Part 5 · Real-World Challenges Advanced 14 min read

PQC: A Practical Guide for Security Leaders

Post-quantum cryptography (PQC) replaces the RSA and elliptic curve algorithms that quantum computers will eventually break. This guide covers the NIST PQC standards (FIPS 203, 204, 205, 206), the quantum threat timeline, hybrid certificate deployment, and a practical 24-month migration roadmap for enterprise PKI.

Quick Facts

Type
Educational
Level
Advanced
Chapter
33 of 34

Overview

Post-quantum cryptography (PQC) refers to cryptographic algorithms designed to resist attacks from both classical and quantum computers. Unlike the RSA and elliptic curve algorithms that underpin today's PKI infrastructure, PQC algorithms are built on mathematical problems that remain hard even for a sufficiently powerful quantum computer running Shor's algorithm.

In 2024, NIST published the first three post-quantum cryptographic standards: FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA). A fourth standard, FIPS 206 (FN-DSA), is expected shortly. These standards mark the end of the research phase and the beginning of the deployment phase. Organizations that depend on public key cryptography, which is virtually all of them, now face a concrete migration timeline.

This guide focuses on the PQC standards themselves, their practical implications for enterprise PKI, and the operational steps required to begin migrating. For a broader treatment of the organizational capability needed to swap algorithms at scale, see our companion guide on crypto-agility.

What PQC Means for PKI

Public key infrastructure relies on the computational difficulty of specific mathematical problems. RSA depends on integer factorization. ECDSA and ECDH depend on the elliptic curve discrete logarithm problem. A sufficiently large quantum computer running Shor's algorithm can solve both problems in polynomial time, rendering every RSA and ECC key breakable.

This is not a theoretical curiosity. It has direct consequences for every digital certificate in your infrastructure:

PQC addresses these threats by replacing the vulnerable mathematical foundations with problems that quantum computers cannot efficiently solve: structured lattices, hash functions, and error-correcting codes.

TLS certificates become forgeable

An attacker with a cryptographically relevant quantum computer (CRQC) could derive the private key from any RSA or ECC certificate, enabling man-in-the-middle attacks against every TLS connection using classical algorithms.

Code signing loses its guarantee

Code signing certificates rely on digital signatures to prove software integrity. If the signature algorithm is broken, previously signed software can no longer be trusted, and an attacker can sign malicious code with a forged key.

CA hierarchies collapse

If a root CA's private key can be derived, every certificate in the hierarchy becomes untrustworthy. The entire chain of trust must be rebuilt with quantum-resistant algorithms.

Harvest now, decrypt later

Nation-state adversaries are already intercepting and storing encrypted traffic today, intending to decrypt it once quantum computers are available. Data with a long confidentiality requirement, government communications, health records, financial transactions, trade secrets, is already at risk.

The NIST PQC Standards

After an eight-year evaluation process that began with 82 candidate submissions, NIST has standardized four post-quantum algorithms across three use cases. Understanding these standards is essential for planning your migration.

### FIPS 203: ML-KEM (Module-Lattice-Based Key Encapsulation)

ML-KEM, derived from the CRYSTALS-Kyber submission, is the standard for key encapsulation, the mechanism used to establish shared secrets in protocols like TLS. When a client and server perform a TLS handshake, they use a key encapsulation mechanism (KEM) to agree on a symmetric encryption key. ML-KEM replaces the ECDH key exchange that TLS currently uses.

ML-KEM is defined at three security levels:

The key trade-off with ML-KEM is size. A ML-KEM-768 public key is 1,184 bytes compared to 32 bytes for X25519. This impacts TLS handshake size and, in constrained environments, may affect latency. In practice, for server-to-server and browser-to-server TLS, the overhead is manageable. For IoT devices and embedded systems, it requires careful evaluation.

### FIPS 204: ML-DSA (Module-Lattice-Based Digital Signature Algorithm)

ML-DSA, derived from the CRYSTALS-Dilithium submission, is the primary standard for digital signatures. It replaces RSA and ECDSA for signing certificates, code, documents, and any other data that requires authentication and integrity verification. ML-DSA is the algorithm that will appear in your PQC certificates.

ML-DSA is also defined at three security levels:

For comparison, an RSA-2048 signature is 256 bytes and an ECDSA P-256 signature is 64 bytes. ML-DSA signatures are significantly larger, which affects certificate chain size, CRL size, and OCSP response size. Organizations should model these impacts on their specific infrastructure before deploying.

### FIPS 205: SLH-DSA (Stateless Hash-Based Digital Signature Algorithm)

SLH-DSA, derived from SPHINCS+, is a hash-based signature scheme. Its security relies solely on the well-understood properties of hash functions, making it a conservative alternative to lattice-based schemes. If a breakthrough were to weaken lattice-based cryptography, SLH-DSA would remain secure.

The trade-off is performance. SLH-DSA signatures range from 7,856 to 49,856 bytes depending on the parameter set, and signing is significantly slower than ML-DSA. SLH-DSA is best suited as a backup algorithm and for use cases where long-term signature validity is paramount, such as root CA certificates and firmware signing.

