Quantum Computing | Post-Quantum Cryptography

Post-Quantum Cryptography: What Every Business Needs to Know in 2026

Post-quantum cryptography (PQC) is a new generation of encryption algorithms designed to resist attacks from both classical computers and quantum computers. In August 2024, NIST finalized three PQC standards: ML-KEM (FIPS 203) for key exchange, ML-DSA (FIPS 204) for digital signatures, and SLH-DSA (FIPS 205) as a hash-based signature alternative. These algorithms replace RSA and elliptic-curve cryptography, which will become breakable once quantum computers reach sufficient scale. Petronella Technology Group, Inc. helps businesses navigate PQC migration with cryptographic inventories, risk assessments, and compliance-driven implementation plans backed by 24 years of cybersecurity expertise and CMMC-RP credentials.

BBB A+ Rated Since 2003 • 24+ Years Serving NC • 2,500+ Clients

Key Takeaways

  • Post-quantum cryptography replaces RSA and ECC with algorithms that resist quantum computer attacks. NIST finalized three standards (FIPS 203, 204, 205) in August 2024.
  • Quantum computers running Shor's algorithm will break RSA, ECC, and Diffie-Hellman. Symmetric encryption (AES-256) and hash functions (SHA-384) remain secure.
  • The three NIST PQC algorithms: ML-KEM for key exchange, ML-DSA for digital signatures, and SLH-DSA for hash-based signatures. A fourth, HQC, is nearing standardization.
  • NSA CNSA 2.0 mandates quantum-resistant algorithms for National Security Systems by January 2027. Google announced a 2029 PQC migration deadline in March 2026.
  • Migration starts with a cryptographic inventory, not an algorithm swap. Most organizations underestimate how deeply RSA and ECC are embedded across their systems.

Why Post-Quantum Cryptography Exists

Every secure connection on the internet depends on public-key cryptography. When you connect to a bank, send an encrypted email, sign a software update, or authenticate to a VPN, public-key algorithms handle the key exchange and identity verification. RSA, ECC, and Diffie-Hellman have served this role for decades. They work because the underlying math problems, factoring large numbers and computing discrete logarithms, are infeasible for classical computers to solve.

Quantum computers change that equation. Shor's algorithm, published in 1994, demonstrated that a quantum computer with enough stable qubits can factor large numbers and compute discrete logarithms in polynomial time. In practical terms: RSA-2048 encryption that would take a classical computer millions of years to break could be broken by a sufficiently powerful quantum computer in hours.

No such quantum computer exists today. But progress is accelerating. Google's quantum computing team announced a 2029 PQC migration deadline on March 25, 2026, signaling that they expect cryptographically relevant quantum computers (CRQCs) to arrive within the next few years. IBM, Microsoft, and several nation-state quantum programs are investing billions in qubit count, error correction, and engineering maturity.

Post-quantum cryptography was developed to address this inevitability. Rather than relying on factoring and discrete logarithms, PQC algorithms use mathematical problems believed to be resistant to both classical and quantum attacks: lattice problems, hash-based constructions, code-based cryptography, and multivariate polynomial systems. For a broader view of how quantum computing intersects with organizational security, see our quantum computing cybersecurity guide.

The Three NIST Post-Quantum Standards

After an eight-year evaluation process involving submissions from research teams worldwide, NIST published three PQC standards in August 2024. These are not drafts or proposals. They are finalized Federal Information Processing Standards (FIPS) ready for production adoption.

ML-KEM (FIPS 203): Key Encapsulation

ML-KEM, based on the CRYSTALS-Kyber algorithm, handles key exchange. It replaces the RSA key exchange and ECDHE (Elliptic Curve Diffie-Hellman Ephemeral) that protect TLS connections, VPN tunnels, and SSH sessions. ML-KEM is a key encapsulation mechanism (KEM), which means it establishes a shared secret between two parties without transmitting the secret directly.

