The urgency to prepare for post-quantum cryptography (PQC) is no longer theoretical — it's real, and it’s now. While quantum computers capable of breaking classical encryption, called cryptographically relevant quantum computers (CRQM), aren't mainstream yet, the threat landscape has changed.
There are several important industry, governmental, and international bodies that are now recommending or even requiring organizations to begin planning or actively migrating to (PQC). Here's a quick rundown of the key drivers behind this push:
NIST has been leading the global standardization effort for post-quantum algorithms. In 2022, they announced the first group of PQC algorithms selected for standardization, and some of them have been officially published as standards.
NIST encourages organizations to begin testing and integrating PQC algorithms now, so they’re ready once final standards are published.
While the following are U.S. mandates, it affects **all vendors and partners working with the U.S. government — including tech providers worldwide.
Executive Order 14028** ("Improving the Nation’s Cybersecurity") and National Security Memorandum NSM-10 direct U.S. federal agencies to:
The NSA and CISA (Cybersecurity and Infrastructure Security Agency) have published roadmaps for when and how federal systems should start adopting PQC.
ENISA has issued guidance on post-quantum risk management, recommending that:
The EU is actively monitoring quantum threats, particularly for critical infrastructure and financial services.
In Great Britain, the National Cyber Security Centre (NCSC) highlights the importance of post-quantum cryptography (PQC) in their latest guidance.
The three-phase roadmap encourages organizations to start preparing for the PQC transition now to avoid rushed migration and pave the way for a smooth and managed transition.
Banks and insurance companies have been forerunners in improving their cybersecurity posture for years, and now they’ve been accompanied by fintechs. This is because they have:
Financial regulators in some jurisdictions are beginning to mention PQC readiness in cyber risk expectations.
Groups like ISO, ETSI, and the Cloud Security Alliance have issued whitepapers and draft standards encouraging early preparation for PQC.
Large tech vendors, many of whom also develop quantum computers (e.g., Google, IBM, Microsoft, Amazon), are already testing or piloting PQC integration in their services — e.g., hybrid TLS in Chrome and Cloud services.
The Monetary Authority of Singapore (MAS) has issued an advisory urging financial institutions to prepare for the transition to post-quantum cryptography (PQC). The key recommendations from MAS include:
The Cryptography Research and Evaluation Committees (CRYPTREC) set up by the Japanese Government have published the "CRYPTREC Cryptographic Technology Guideline - Post-Quantum Cryptography - 2024 Edition," offering comprehensive recommendations for transitioning to quantum-resistant algorithms.
Summary: Why Migration Is Being Recommended Now
The good news is that migration post quantum cryptography is feasible today.
Learn more in our blog post about the topic >>>