### FIPS 206: FN-DSA (FFT over NTRU-Lattice-Based Digital Signature Algorithm)

FN-DSA, derived from the FALCON submission, is expected to be standardized as FIPS 206. It offers significantly smaller signatures than ML-DSA (approximately 666 bytes at Security Level 1), making it attractive for bandwidth-constrained applications. However, its key generation process is complex and requires careful constant-time implementation to avoid side-channel attacks. FN-DSA will complement ML-DSA rather than replace it, serving use cases where signature compactness is critical.

ML-KEM-512

Targets NIST Security Level 1 (equivalent to AES-128). Smallest key sizes and fastest performance. Suitable for most general-purpose TLS deployments.

ML-KEM-768

Targets NIST Security Level 3 (equivalent to AES-192). The recommended default for enterprise deployments, balancing security margin with acceptable performance overhead.

ML-KEM-1024

Targets NIST Security Level 5 (equivalent to AES-256). Largest key sizes but highest security margin. Required by some government and defense use cases.

The Quantum Threat Timeline

Estimating when a cryptographically relevant quantum computer will exist is inherently uncertain. However, the risk calculus does not depend on knowing the exact date.

NIST, NSA, and CISA have all issued guidance urging organizations to begin migration planning immediately. The U.S. National Security Memorandum NSM-10 sets a 2035 target for federal agencies to complete PQC migration. The European Union's cybersecurity agency ENISA has issued similar recommendations.

1

Current state (2024-2026)

The largest quantum computers have around 1,000 noisy qubits. Running Shor's algorithm against RSA-2048 is estimated to require roughly 4,000 logical qubits, which translates to millions of physical qubits with current error rates. No one can break production cryptography today.

2

Near-term (2027-2030)

Quantum hardware is advancing rapidly. IBM, Google, and several national programs are targeting error-corrected systems in this timeframe. While breaking RSA-2048 by 2030 remains unlikely, the possibility is no longer dismissed by credible researchers.

3

Medium-term (2030-2035)

Many forecasts converge on this window as the period of highest risk. A 2023 Global Risk Institute survey found that a majority of quantum computing experts now assign a greater-than-50% probability to a CRQC existing by 2035.

4

The harvest-now problem is already here

Regardless of when a CRQC arrives, data encrypted today with classical algorithms and intercepted by adversaries can be stored indefinitely. If your data must remain confidential for 10 or more years, and your adversary is a nation-state, the migration deadline is not the CRQC arrival date. It is today.

Crypto-Agility: The Foundation for PQC Migration

Migrating to PQC is not a one-time key swap. It is an ongoing capability that your infrastructure must support. This capability is called crypto-agility: the ability to discover, evaluate, and replace cryptographic algorithms across your entire estate without rebuilding systems from scratch.

Without crypto-agility, a PQC migration requires touching every system individually, updating configurations by hand, and coordinating changes across teams with no central visibility. With crypto-agility, you maintain a living inventory of every algorithm in use, automate certificate reissuance, and enforce policy centrally.

Key requirements for crypto-agile PQC migration include:

For a detailed treatment of building crypto-agility into your organization, including governance frameworks, tooling requirements, and process design, see the dedicated crypto-agility guide.

Algorithm-agnostic PKI

Your PKI platform must support issuing certificates with new algorithms without requiring a platform replacement. If your CA can only issue RSA and ECDSA, you will need a new CA for PQC.

Centralized certificate inventory

You must know where every certificate is deployed and what algorithm it uses. A comprehensive certificate lifecycle management platform is the prerequisite for any migration at scale.

HSM readiness

Your hardware security modules must support PQC algorithms. Verify that your HSM vendor's firmware roadmap includes ML-KEM and ML-DSA support, and that upgrades are covered by your maintenance contract.

Hybrid certificate support

During the transition, you will need certificates that contain both a classical and a PQC key, ensuring backward compatibility with systems that do not yet support PQC while providing quantum resistance for those that do.

Inventory and Risk Assessment

Before deploying any PQC certificate, you need a complete understanding of your current cryptographic posture. This assessment is the foundation of your migration plan.

1

Discover all cryptographic assets

Use your certificate management platform to scan every environment: cloud infrastructure, on-premises servers, container orchestrators, network appliances, IoT devices, and code signing pipelines. Identify every certificate, every key, and every algorithm in use. Pay special attention to long-lived assets: root CA certificates, document signing keys, and encrypted archives.

2

Classify by quantum risk

Not all assets face the same risk. Prioritize based on two factors: (1) how long the data must remain confidential, and (2) how long the asset will remain in service. A VPN encrypting classified data with a 25-year confidentiality requirement is at immediate risk from harvest-now attacks. A short-lived TLS certificate protecting a public marketing website is lower priority.

3

Map algorithm dependencies

For each system, identify which cryptographic operations it performs and which algorithms it supports. Document TLS libraries and versions, cryptographic APIs, HSM firmware versions, and application-layer encryption. This dependency map tells you which systems can adopt PQC today and which require upstream updates first.