ML-KEM offers three parameter sets with increasing security levels:

Parameter Set
Security Level
Public Key Size
Ciphertext Size
Use Case
ML-KEM-512
NIST Level 1 (~AES-128)
800 bytes
768 bytes
General web traffic, internal services
ML-KEM-768
NIST Level 3 (~AES-192)
1,184 bytes
1,088 bytes
Recommended default for most applications
ML-KEM-1024
NIST Level 5 (~AES-256)
1,568 bytes
1,568 bytes
High-assurance, classified, and government systems

For context, an RSA-2048 public key is 256 bytes and an ECDH P-256 key share is 32 bytes. ML-KEM keys are larger, which means TLS handshakes carry more data. In practice, the performance impact is modest. Google Chrome and Cloudflare have tested hybrid TLS with ML-KEM at internet scale, reporting latency increases of less than one millisecond for most connections.

ML-DSA (FIPS 204): Digital Signatures

ML-DSA, based on CRYSTALS-Dilithium, handles digital signatures. It replaces RSA signatures and ECDSA used in X.509 certificates, code signing, document signing, S/MIME email, and authentication protocols. ML-DSA is the primary general-purpose PQC signature algorithm.

ML-DSA signatures are significantly larger than ECDSA signatures (2,420 bytes for ML-DSA-44 versus 64 bytes for ECDSA P-256). This affects certificate chain sizes, TLS handshake overhead, and CI/CD pipeline bandwidth. Organizations must account for these increases in capacity planning, particularly for PKI infrastructure, OCSP responders, and code distribution systems.

SLH-DSA (FIPS 205): Hash-Based Signatures

SLH-DSA, based on SPHINCS+, provides an alternative signature algorithm using hash-based constructions. Its security depends only on the properties of hash functions, which are well-understood and have decades of cryptanalytic history. This makes SLH-DSA a conservative "insurance policy" against the possibility that lattice-based algorithms face unexpected attacks in the future.

The trade-off is size: SLH-DSA signatures can range from 7,856 to 49,856 bytes depending on the parameter set. This makes it impractical for high-frequency signing (like TLS certificate chains) but well-suited for long-lived, high-assurance artifacts such as firmware images, root certificates, and legal documents.

HQC: The Fourth Algorithm

NIST selected HQC (Hamming Quasi-Cyclic) as an additional KEM based on code-based cryptography. It provides diversity against the possibility that lattice-based problems (underlying ML-KEM) prove weaker than expected. HQC is in the final stages of standardization as of early 2026.

What Breaks and What Stays Secure

Understanding the scope of the quantum threat helps organizations prioritize migration resources. Not everything needs to change.

Algorithm Type
Current Standard
Quantum Impact
Action Required
Key exchange
RSA, ECDHE, DH
Broken by Shor's algorithm
Replace with ML-KEM
Digital signatures
RSA, ECDSA, EdDSA
Broken by Shor's algorithm
Replace with ML-DSA or SLH-DSA
Symmetric encryption
AES-128, AES-256
Weakened by Grover's (halved security)
Use AES-256 (provides AES-128 equivalent post-quantum)
Hash functions
SHA-256, SHA-384, SHA-3
Minimal impact
Prefer SHA-384 or SHA-512 for new designs
Message auth codes
HMAC-SHA-256
Minimal impact
No change required

The practical implication: PQC migration focuses on the public-key layer. Symmetric encryption, hashing, and MACs need minor adjustments at most (upgrading to AES-256 and SHA-384 where not already in use). The heavy lifting is in replacing key exchange and signature algorithms across TLS, PKI, VPNs, code signing, SSH, email encryption, and authentication systems.

The Compliance Timeline Businesses Must Track

PQC migration is not just a technical upgrade. It is a compliance obligation with concrete deadlines. Organizations in regulated industries, government contracting, or handling sensitive data need to map these dates against their migration planning.

  • August 2024: NIST published FIPS 203, 204, and 205. PQC standards are finalized and available for adoption.
  • December 2025: NIST published CSWP 39 (crypto agility guidance), providing a framework for how organizations should approach PQC migration.
  • March 2025: PCI DSS 4.0 mandated cryptographic inventory and migration planning for payment processing systems.
  • March 25, 2026: Google announced a 2029 deadline for PQC migration, signaling browser and web ecosystem timeline expectations.
  • September 21, 2026: CISA CMVP module transition deadline for cryptographic validation programs.
  • January 1, 2027: NSA CNSA 2.0 requires all new National Security System acquisitions to be quantum-resistant. Defense contractors and federal system integrators are directly affected.
  • 2030: NSA CNSA 2.0 legacy system phase-out begins. G7 financial sector targeting critical systems quantum-safe by 2030-2032.

