Despite large scale quantum computing being several years away from being a practical reality, federal government experts are deservedly concerned about the cybersecurity implications today.
Federal agencies need to start their quantum safe transition strategy now.
This was underscored in May 2022, when the National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems (NSM 10) provided requirements and timelines for Quantum-Resistant Cryptography. In particular, the memo notes that “America must start the lengthy process of updating our IT infrastructure today to protect against this quantum computing threat tomorrow.”
The memo continues by underscoring that, “Central to this migration effort will be an emphasis on cryptographic agility, both to reduce the time required to transition and to allow for seamless updates for future cryptographic standards.”
Today’s non-PQ (post-quantum) encryption absolutely will break (or be broken) in the future, affecting security aspects such as authentication, code-signing, and digital signatures.
The Quantum Challenge: Data’s Necessary Expiration Date
Today’s encrypted data has an expiration date. All data that is encrypted today using classic PKI-based cryptography is quantum vulnerable, with little if any protection against potential vulnerabilities that may become apparent later. Meanwhile, however, all of that data also has a time for which it must remain secure.
The data that we encrypt today is already decaying, because its risk of exposure increases over time. When encrypted data (using current algorithms) is transmitted over the network it becomes vulnerable to interception. Anyone with access to that data through surveillance, eavesdropping, or hacking can harvest the data and store it until such a time that a quantum computer can decrypt it.
Recommended Quantum Safe Transition Strategy
When preparing for a quantum-safe encryption strategy, there are four things to keep in mind:
1. Quantum is coming. National Security Memo 10 emphasized the United States’ commitment to continued technological and scientific leadership in quantum computing. Alongside the potential benefits of quantum computing are the acknowledged risks to the economy and national security since quantum computing will make PKI-based classic cryptography obsolete. NIST has recently concluded a six-year effort and announced its selection of four quantum-safe algorithms designed to resist attacks from future quantum computers.
2. Know your risks. As we’ve already explained, long-term data is at risk to harvesting and early attacks. IT managers and other network professionals must assess their organizations’ use of vulnerable cryptography, the expiration date of their encrypted data, and the crypto-agility maturity of their IT infrastructure.
Several sources are available to understand risks and to plan ahead. NIST offers a publication titled “Getting Ready for Post-Quantum Cryptography” to help monitor standards development, and perform risk assessment of where public-key crypto may be used in the infrastructure. It’s essential to understand whether a network’s equipment is crypto-agile.
The National Cybersecurity Center of Excellence (NCCoE) has recently launched its “Migration to Post Quantum Cryptography” Project. Understanding that replacement of cryptographic algorithms is both technically and logistically challenging, the NCCoE is undertaking a practical demonstration of technology and tools that can provide a head start on executing a migration roadmap in collaboration with a public and private sector community. Thales Trusted Cyber Technologies is among the handful of technology collaborators selected to participate in this project.
Another excellent source of information is the NSA Post-Quantum Cryptography FAQ, which provides an excellent summary on the subject.
3. Focus on crypto-agility. This requires flexible upgradeable technology and a hybrid approach of classic and quantum-resistant crypto solutions.
Remember that crypto-agility is not about quantum; it’s about being able to face the reality that all algorithms fail with time. Many systems today make it difficult to rotate keys, to choose different sizes/parameters, and to change mechanisms or key algorithms. These are all required for protocols to be versioned, negotiated and not to fail when presented with unknown options. They are essential for crypto-agility, and it’s important to work with providers with solutions that embrace those needs.
4. Start today. This cannot be under-stated, which is why National Security Memo 10 made a point of it. Organizations must begin to design a quantum-resistant architecture today to protect against the emerging quantum threat. With IT infrastructure equipment often being deployed for years or decades without hardware replacement, it is important to make sure currently deployed hardware was developed with crypto-agility principles in mind, to receive software or firmware updates once post-quantum crypto algorithms and protocols are standardized. It is also important to check with equipment providers to see what beta or technology preview firmware they have available for testing in non-production systems, that implements pre-standardized quantum-resistant cryptographic algorithms. Testing will help identify performance or interoperability issues early and provide time to address the issues and mitigate the identified risks.
