Qujata Logo
INFORMATIONAL RESOURCE

Post-Quantum Cryptography Roadmap Infographic

Published: June 2021
Source: Department of Homeland Security & NIST
Purpose: This infographic provides a visual representation of the steps organizations should take to prepare for post-quantum cryptography implementation, from assessment to migration.

Infographic Overview

This infographic outlines a recommended roadmap for government agencies, critical infrastructure providers, and private organizations to prepare for the transition to post-quantum cryptography. It explains the timeline of quantum computing threats, actions to take now, and how to prepare systems for future standards.

Post-Quantum Cryptography Transition Roadmap

1
Assess
2
Plan
3
Implement
At Risk:
  • Public Key Infrastructure (PKI)
  • VPN/Remote Access
  • Digital Signatures
  • Key Exchange Protocols
PQC Solutions:
  • Lattice-based: ML-KEM/Kyber
  • Hash-based: SPHINCS+
  • Module-LWE: Dilithium
  • Hybrid Approaches
© 2021 Department of Homeland Security & National Institute of Standards and Technology

Key Components of the Roadmap

Phase 1: Assessment

Inventory & Discovery
  • Identify cryptographic assets
  • Catalog vulnerable algorithms
  • Map data security requirements
  • Assess system dependencies

Phase 2: Planning

Roadmap Development
  • Prioritize critical systems
  • Develop transition strategy
  • Engage with vendors
  • Build cryptographic agility

Phase 3: Implementation

Migration & Validation
  • Deploy PQC algorithms
  • Test & validate security
  • Verify interoperability
  • Monitor performance

Transition Challenges & Solutions

ChallengeImpactRecommended Solution
Legacy SystemsMay not support new algorithmsPrioritize replacement or isolation strategies
InteroperabilitySystems with different migration timelinesImplement hybrid cryptography approaches during transition
Performance ConcernsPQC algorithms may require more resourcesBenchmark early, update hardware where needed
Supply Chain IssuesVendor dependencies and supportEngage vendors early, request roadmaps

Cryptographic Inventory Checklist

Key Systems to Assess
  • Public Key Infrastructure (PKI)
  • VPN and Remote Access Solutions
  • Secure Email Systems
  • Digital Signature Implementations
  • Authentication Systems
  • TLS/SSL Implementations
  • Secure Boot Systems
  • Code Signing Infrastructure
  • IoT Security Controls
  • Data Encryption Systems

NIST Timeline for Standardization

2016-2020
Selection Round
2020-2022
Finalist Round
2022-2024
Standards Development
2024-2030
Implementation
Note: Timeline is approximate and subject to change based on NIST's standardization process

Related Resources

Download Options: This infographic is available in digital format only. For accessibility needs or to request alternative formats, please contact pqc-support@dhs.gov.