ĢƵ

ĢƵ Allen insights about how enterprises can achieve post-quantum cryptography

From the Frontlines of Post-Quantum Cryptography

VELOCITY V3. 2025 | Taylor Brady, Jordan Kenyon, and Derek Aucoin

Safeguarding critical infrastructure from evolving cyber threats

Transitioning to post-quantum cryptography (PQC) will be one of the defining cybersecurity challenges of the next decade. The National Institute of Standards and Technology’s (NIST) are finally here. They outline the implementation requirements and specifications for the approved quantum-resistant algorithms. Still, implementing PQC will be a complex process. The Office of Management and Budget (OMB) estimates that between now and 2035, PQC transitions will cost federal agencies over $7 billion. That estimate explicitly excludes national security systems and does not account for the costs of PQC adoption in the commercial sector. It is difficult to understate the magnitude of this transition.

Quantum computers will eventually break nearly all currently deployed public key cryptography—the algorithms embedded deep into hardware, software, and digital protocols that protect networks from threat actors. It is a question of when not if. Significant engineering challenges must still be overcome before quantum computers can reach the scale and robustness needed to run algorithms that threaten public key cryptography. Despite these hurdles, many commercial roadmaps predict that such devices could become available near 2030.

This accelerated timeline increases the pressure on organizations to transition to NIST’s new PQC standards as quickly as possible. The urgency is even greater for organizations with sensitive datasets that have longer security shelf lives. Such data may already be the target of “Hold Now, Decrypt Later” (HNDL) attacks, in which a nation-state or criminal organization breaks into a network, steals encrypted data, and stores that data on its own servers knowing that it will be able to access it once quantum computers capable of breaking through public key cryptography are available. The Center for Strategic and International Studies has , further underscoring why federal agencies should not wait to start moving to PQC.

Though a growing number of federal requirements have started to structure how agencies approach PQC, the roadmap to achieving it is not as linear as it may seem. Federal chief information security officers (CISOs) have broad discretion to design PQC strategies that align with their agency’s unique attack surface and threat vectors. Commercial companies have even greater discretion. In practice, this means that where organizations start their journeys to PQC is not as important as how they accomplish each phase.

Fortunately, the experiences of early adopters offer key lessons for enterprises embarking on the three core stages of preparing for PQC: cryptographic discovery, prototyping, and agility.

The Basics of PQC

1. Quantum computers will eventually break nearly all currently deployed public key cryptography.

This is why it’s imperative for government agencies and private companies to start taking steps toward protecting their assets with new cryptographic algorithms.

2. Post-quantum cryptography (PQC) refers to the implementation of algorithms capable of withstanding a cryptanalytic attack by a quantum computer.

It is the best defense currently available to address the cyber threat posed by large-scale quantum computers. However, implementing PQC won’t be easy and organizations must begin taking action immediately.

3. Transitioning to PQC is especially urgent for certain federal and commercial organizations given the risk of HNDL attacks

With a HNDL attack, an adversary acquires information that has not yet been resecured with PQC and stores those assets until a quantum computer capable of breaking that encryption becomes available.

Cryptographic Discovery: Mapping the Attack Surface

Cryptographic discovery is the process of creating an actionable, prioritized cryptographic inventory by detecting, tracing, and rating the cryptography in use throughout an enterprise based on its security in the post-quantum era. Cryptographic discovery is an intuitive goal, but it can be extremely difficult to achieve. Common cybersecurity tools detect cryptography by design, but they do not catalog vulnerable cryptography to enable prioritization and remediation. For this reason, most tools are ill-equipped to provide the visibility organizations need into cryptographic vulnerabilities driven by emerging quantum computing technologies.

Many new products are emerging in the market to address this gap, but adding additional security tools comes at a price, increasing both the total cost of migration and the time it takes to complete the migration. That is time many organizations don’t have given the risks of “Hold Now, Decrypt Later” attacks and resources they may not need to expend. Rather than purchasing new products, some organizations are turning to novel data engineering methods to overcome common cryptographic discovery challenges.

