Affiliate disclosure: This article contains affiliate links. If you purchase through these links, we may earn a commission at no extra cost to you.
The encryption protecting your bank transfers, medical records, and government communications will not survive a quantum computer. NIST finalized its three post-quantum cryptography (PQC) standards in August 2024 — and as of April 2026, organizations are under real compliance deadlines to implement them. So, what exactly are these standards? Why do they matter right now? And honestly, what happens if you just wait?
Background Context
For decades, RSA and elliptic curve cryptography (ECC) have secured digital communications worldwide. Both rely on mathematical problems — things like integer factorization and discrete logarithm — that classical computers just can’t crack in any reasonable timeframe. But here’s the kicker: a sufficiently powerful quantum computer changes that equation entirely.
The threat isn’t hypothetical anymore, you know? Sure, Cryptographically Relevant Quantum Computers (CRQCs) that can break RSA-2048 are still years off, by most estimates. But trust me, the window to act is way smaller than it looks. Why? Well, migrating cryptographic infrastructure across a whole enterprise usually eats up three to five years. Organizations waiting for “Q-Day” to hit the news are already playing catch-up.
NIST kicked off its post-quantum standardization process back in 2016, inviting submissions from cryptographers all over the world. After eight years of deep dives and analysis, they finally published the standards in August 2024:
- FIPS 203 (ML-KEM) — based on CRYSTALS-Kyber, used for key establishment (replacing RSA key exchange)
- FIPS 204 (ML-DSA) — based on CRYSTALS-Dilithium, used for digital signatures
- FIPS 205 (SLH-DSA) — based on SPHINCS+, a stateless hash-based signature scheme
These aren’t just proposals or drafts anymore. They’re actual, published federal standards. The compliance countdown? It’s officially on.
Technical Details: What ML-KEM, ML-DSA, and SLH-DSA Actually Do
ML-KEM (FIPS 203): The New Key Exchange
ML-KEM replaces the RSA and Diffie-Hellman key exchange mechanisms used in TLS, SSH, and VPNs. It’s built on the Module Learning With Errors (MLWE) problem — a lattice-based mathematical challenge quantum computers just can’t efficiently crack.
Key technical realities your organization needs to plan for:
- ML-KEM public keys are roughly 1,184 bytes for the 128-bit security level (ML-KEM-768). Compare that to just 256 bytes for an ECC P-256 key.
- Ciphertexts are around 1,088 bytes — meaningfully larger than current ECC equivalents.
- Performance on modern hardware is good, but embedded systems and IoT devices with limited memory face real friction.
ML-DSA (FIPS 204): Digital Signatures at Scale
ML-DSA replaces RSA and ECDSA for signing code, documents, certificates, and authentication tokens. Signature sizes are substantially larger than ECC — roughly 2,420 bytes for the standard security parameter set versus 64 bytes for an Ed25519 signature.
This matters for:
- TLS certificate chains (certificate size directly affects handshake latency)
- Software update systems where signatures are verified at scale
- Blockchain and distributed systems with strict payload size limits
SLH-DSA (FIPS 205): The Conservative Choice
SLH-DSA is a hash-based signature scheme. It relies solely on the security of cryptographic hash functions, which makes it the most conservative option. If lattice-based cryptography is ever broken, SLH-DSA remains safe. The trade-off is signature size: SLH-DSA signatures can run 8,000 to 50,000 bytes depending on parameter selection.
It is best suited for use cases where signature generation is infrequent and payload size is less constrained — firmware signing, certificate authorities, and long-term document authentication.
Industry Reactions: Government Moves First, Private Sector Follows Slowly
Federal Agencies: Hard Deadlines
The U.S. government is not treating PQC migration as optional. As of 2026, two key directives frame the compliance landscape:
NSA CNSA 2.0 (Commercial National Security Algorithm Suite 2.0): Software and firmware providers working with national security systems were required to begin PQC transitions by 2025. The mandate specifies that by 2026–2027, PQC algorithms must be the default for systems handling classified communications and national security infrastructure.
OMB Memorandum M-23-02: Directed federal agencies to inventory cryptographic systems and begin planning migrations. The memo explicitly references “harvest now, decrypt later” attacks as a present-day threat, not a future one.
Private Sector: Significant Lag
Large financial institutions and healthcare organizations with regulatory exposure are moving. Cloud providers — AWS, Google Cloud, Microsoft Azure — have deployed hybrid TLS configurations supporting both classical and post-quantum key exchange in their TLS handshakes, allowing clients to negotiate PQC where supported.
The rest of the private sector is largely in the “awareness” phase. A 2025 Gartner survey indicated that fewer than 30% of enterprise organizations had completed a cryptographic inventory — the essential first step before any migration can begin.
That gap creates serious supply chain exposure.
What This Means for Tech Teams and Organizations
The “Harvest Now, Decrypt Later” Problem Is Already Here
This is the most urgent reason PQC migration cannot wait for quantum computers to arrive in the news.
Nation-state threat actors — primarily state-sponsored groups from China, Russia, and North Korea according to CISA and Mandiant threat intelligence — are actively intercepting and archiving encrypted communications today. The data being collected includes financial records, genomic databases, diplomatic cables, and proprietary research. The strategy: hold the encrypted data until a CRQC exists, then decrypt it retroactively.