For defense contractors operating under CMMC, the CNSA 2.0 timeline creates upstream pressure. Subcontractors and suppliers in the defense industrial base should expect PQC requirements in future CMMC assessment criteria. For healthcare organizations, the proposed HIPAA encryption rule (expected around May 2026) will likely reference PQC-ready encryption as a best practice for protecting electronic protected health information (ePHI).

How Post-Quantum Migration Actually Works

PQC migration is not a one-day cipher swap. It is a multi-year program that touches every layer of an organization's technology stack. The SHA-1 to SHA-2 migration, which involved replacing a single hash algorithm, took the industry over a decade. PQC migration is more complex because it affects key exchange, signatures, authentication, certificates, firmware signing, and stored data protection simultaneously.

Phase 1: Cryptographic Inventory

Before you can migrate anything, you need to know where cryptography lives in your environment. Build a cryptographic bill of materials (CBOM) covering:

  • TLS certificates on all internal and external endpoints (web servers, load balancers, API gateways, CDNs)
  • VPN configurations and tunnel endpoints
  • SSH keys across all servers, CI/CD systems, and development machines
  • Code signing certificates and build pipeline signing configurations
  • Email encryption (S/MIME, PGP) deployments
  • KMS and HSM integrations for data-at-rest encryption
  • IoT and OT device certificates and firmware signing chains
  • Third-party and SaaS vendor cryptographic dependencies

Automated scanning tools can discover TLS endpoints and certificate details. For deeper inventory (embedded crypto in applications, custom protocols, HSM firmware versions), manual assessment is typically required.

Phase 2: Risk Prioritization

Not all systems need to migrate at the same time. Prioritize by two factors: data confidentiality lifetime and exposure to harvest-now-decrypt-later (HNDL) attacks. Systems protecting data that must remain confidential for 5+ years are highest priority. Internet-facing TLS endpoints where traffic can be intercepted rank above internal-only services.

Phase 3: Hybrid Deployment

Hybrid cryptography combines classical and PQC algorithms in a single operation. For TLS key exchange, this means combining X25519 (classical ECDHE) with ML-KEM (PQC KEM) so the session is secure if either algorithm remains unbroken. Hybrid deployment is the recommended transition strategy because it:

  • Provides quantum resistance for the key exchange immediately
  • Maintains backward compatibility with clients that do not support PQC
  • Reduces risk if a PQC algorithm faces unexpected vulnerabilities during early deployment

Major browsers (Chrome, Firefox, Edge) and CDN providers (Cloudflare, AWS CloudFront) already support hybrid TLS with ML-KEM. Enabling it on your internet-facing endpoints is often a configuration change, not a code rewrite.

Phase 4: PKI and Certificate Migration

Enterprise PKI migration is the most complex phase. Internal certificate authorities must issue PQC-signed certificates. Certificate chains grow larger (ML-DSA public keys and signatures are substantially bigger than ECDSA). OCSP responders, CRL distribution points, and certificate automation (ACME, EST, SCEP) must handle increased object sizes. Many organizations will run parallel classical and PQC certificate hierarchies during the transition.

Phase 5: Code Signing and Supply Chain

Software update chains, container signing, and firmware verification must transition to PQC signatures. Dual-signing (classical + PQC) maintains compatibility during the transition period. Build pipelines, package repositories, and runtime verifiers all need updates. This phase often takes the longest because it depends on platform vendor support (Windows Authenticode, Apple notarization, Android APK signing).