Case Study

When the U.S. government raised the alarm on the criticality of PQC in 2022 through National Security Memorandum 10, the , and OMB’s Memorandum on Migration to PQC, one Fortune 10 retail company took note. They found that investing in a scalable, production-grade analytics platform to dynamically discover cryptography across their large, federated systems enabled them to understand their risk exposure without the need for new cyber telemetry.

Extract, transform, load (ETL) pipelines were used to optimize the use of cryptographic metadata from existing sensors and maintain traceability to certificates and unique connections. As a result, security leaders across the organization could use the dashboard to see a real-time snapshot of cryptographic strength across the network and analysts could trace vulnerable cryptography back to its source for remediation, submit custom queries, and expand the discovery tool’s coverage to new network boundaries.

Summary

1. Start small: Define a priority network for an initial cryptographic discovery initiative, recognizing that everything cannot be transitioned all at once.

2.Optimize reuse: Extract cryptographic data from existing sensors on the network to increase speed-to-solution and avoid added infrastructure costs and complexity.

3.Engineer for flexibility: Invest in a scalable platform that can be used for both initial inventories during PQC planning and ongoing monitoring during PQC implementation.

Prototyping: Putting PQC to the Test

Cryptographic discovery is a common starting point in the journey to post-quantum security, but it isn’t the only place an enterprise can take its initial steps toward PQC. Discovery allows organizations to achieve breadth in PQC planning; prototyping enables depth. Prototyping focuses on modeling and measuring the performance and interoperability impacts of transitioning to PQC.

The math behind PQC is fundamentally different than that of legacy public key cryptography. Higher computational complexity makes PQC a robust defense against quantum attacks. It also introduces network and infrastructure challenges such as increased latency, increased bandwidth, and lack of interoperability. Understanding the impact of these challenges is important to inform procurement decisions, implementation decisions, and algorithm selection in use cases with multiple PQC algorithms, such as digital signatures.

Case Study

A federal agency responsible for securing critical networks was especially attuned to the importance of performance and interoperability during their PQC transition. They needed a prototype system to provide quantifiable performance and interoperability test results, including impacts on existing hardware and software.

The agency used a test harness to help quantify the effects of PQC by simulating multiple connections and executing test scenarios that varied network traffic, bandwidth constraints, and algorithms used throughout the connection across authentication and transport layer security (TLS) negotiations. A dashboard automatically visualized searchable results. This enabled analysts to understand how negotiations would default to classical algorithms when an endpoint was not configured for PQC; identify the effects of hybrid certificate chains; and quantify the overhead cost and impact on the network.

Summary

1. Develop reference architectures: Determine where cryptography is used in a priority use case to define prototype implementation, showcase vendor dependencies, and outline interoperability requirements.

2. Establish a reusable test environment: Establish a laboratory environment that can simulate hybrid and full PQC solutions to determine optimal algorithm selection and implementation.

3.Engineer a PQC prototype: Assess hardware and software limitations performance impacts, and interoperability across the identified use case.

Cryptographic Agility: Optimizing for Continuous Security

Since the 1970s, public key algorithms have secured our digital lives. These unintrusive protections have been embedded deep into hardware, software, and digital protocols. But agility and governance were not baked into design decisions about cryptographic implementation. Hardware vendors integrated cryptography in ways that often prevent it from being updated without replacing an entire chip. Software vendors didn’t track the cryptography throughout the different layers of their applications. These vendors did not imagine a future where the underlying math behind every public key cryptographic algorithm would be vulnerable to attack. Yet that is the reality today, and it requires enterprises to adopt new PQC standards.

Now, NIST’s initial PQC standards (published in August 2024) provide the best available approach to defend against the quantum threat. However, it is possible that future technology advances could make those standards vulnerable to attack. It is also possible that additional and forthcoming PQC standards could offer performance advantages over NIST’s initial standards.

This is where cryptographic agility comes into play. Cryptographic agility refers to the ability to rapidly find, monitor, update, and replace cryptography. It addresses an enterprise’s capacity to navigate future cryptographic changes. This agility is essential for PQC, but its significance extends beyond post-quantum cybersecurity. When undertaken proactively and in concert with other cyber modernization priorities, PQC strategies that emphasize agility can increase the overall effectiveness and efficiency of organizations’ procurement decisions.

