post-quantum standards. The harvest-now-decrypt-later threat is real. Here's a practical migration roadmap for engineering teams that can't afford to wait.
The Threat Is Not Future — It's Present
The most common objection to post-quantum migration is: "We don't have quantum computers that can break RSA yet. Why rush?" This misses the real threat.
Harvest Now, Decrypt Later (HNDL) is the strategy where adversaries capture encrypted traffic today and store it, waiting for quantum computers capable of decrypting it. If your encrypted data has value beyond 10-15 years — medical records, government communications, financial data, trade secrets — it's already vulnerable.
NIST finalized three post-quantum cryptographic standards in 2024. The migration window is now.
The New Standards
ML-KEM (FIPS 203) — Key Encapsulation
Replaces RSA and ECDH for key exchange. Based on the Module Learning with Errors (MLWE) problem. Three security levels:
- ML-KEM-512: Roughly equivalent to AES-128 security
- ML-KEM-768: Roughly equivalent to AES-192 security (recommended default)
- ML-KEM-1024: Roughly equivalent to AES-256 security
Key sizes are larger than RSA (public keys around 800-1,500 bytes vs. 256 bytes for ECC), but operations are faster.
ML-DSA (FIPS 204) — Digital Signatures
Replaces RSA and ECDSA for digital signatures. Also based on lattice problems. Signature sizes are larger (2,420-4,627 bytes vs. 64 bytes for Ed25519), but verification is fast.
SLH-DSA (FIPS 205) — Hash-Based Signatures
A conservative alternative to ML-DSA based entirely on hash functions. Larger signatures but relies on minimal cryptographic assumptions. Recommended for applications where long-term security confidence is paramount.
Migration Roadmap
Phase 1: Inventory (Weeks 1-4)
Before changing any code, map every place your system uses cryptography:
- TLS certificates and configurations
- API authentication (JWT signing, OAuth tokens)
- Data encryption at rest (database, file storage)
- Code signing and software update verification
- VPN and SSH configurations
- Third-party integrations that exchange keys
Phase 2: Hybrid Deployment (Months 2-6)
Don't switch entirely to post-quantum algorithms. Deploy hybrid schemes that combine classical and post-quantum algorithms. For TLS, this means using X25519 + ML-KEM-768 key exchange. If the post-quantum algorithm has an undiscovered weakness, the classical algorithm still provides security. If a quantum computer breaks the classical algorithm, the post-quantum algorithm provides security.
Phase 3: Testing and Performance (Months 4-8)
Post-quantum algorithms have different performance characteristics:
- Larger key sizes increase bandwidth usage (critical for IoT and mobile)
- Larger signatures increase certificate chain verification time
- Key generation is generally faster than RSA
- Test thoroughly under production load conditions
Phase 4: Full Migration (Months 8-12)
Once hybrid deployment is stable and tested, begin transitioning to post-quantum-only configurations where appropriate. Maintain hybrid support for backward compatibility during the transition period.
Practical Advice
- Start with TLS. It's the highest-value target and has the best library support (OpenSSL 3.2+, BoringSSL).
- Use liboqs (Open Quantum Safe) for experimental integration. It provides C implementations of all NIST-selected algorithms.
- Don't roll your own. Post-quantum implementations are subtle. Side-channel attacks on lattice-based schemes are an active research area. Use vetted libraries.
- Plan for agility. Design your cryptographic layer to be algorithm-agnostic. The ability to swap algorithms without rewriting application code is the most valuable long-term investment.
The Clock Is Ticking
The NSA's CNSA 2.0 suite requires all national security systems to support post-quantum algorithms by 2030 and use them exclusively by 2033. If the timeline matters for classified systems, it should matter for your production systems too. The migration is complex but well-defined. Start now.
References & Citations
- NIST (2024). "Post-Quantum Cryptography Standardization." FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), FIPS 205 (SLH-DSA).
- Mosca, M. (2018). "Cybersecurity in an Era with Quantum Computers." IEEE Security & Privacy.
- NSA (2022). "Announcing Selected Post-Quantum Cryptographic Algorithms." CNSA 2.0 Suite.
Related Posts

SITUS Protocol: Sensor-Integrated Trust Using Spatial Entropy — Authentication Bound to Physical Reality
Current authentication proves who you are, but not where you are. SITUS Protocol introduces Environmental Entropy Vectors — a cryptographic primitive that binds every authentication event to the unrepeatable physical context in which it occurs. Credentials become non-relocatable.

Zero-Knowledge Proofs Are Going Mainstream: What Developers Need to Know
ZK proofs used to be academic curiosities. In 2026, they're in production identity systems, blockchain rollups, and privacy-preserving analytics. A practical guide for developers entering the space.

Introducing AVIK: Adaptive Verified Identity Keys — Closing the Full Account-Takeover Lifecycle
Login is solved. The rest isn't. AVIK is a new protocol that addresses what happens after authentication — session replay, unbound high-risk operations, and recovery downgrades — with four composable cryptographic controls.