What Post-Quantum Cryptography Costs

PQC migration costs scale with organizational complexity. A useful framework for budgeting:

Organization Size
Assessment Cost
Migration Cost (Multi-Year)
Key Cost Drivers
Small business (1-50 employees)
$5,000-$20,000
$10,000-$50,000
Vendor dependency; most migration handled by SaaS providers
Mid-market (50-500 employees)
$20,000-$100,000
$100,000-$500,000
Internal PKI, VPN infrastructure, custom applications
Enterprise (500+ employees)
$100,000-$500,000
$500,000-$5,000,000+
Complex PKI, IoT fleets, HSM upgrades, legacy systems, compliance

The cost of not migrating is harder to quantify but potentially catastrophic. If a CRQC breaks RSA before an organization has migrated, every encrypted communication, stored backup, and digitally signed artifact protected by RSA or ECC becomes compromised. The reputational, legal, and regulatory fallout would dwarf any migration budget.

Common Misconceptions About Post-Quantum Cryptography

"Quantum computers are decades away, so we can wait"

Google's March 2026 announcement of a 2029 migration deadline suggests otherwise. More importantly, harvest-now-decrypt-later attacks make the threat immediate for any data with a confidentiality window exceeding 5 years. The question is not when quantum computers arrive; it is whether your data's secrecy outlasts the current encryption protecting it.

"Our cloud provider handles encryption, so we do not need to do anything"

Cloud providers will migrate their managed services on their own timelines, but those timelines vary by service and region. More critically, customer-managed keys, custom applications, VPN configurations, and PKI hierarchies are your responsibility. Waiting for your cloud provider to solve the problem leaves significant gaps.

"AES-256 is quantum-safe, so our data at rest is fine"

AES-256 for bulk encryption is indeed quantum-resistant. But the key wrapping and key exchange mechanisms that protect the AES keys often rely on RSA or ECC. If an adversary can break the key exchange, they recover the symmetric key and decrypt the data. Migrating the key management layer to PQC is essential even when the data encryption itself is symmetric.

"PQC algorithms are too new to trust"

ML-KEM (Kyber) survived eight years of public cryptanalysis during NIST's evaluation process, with contributions from hundreds of researchers worldwide. The mathematical foundations (lattice problems) have been studied for over 25 years. Hybrid deployment further mitigates risk: the connection is secure if either the classical or PQC algorithm holds. This is a belt-and-suspenders approach, not a leap of faith.

What Petronella Technology Group, Inc. Recommends for 2026

Based on our work with defense contractors, healthcare organizations, and compliance-driven businesses across the mid-Atlantic region, we recommend a four-step approach.

Commission a Cryptographic Inventory

You cannot migrate what you have not mapped. A CBOM reveals the true scope of your RSA and ECC dependency and identifies systems that are impossible to upgrade: legacy hardware, embedded devices, and vendor-locked appliances.

Enable Hybrid TLS on Internet-Facing Endpoints

This is the fastest way to stop harvest-now-decrypt-later attacks on new communications. Most CDNs and load balancers already support hybrid key exchange with ML-KEM. The configuration change takes hours; the risk reduction is immediate.

Engage Your Vendors in Writing

Request PQC roadmaps from every critical technology vendor: cloud provider, VPN, HSM/KMS, PKI, endpoint management, and CI/CD toolchain. Document their commitments and timelines. Embed PQC requirements in new procurement contracts.

Build Your Migration Roadmap

Map the inventory against compliance deadlines (CNSA 2.0, PCI DSS, HIPAA, CMMC), data confidentiality lifetimes, and vendor readiness timelines. Phase the migration across 3 to 5 budget cycles with measurable milestones.

How Petronella Technology Group, Inc. Helps with PQC Migration

Petronella Technology Group, Inc. offers quantum readiness assessments tailored for SMBs and mid-market organizations. Our team holds CMMC-RP and CMMC-CCA credentials with deep expertise in compliance-driven security, giving us a unique perspective on how PQC intersects with frameworks like CMMC, HIPAA, and NIST 800-171.

Craig Petronella, founder and principal consultant, brings 24+ years of cybersecurity experience, CMMC-RP and CMMC-CCA certifications, a Licensed Digital Forensic Examiner credential, and 15 published books on information security. This combination of AI-first technology consulting and deep compliance credentials means your PQC migration is planned by someone who understands both the cryptographic engineering and the regulatory landscape.