4

Identify interoperability constraints

PQC migration does not happen in isolation. Your certificates must be accepted by partners, clients, browsers, and third-party systems. Map your certificate trust relationships and identify which counterparties support PQC. Standards bodies like the CA/Browser Forum are developing PQC requirements for publicly trusted certificates, but the timeline for browser trust store adoption is still evolving.

5

Quantify the gap

Produce a clear report: total number of assets using classical-only algorithms, broken down by risk tier. This becomes the scope of your migration program and the basis for resource allocation.

Pilot Deployment with Hybrid Certificates

Hybrid certificates are the bridge between today's classical PKI and a fully post-quantum infrastructure. A hybrid certificate contains two key pairs: one classical (RSA or ECDSA) and one PQC (ML-DSA). Systems that support PQC validate the PQC signature; systems that do not fall back to the classical signature.

This approach eliminates the need for a hard cutover and allows gradual, low-risk migration.

1

Select a pilot scope

Start with internal, non-customer-facing services where you control both endpoints. Mutual TLS between microservices, internal API gateways, and development environments are ideal candidates. Avoid starting with public-facing TLS, which depends on browser and client support you do not control.

2

Prepare your CA infrastructure

Your issuing CA must support PQC key types. If your current CA does not, deploy a dedicated PQC-capable issuing CA under your existing root hierarchy. Ensure the CA's HSM firmware supports ML-DSA key generation and signing. Generate the PQC issuing CA key inside the HSM.

3

Issue hybrid certificates

Configure your CA to issue certificates containing both an ECDSA and an ML-DSA key. The certificate profile should include both signature algorithms so that relying parties can choose the strongest algorithm they support. Test the certificate chain validation end-to-end.

4

Measure and validate

Monitor the pilot for performance impact. Measure TLS handshake latency (expect 1-3ms increase due to larger key exchange and signatures), certificate chain validation time, bandwidth consumption from larger certificates and CRLs, and application compatibility. Document any issues for remediation before expanding scope.

5

Expand incrementally

Based on pilot results, extend PQC hybrid certificates to additional internal services, then to partner-facing integrations where you can coordinate with counterparties, and finally to public-facing services once browser and OS support matures.

The 24-Month PQC Transition Roadmap

A practical PQC migration cannot be completed in a single sprint. The following roadmap provides a structured 24-month plan that balances urgency with operational reality.

1

Months 1-3: Foundation

Complete the cryptographic inventory and risk assessment described above. Establish a PQC migration working group with representatives from security, infrastructure, development, and compliance. Define your organization's risk tolerance and prioritization criteria. Assess HSM vendor PQC readiness and initiate firmware upgrade plans.

2

Months 4-6: Lab and Proof of Concept

Stand up a PQC test environment with a PQC-capable CA. Generate ML-KEM and ML-DSA key pairs. Issue test certificates and validate them across your technology stack. Identify libraries and applications that need updates to support PQC. Begin testing hybrid TLS handshakes.

3

Months 7-12: Internal Pilot

Deploy hybrid certificates on selected internal services. Monitor performance and compatibility. Train operations teams on PQC certificate management. Update incident response procedures to account for PQC-specific scenarios. Begin integrating PQC certificate issuance into your automated certificate lifecycle management workflows.

4

Months 13-18: Controlled Expansion

Extend PQC hybrid certificates to additional internal services and partner-facing systems. Coordinate with key partners and vendors on PQC interoperability testing. Migrate high-risk assets identified in your risk assessment (long-lived keys, high-confidentiality data channels). Update compliance documentation and audit procedures.

5

Months 19-24: Production Readiness

Establish PQC as the default algorithm for new certificate issuance where endpoints support it. Plan for classical algorithm deprecation timelines. Prepare for public-facing PQC deployment as browser and OS support matures. Document lessons learned and update your crypto-agility processes for the next algorithm transition, because there will be one.

How we help

Evertrust & PQC: A Practical Guide for Security Leaders

PQC-ready certificate authorityEvertrust PKI supports post-quantum algorithm issuance, enabling you to generate ML-DSA certificates and hybrid certificates from a CA platform designed for algorithm agility.

Complete cryptographic inventoryEvertrust CLM discovers every certificate across your infrastructure and classifies them by algorithm, key size, and issuer, giving you the visibility you need to scope and execute a PQC migration.

Automated lifecycle management at scaleWhen you are ready to reissue thousands of certificates with PQC algorithms, Evertrust automates the full lifecycle through ACME, EST, SCEP, and CMP, ensuring migration does not become a manual bottleneck.

Policy enforcement for PQC complianceDefine organizational policies that mandate PQC algorithms for new issuance, enforce minimum security levels, and block deprecated classical algorithms, all enforced automatically before certificates are issued.

Hybrid certificate supportEvertrust enables you to issue hybrid certificates that contain both classical and post-quantum key pairs, allowing gradual migration without breaking backward compatibility.