Security & Compliance

Post-Quantum Cryptography Migration: A Practical Timeline

November 15, 2024

3 min read

Why This Matters Now

The NIST standardization of post-quantum cryptography algorithms (ML-KEM, ML-DSA, SLH-DSA) means migration is no longer theoretical—it's engineering work with clear timelines.

The Risk Window

Harvest Now, Decrypt Later: Adversaries are already capturing encrypted traffic, waiting for quantum computers capable of breaking current RSA and ECC encryption. Data encrypted today could be vulnerable within 10-15 years.

Compliance Timelines: Financial services regulators are establishing PQC migration deadlines. Government systems face even tighter schedules.

The Three Migration Challenges

  1. How do we maintain backward compatibility?

    • Hybrid cryptography approaches during transition
    • Protocol negotiation for mixed environments
    • Certificate chain complexity
  2. What about performance impact?

    • Larger key sizes affect bandwidth and storage
    • Computational overhead on constrained devices
    • Latency sensitivity in real-time systems
  3. How do we validate the migration?

    • Testing hybrid cryptography configurations
    • Monitoring for compatibility issues
    • Ensuring no security regressions

Recommended Migration Path

Phase 1: Assessment (3-6 months)

Inventory Current Cryptography:

  • Document all cryptographic implementations
  • Identify libraries, protocols, and dependencies
  • Map data sensitivity and retention periods

Risk Prioritization:

  • Long-lived data gets migrated first
  • High-value targets require immediate action
  • Short-lived ephemeral data can wait

Phase 2: Hybrid Implementation (6-12 months)

Dual Algorithm Support:

  • Run traditional and PQC algorithms in parallel
  • Maintain backward compatibility
  • Enable gradual rollout

Infrastructure Updates:

  • Certificate authorities support PQC certificates
  • Key management systems handle larger keys
  • Monitoring systems track both algorithm types

Phase 3: Production Deployment (12-24 months)

Progressive Rollout:

  • Internal systems first
  • Partner integrations second
  • Public-facing services last

Validation Strategy:

  • Monitor error rates and performance
  • A/B testing for performance comparison
  • Rollback procedures for each phase

Phase 4: Full Migration (24-36 months)

Deprecate Legacy Algorithms:

  • Remove classical cryptography support
  • Simplify key management
  • Reduce attack surface

Technical Considerations

Performance Trade-offs

Key Sizes:

  • ML-KEM-768: 2400 bytes vs RSA-2048: 256 bytes
  • Network overhead matters for high-frequency systems
  • Storage costs increase for key archives

Computational Cost:

  • Signature verification faster in some PQC algorithms
  • Key generation slower than RSA/ECC
  • Hardware acceleration still emerging

Integration Challenges

TLS/SSL Migration:

  • Certificate chain length increases significantly
  • Handshake time extends due to larger keys
  • Load balancer configurations need updates

Hardware Security Modules:

  • Not all HSMs support PQC yet
  • Firmware updates may be required
  • Performance characteristics differ

IoT and Embedded Devices:

  • Limited memory constrains key storage
  • Processing power affects signature operations
  • Update mechanisms may not support large keys

Common Pitfalls

Waiting for "Full Maturity":

  • No algorithm is immune to future cryptanalysis
  • Delaying migration increases risk exposure
  • Hybrid approaches mitigate uncertainty

Underestimating Scope:

  • Cryptography appears in unexpected places
  • Third-party dependencies resist updates
  • Testing requirements exceed initial estimates

Ignoring Performance Impact:

  • Production load reveals bottlenecks
  • Bandwidth costs increase meaningfully
  • Latency-sensitive systems need redesign

Key Takeaways

  • Start assessment now, even if full migration is years away
  • Hybrid cryptography enables safe, gradual migration
  • Performance testing under production load is essential
  • Plan for 2-3 year migration timelines for complex systems

The risk is real, the standards are published, and the clock is running. Organizations that start planning now will avoid rushed, expensive migrations later.

Related services: Project Chimera