Case Study

A defense customer recognized the need to invest early in PQC to safeguard their infrastructure during high-impact missions. They were already transforming larger cyber operations in areas like zero trust and cryptographic modernization, but they knew these initiatives did not address PQC. These larger efforts can involve the purchase of new, expensive, built-to-last equipment, such as tactical radios and encryptors. Streamlining these decisions to include PQC considerations stood to increase the efficiency and effectiveness of their procurement in the long run, reduce unnecessary purchases, and prevent vendor lock-in with solutions that were not actively preparing for the PQC transition. They needed to develop a plan for cryptographic agility.

Convening internal and external stakeholders, the agency cataloged cryptographic dependencies across vendor and legacy equipment; monitored the existing, new, and potential cryptographic implementations; and inventoried replacement options for capabilities that could not support PQC algorithms.

Summary

1.Integrate PQC into ongoing cybersecurity modernization: Define how PQC aligns with future security architectures to buy down future technical debt and enable rapid adoption.

2.Enumerate procurement policy impacts: Make PQC a priority with vendors to prevent lock-in with products that lack PQC transition plans.

3.Establish strategies for infrastructure management and policy enforcement: Enable knowledge transfer to enforce governance throughout the transition.

There Is No Wrong Place to Start the Urgent Transition to PQC

The path to PQC can be flexible, but it is a critical defense that cannot be ignored. Every enterprise can align its approach to address priority threat vectors. These case studies demonstrate the primary effects organizations have seen in their migrations to date. For some, the initial focus was resolving the gap in capabilities that would enable them to quantify their quantum attack surface (prompting cryptographic discovery). For others, it was the possibility that insufficient performance and interoperability testing could lead to network failures in mission-critical environments (prompting PQC prototyping). Others recognized that failing to include PQC in ongoing initiatives could cost millions (prompting cryptographic agility).

Cybersecurity leaders benefit from broad discretion in how they begin their PQC journeys, but organizations must begin now to defend against advanced cybersecurity adversaries and continuously evolving threats.

Key Takeaways

  • CISOs must design unique PQC transition roadmaps that align with their agency’s attack surface and threat vectors.
  • Enterprises can avoid added infrastructure costs and increase speed-to-solution by extracting cryptographic data from existing network sensors and analyzing that data in novel ways to enable PQC migration.
  • Integrating PQC transition plans with other cyber modernization efforts is critical to prevent vendor lock-in with solutions that are not actively preparing for the PQC transition.

Meet the Authors

Taylor Brady

leads ĢƵ Allen’s post-quantum cryptography engagements and investments, specializing in technical adoption and business development.

Jordan Kenyon

leads growth and operations for ĢƵ Allen’s quantum technology portfolio, which focuses on the new paradigms that quantum introduces for computing, sensing, and communications.

Derek Aucoin

leads secure product and application development for ĢƵ Allen's global commercial practice.

References

“Announcing Approval of Three Federal Information Processing Standards (FIPS) for Post-Quantum

Cryptography,” National Institute of Standards and Technology, updated August 26, 2024, .

Jordan Kenyon and J.D. Dulny, “In the Quantum Era, Cybersecurity Is a Race Against the Clock,” Federal News

Network, July 8, 2022, .

Jordan Kenyon and Taylor Brady, “5 Steps for Implementing the New Post-Quantum Cryptography Standards,”

Information Week, September 5, 2024, .

Jordan Kenyon and Taylor Brady, “Cybersecurity in the Quantum Risk Era,” ĢƵ Allen Hamilton, accessed December 2, 2024, /insights/ai-research/cybersecurity-in-the-quantum-risk-era.html.

Quantum Computing Cybersecurity Preparedness Act, H.R. 7535, 117th Cong. (2022) (enacted), .

VELOCITY MAGAZINE

ĢƵ Allen's annual publication dissecting issues at the center of mission and innovation.

Subscribe

Want more insights from Velocity? Sign up to receive more stories about emerging technologies and the impacts they’re making on missions of national importance.



1 - 4 of 8