Transition tracker
PQC timeline
Tracking the post-quantum cryptography transition from NIST competition through global migration. Based on NCSC UK guidance, NIST milestones, and industry developments.
Upcoming milestones
NCSC Phase 1: Discovery & Planning Complete
NCSC target for organizations to complete cryptographic inventory of their entire IT estate, define migration goals, create initial migration plans, map supplier dependencies, and identify investment requirements.
Source →NCSC Phase 2: High-Priority Migration & Infrastructure Ready
NCSC target for executing highest-priority migration activities protecting critical assets, preparing infrastructure for post-quantum future, refining the migration roadmap to 2035 completion, and beginning cryptographic implementation testing.
Source →NCSC Phase 3: Full PQC Migration Complete
NCSC target for completing migration to PQC across all systems, services, and products. Traditional public key cryptography support deprecated. Full quantum-secure infrastructure achieved.
Source →Historical record
2025 3 milestones
NCSC publishes PQC migration timelines
regulationThe UK National Cyber Security Centre publishes official timelines for migration to post-quantum cryptography, setting three milestones: discovery and planning by 2028, high-priority migration by 2031, and full PQC migration by 2035.
Source →NIST Selects HQC as Additional KEM Standard
standardNIST announces the selection of HQC (Hamming Quasi-Cyclic) as a code-based key encapsulation mechanism for standardization, providing a backup KEM based on different mathematical assumptions than the lattice-based ML-KEM. HQC gives NIST a backup KEM whose security does not depend on lattice problems.
Source →Cloud providers expand PQC key agreement deployment
migrationMajor cloud providers expand post-quantum key agreement deployment across production TLS. By early 2025, approximately 38% of Cloudflare HTTPS connections use hybrid PQ key exchange. AWS, Google Cloud, and Azure have all deployed PQ-capable endpoints.
Source → 2024 4 milestones
NIST publishes draft IR 8547: PQC transition roadmap
standardNIST releases the initial public draft of IR 8547, outlining the transition from quantum-vulnerable cryptographic algorithms to post-quantum standards. The report proposes deprecating RSA-2048 and ECC P-256 by 2030, with full retirement of classical public-key algorithms by 2035.
Source →NCSC UK recommends ML-KEM-768 and ML-DSA-65
regulationThe UK National Cyber Security Centre updates its PQC whitepaper following NIST's FIPS finalization, recommending ML-KEM-768 for key encapsulation and ML-DSA-65 for digital signatures as the default parameter sets for most applications.
Source →FIPS 203, 204, 205 Finalized
standardNIST finalizes the first three post-quantum cryptographic standards: FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA).
Source →Chrome 124 enables hybrid PQ key exchange by default
migrationGoogle Chrome 124 enables X25519MLKEM768 hybrid key exchange by default for TLS connections, making post-quantum key agreement the default for the world's most-used browser. This is the largest production deployment of post-quantum cryptography to date.
Source → 2023 3 milestones
NCSC publishes PQC migration whitepaper
regulationThe UK National Cyber Security Centre publishes 'Next steps in preparing for post-quantum cryptography,' outlining recommended actions for organizations planning their migration to quantum-resistant algorithms.
Source →Draft FIPS 203, 204, 205 Published
standardNIST publishes initial public drafts of FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA) for public comment.
Source →RFC 9370: multiple key exchanges in IKEv2
standardThe IETF publishes RFC 9370, extending IKEv2 to support multiple key exchanges in a single SA setup. This enables hybrid post-quantum/classical key agreement for IPsec VPNs, allowing post-quantum KEMs to be combined with established ECDH exchanges.
Source → 2022 3 milestones
NSA Releases CNSA 2.0 Algorithm Suite
regulationThe National Security Agency publishes the Commercial National Security Algorithm Suite 2.0, mandating transition to post-quantum algorithms for National Security Systems. CNSA 2.0 specifies ML-KEM and ML-DSA as required algorithms, with timelines for adoption beginning in 2025.
Source →SIKE Cryptosystem Broken
researchResearchers Wouter Castryck and Thomas Decru publish an efficient key recovery attack against SIDH/SIKE, breaking the isogeny-based candidate in a single classical computation. This eliminates the only isogeny-based candidate from the NIST process and raises questions about the viability of isogeny-based constructions for standardization.
Source →NIST Selects First PQC Algorithms
standardNIST announces the selection of CRYSTALS-Kyber (key encapsulation), CRYSTALS-Dilithium, FALCON, and SPHINCS+ (digital signatures) for standardization.
Source → 2020 1 milestone
Round 3: 15 Candidates Advance
researchNIST selects 15 algorithms for the third round (7 finalists and 8 alternates) for deeper cryptanalysis and performance evaluation.
Source → 2019 1 milestone
Round 2: 26 Candidates Selected
researchNIST narrows the field to 26 candidate algorithms for further evaluation in the second round of the PQC standardization process.
Source → 2017 1 milestone
Round 1: 69 Submissions Received
researchNIST receives 69 valid submissions to the PQC standardization process, spanning lattice-based, code-based, hash-based, multivariate, and other approaches.
Source → 2016 1 milestone
NIST PQC Competition Announced
standardNIST initiates the Post-Quantum Cryptography Standardization Process, calling for submissions of quantum-resistant public-key cryptographic algorithms.
Source →