We serve defense contractors, healthcare organizations, financial services firms, and any business handling sensitive data that must remain confidential beyond the quantum horizon. Whether you need a standalone cryptographic inventory, a full migration roadmap, or ongoing advisory through each migration phase, our team is ready to help.

Post-Quantum Cryptography: Frequently Asked Questions

What is post-quantum cryptography?
Post-quantum cryptography (PQC) is a set of cryptographic algorithms designed to be secure against attacks from both classical and quantum computers. PQC algorithms use mathematical problems, primarily lattice-based and hash-based constructions, that cannot be efficiently solved by quantum algorithms like Shor's. NIST finalized three PQC standards in August 2024: ML-KEM for key exchange, ML-DSA for digital signatures, and SLH-DSA for hash-based signatures.
When will quantum computers break RSA encryption?
Expert estimates range from 5 to 15 years for cryptographically relevant quantum computers. Google announced a 2029 PQC migration deadline on March 25, 2026. The exact timeline is uncertain, but the combination of harvest-now-decrypt-later attacks and multi-year migration timelines means businesses should start preparing now, not when quantum computers are publicly demonstrated.
Which NIST post-quantum algorithms should businesses adopt?
Start with ML-KEM (FIPS 203) for key exchange in TLS, VPN, and SSH connections. This directly addresses harvest-now-decrypt-later threats. Then adopt ML-DSA (FIPS 204) for digital signatures in certificates, code signing, and authentication. SLH-DSA (FIPS 205) is recommended for highest-assurance use cases like root certificates and firmware signing.
Is AES-256 quantum-safe?
Yes. AES-256 provides approximately AES-128 equivalent security against quantum attacks due to Grover's algorithm, which is still computationally infeasible to break. The quantum threat is to asymmetric (public-key) algorithms like RSA and ECC used for key exchange and digital signatures. However, if AES keys are exchanged using vulnerable asymmetric algorithms, the entire communication can be compromised retroactively.
How long does post-quantum cryptography migration take?
Full PQC migration typically takes 2 to 5 years for mid-size organizations and longer for enterprises with complex PKI, IoT fleets, and legacy systems. The SHA-1 to SHA-2 migration, a simpler algorithm swap, took over a decade. Starting with a cryptographic inventory and hybrid TLS pilot can be accomplished within one quarter, and these early steps provide immediate risk reduction.
What does post-quantum cryptography cost for a small business?
For small businesses, a cryptographic assessment typically costs $5,000 to $20,000, and initial migration runs $10,000 to $50,000 spread over one to two years. Most small business migration is handled by SaaS providers upgrading their platforms, but VPN configurations, custom applications, and email encryption need direct attention. The cost of not migrating is far higher if quantum decryption exposes client data.
Does post-quantum cryptography affect CMMC compliance?
Not yet directly, but it will. NSA CNSA 2.0 mandates quantum-resistant algorithms for National Security Systems by January 2027. Defense contractors in the CMMC ecosystem should expect PQC requirements in future assessment criteria. Organizations that begin PQC migration now will be ahead of these mandates rather than scrambling to meet them.
Craig Petronella
CEO and Principal Consultant, Petronella Technology Group, Inc.
Craig Petronella is a CMMC Registered Practitioner (CMMC-RP), Certified CMMC Assessor (CMMC-CCA), Licensed Digital Forensic Examiner, and author of 15 published books on cybersecurity and technology. With over 24 years of experience protecting businesses from evolving threats, Craig advises organizations on post-quantum cryptography migration, compliance frameworks, and secure AI adoption.

Get Your Free Quantum Readiness Assessment

Petronella Technology Group, Inc. helps businesses navigate the transition to post-quantum cryptography with cryptographic inventories, migration roadmaps, and compliance-aligned implementation plans. Our free initial consultation evaluates your organization's quantum risk exposure and provides a clear next step, with no obligation and no sales pressure.

BBB A+ Rated Since 2003 • 24+ Years Serving NC • 2,500+ Clients

Last Updated: March 2026