For any organization that handles data with long-term sensitivity — healthcare, finance, government contractors, research institutions — the risk is not future. It is present. Data encrypted with RSA-2048 today and intercepted by a threat actor will eventually be readable.
Cryptographic Discovery: The Expensive Part
Most enterprise leaders assume migrating to PQC is a software update. It is not.
The hardest part of the migration is cryptographic discovery: identifying every system, library, protocol, and device that uses cryptographic primitives. Legacy cryptography is embedded in:
- Hardware Security Modules (HSMs) with firmware that cannot be remotely updated
- Industrial control systems with hardcoded RSA key pairs
- Third-party SaaS tools with unknown cryptographic stacks
- Custom applications built on deprecated crypto libraries
Gartner and Forrester both project that for large enterprises, the discovery phase alone can run into millions of dollars and take 18 to 36 months. The actual algorithm swap is often the easier part.
The Supply Chain Problem
Your organization might implement ML-KEM tomorrow. Your vendors might not. Every third-party software tool, cloud API, payment processor, or managed service in your stack is a potential weak link.
A PQC-compliant internal architecture provides limited protection if your ERP vendor is still signing software updates with RSA-2048, or if your payment gateway is negotiating RSA key exchange in TLS.
This is why CISA and NIST both recommend that organizations not just inventory their own systems, but push cryptographic transparency requirements into vendor contracts.
What’s Next: The 2026–2028 Migration Window
Hybrid Approaches Are the Bridge
Most organizations will not flip a switch from classical to post-quantum cryptography. The transition period relies on hybrid schemes — TLS configurations that negotiate both a classical key exchange (ECDH) and a post-quantum key exchange (ML-KEM) simultaneously, combining both shared secrets. This approach is already deployed by major cloud providers and ensures backward compatibility while providing quantum resistance.
Google Chrome and Firefox have supported hybrid TLS key exchange since 2024. If your organization uses modern browsers and cloud services, you are already partially protected in transit — but only in transit.
Three Concrete Steps for 2026
- Cryptographic inventory first. Use automated tools (commercial options from Entrust, Keyfactor, and DigiCert now support PQC discovery) to identify all cryptographic assets. Without this list, migration has no starting point.
- Prioritize long-shelf-life data. Any data that must remain confidential for 10+ years should be treated as already at risk from HNDL attacks. Encrypt it with hybrid or full PQC schemes now.
- Add PQC requirements to vendor contracts. Require cryptographic transparency from software vendors and SaaS providers. Ask specifically: when will you support ML-KEM and ML-DSA in your APIs, SDKs, and signed software?
A note on VPNs: Consumer and business VPNs are beginning to add post-quantum support. If you use a VPN for private communications, choosing a provider that has deployed PQC key exchange adds a meaningful layer of protection against HNDL interception. NordVPN and Surfshark are two providers that have publicly committed to PQC roadmaps.
FAQ
What is post-quantum cryptography?
Post-quantum cryptography (PQC) refers to cryptographic algorithms designed to be secure against attacks from quantum computers. Unlike current encryption standards like RSA and ECC, which quantum computers could eventually break, PQC algorithms are based on mathematical problems that remain hard for both classical and quantum machines.
What algorithms did NIST finalize for post-quantum encryption?
In August 2024, NIST finalized three standards: ML-KEM (FIPS 203) for key establishment, ML-DSA (FIPS 204) for digital signatures, and SLH-DSA (FIPS 205) as a hash-based signature alternative. These replace RSA and ECC for their respective functions.
How soon do organizations need to implement PQC?
Federal agencies and national security contractors in the U.S. face the most immediate deadlines — NSA’s CNSA 2.0 mandates PQC as default for national security systems by 2026–2027. The real urgency for private sector organizations comes from the “harvest now, decrypt later” threat, which makes delay risky for any organization handling long-term sensitive data.
Will my current VPN protect me against quantum threats?
Most legacy VPNs use classical key exchange (ECDH or RSA) that quantum computers will eventually break. Some modern VPN providers have begun deploying hybrid post-quantum protocols using ML-KEM. Check whether your VPN vendor has published a PQC roadmap before assuming existing connections are quantum-safe.
What is the “harvest now, decrypt later” attack?
HNDL is a strategy used by nation-state threat actors who intercept and store encrypted communications today, knowing they cannot decrypt them yet. When a cryptographically relevant quantum computer becomes available — potentially within this decade — they plan to retroactively decrypt the stored data. Any data encrypted with classical algorithms and transmitted over public networks is potentially subject to this threat.
Sources:
1. NIST Post-Quantum Cryptography Standards — FIPS 203, 204, 205 (nist.gov, August 2024)
2. NSA Commercial National Security Algorithm Suite 2.0 — Cybersecurity Advisory (nsa.gov, updated 2025)
3. OMB Memorandum M-23-02 — Migrating to Post-Quantum Cryptography (whitehouse.gov, 2023)
Author: NewGalaxy Tech Desk | Published: April 2026 | Category: Cybersecurity
As of April 2026, the three NIST PQC standards are final. The migration window is open — but it closes faster than most organizations expect.
Daniel Mercer is a technology journalist and digital media analyst with over 8 years covering AI, cybersecurity, and emerging tech. He has reported on major product launches, industry shifts, and policy developments for leading tech publications. Daniel holds a degree in Computer Science from the University of Edinburgh and is a member of the Online News Association.