Securing the Future: Navigation Post Quantum Cryptography Standards
Thales TCT joins NG/FCW and government leaders to share actionable strategies and resources for navigating this evolving landscape, empowering organizations to safeguard against emerging cyber risks. This discussion will explore the latest initiatives, offering practical insights on implementing PQC standards to protect sensitive data.
Thales TCT Quantum-Ready Solutions

Luna T-Series HSMs are the choice for government agencies when storing, protecting and managing cryptographic keys used to secure sensitive data and critical applications. Meeting government mandates for U.S. Supply Chain, the high-assurance, crypto-agile, tamper-resistant Luna T-Series HSMs are designed, developed, manufactured, sold, and supported in the United States.
Protect Encryption Keys with T-Series Luna Hardware Security Modules
Quantum Resistant Algorithms
Luna T-Series HSMs (v 7.13.0 forward) now include pre-standards implementations of NIST-selected PQC algorithms and stateful hashed-based signature algorithms.
The algorithms supported are:
- CRYSTALS-Dilithium (ML-DSA)
- CRYSTALS-KYBER (ML-KEM)
- FALCON (FN-DSA)
Additionally, Thales TCT is introducing the Leighton-Micali Signature (LMS) stateful hash-based signature mechanism, along with its multi-tree variant, the Hierarchical Signature Scheme (HSS). LMS/HSS enables customers to transition to quantum-resistant firmware/software signing. The Luna T-Series HSM implementation of LMS is compliant with SP 800-208 and PKCS#11 v3.1.
Quantum Enhanced Keys
By embedding a quantum random number generator (QRNG) chip within the Luna HSM, Thales TCT is offering the industry’s first FIPS 140-2 compliant HSM capable of generating quantum enhanced keys. Using principles of quantum physics, the QRNG chip produces high quality entropy which is the basis for all random numbers and cryptographic keys generated by the HSM. With a choice of operating the HSM in FIPS-approved mode using either the embedded, classic physical RNG or the embedded quantum RNG, customers can dynamically change between classical key generation and quantum enhanced keys as threats emerge over time.
Quantum Random Number Generation
QRNG complements post quantum cryptography and is part of a crypto-agile strategy. Thales TCT’s Luna T-Series HSMs contain an embedded QRNG chip for high quality entropy based on quantum noise.
All keys and random numbers generated within the HSM are enhanced by the security of the quantum random numbers that are the foundation of the key generation process.
Secure Data in Transit with High Speed Encryptors (HSE)
Quantum Resistant Algorithms
Thales HSEs include a framework to support QRA via firmware upgrade. Thales HSE solutions support all four NIST Quantum Resistant Public Key algorithms (finalists) in all products (plus other non-finalist algorithms).
Quantum Key Distribution
Thales HSEs are quantum-ready and QKD compatible for more than a decade.
Quantum Random Number Generation
Quantum Random Number Generation is integrated into the HSE solution.

Thales HSE network encryption solutions support Post-Quantum Cryptography with a crypto-agile, FPGA-based architecture.
Featured Resources
Resources
Image | Title | Link |
---|---|---|
Washington Technology Commentary: Why post-quantum security planning must start today | ||
GovLoop Blog Post: Quantum-Safe Encryption: What It Means, and Why Agencies Should Care | ||
On Demand GovLoop Webinar: Taking a Realistic Look at Quantum Computing in Government | ||
GovLoop Video: Quantum-Safe Encryption: Understanding the What, Why and How | ||
Govloop Video Interview: Quantum-Safe Encryption: What It Means, and Why Agencies Should Care | ||
CTO Sessions On Demand: Best Practices for Implementing Quantum-Resistant Security | ||
Securing the Future: Navigation Post Quantum Cryptography Standards | ||
FedNewsNetwork Video Interview: Preparing for the intersection of AI, quantum computing | ||
FedNewsNetwork Commentary: Preparing for the intersection of AI, quantum computing | ||
Blog Post: PQC Standards Released – Start Today | ||
CTO Sessions: Quantum Resistant Security | ||
The Dual Faces of Quantum Computing: Opportunities and Threats in National Security | ||
CTO Sessions Webcast: Word on the Street – 2024’s Top Tech Trends | ||
White Paper: Quantum Resistant Code Signing Secured by Hardware Security Modules | ||
CTO Sessions On Demand: Are You Quantum Ready? | ||
Quantum Enhanced Keys Solution Brief |