Updated March 2026

The State of Post-Quantum Cryptography 2026

A comprehensive overview of where the industry stands in the quantum transition — standards, algorithms, threats, and what organizations must do now.

Vulnerable Algorithms
48 of 58
common algorithms are NOT quantum-safe
Estimated CRQC Arrival
2028-2035
cryptographically relevant quantum computer
NIST PQC Standards
3
finalized (FIPS 203, 204, 205)
Avg. Quantum Breach Cost
$140M+
average potential quantum breach cost

NIST Post-Quantum Standards Timeline

The road from standardization to mandatory compliance.

2024
Finalized

FIPS 203, 204, 205 Finalized

NIST publishes ML-KEM (FIPS 203), ML-DSA (FIPS 204), and SLH-DSA (FIPS 205) as the first post-quantum cryptographic standards.

2025
In Progress

FIPS 206 (FN-DSA) Draft

NIST releases the draft standard for FN-DSA (Falcon), a lattice-based digital signature algorithm optimized for compact signatures.

2030
Upcoming

RSA/ECDSA Deprecation Deadline

NIST mandates that RSA and ECDSA must no longer be used for digital signatures in federal systems.

2033
Upcoming

CNSA 2.0 Full Compliance

NSA requires full compliance with the CNSA 2.0 suite for all National Security Systems, including ML-KEM-1024 and ML-DSA-87.

Algorithm Landscape

Of the 58+ commonly used cryptographic algorithms, the majority are vulnerable to quantum attack.

23
15
21
ClassificationCountExamples
Quantum Unsafe23RSA, ECDSA, ECDH, DH, DSA, EdDSA (classical)
Quantum Safe15ML-KEM, ML-DSA, SLH-DSA, FN-DSA, XMSS, LMS
Conditional21AES-256, SHA-384+, ChaCha20-Poly1305, HMAC-SHA-256

Industry Readiness Benchmarks

Average HNDL (Harvest Now, Decrypt Later) readiness scores by industry, based on cryptographic posture assessments.

Defense74/100
74
Government70/100
70
Healthcare64/100
64
Financial58/100
58
Technology50/100
50

Scores reflect the percentage of cryptographic assets that are quantum-safe or on a verified migration path. Higher is better.

The HNDL Threat

Harvest Now, Decrypt Later is not a theoretical risk — it is happening today.

How HNDL Works

Nation-state adversaries and sophisticated attackers are intercepting and storing encrypted communications today. While they cannot decrypt this data now, they are banking on future quantum computers to break the encryption.

Any data encrypted with RSA, ECDH, or other quantum-unsafe algorithms that needs to remain confidential for 5+ years is at risk right now — not when quantum computers arrive.

This is why NIST, NSA, and CISA have all issued urgent guidance: the migration to post-quantum cryptography must begin immediately.

Mosca's Inequality

If X + Y > Z, your data is already at risk.

X = Data shelf lifee.g. 10 years
Y = Migration timee.g. 5 years
Z = Time until CRQCe.g. 5-10 years
If X + Y > Z, adversaries harvesting your data today will be able to decrypt it before it loses value.

PQC Migration Roadmap

A four-phase approach to achieving post-quantum cryptographic readiness.

  • Foundation

    Months 1-3

    Cryptographic inventory, CBOM generation, HNDL risk scoring, and executive briefing.

  • Planning

    Months 4-9

    Prioritized migration roadmap, crypto-agility architecture, vendor coordination, and budget planning.

  • Implementation

    Months 10-36

    Algorithm migration, hybrid key exchange deployment, regression testing, and compliance validation.

  • Sustainment

    Ongoing

    Continuous monitoring, algorithm agility updates, new standard adoption, and recurring assessments.

Assess Your Quantum Risk Today

Get your organization's HNDL risk score, cryptographic inventory, and prioritized migration roadmap — starting with a free assessment.

NetflixOracleFigmaCoinbaseDellServiceNowAppleDeloitteNikeAWSJPMorgan ChaseT-MobileAtlassianBoschStripeL'OrealDatadogMicrosoftPalantirHPRobinhoodEYSonyCanvaVisaAutoCADDiscordBellAdobeCharles SchwabE*TRADENVIDIAGoogleJohnson & JohnsonFidelityClaudeMastercardIntuitBoeingAT&TShopifyPwCOpenAIKPMGIBMDatabricksSalesforceGitHubAmerican ExpressWorkday