Skip to content
ZeroTrace cybersecurity hardware and software
Back to Blog
Threat Brief

Post Quantum Migration Start Small

NIST finalized the core post-quantum standards — ML-KEM, ML-DSA, SLH-DSA — back in 2024. By early 2026, major browsers, CDNs, SSH implementations, and VPN vendors...

Post Quantum Migration Start Small - ZeroTrace blog image
April 21, 20263 min read478 words
Threat BriefThreat BriefPostQuantumMigration

2026 is when PQC stopped being theoretical

NIST finalized the core post-quantum standards — ML-KEM, ML-DSA, SLH-DSA — back in 2024. By early 2026, major browsers, CDNs, SSH implementations, and VPN vendors have shipped hybrid key exchange by default. The question is no longer "should we migrate." The question is "what is in our environment that is going to block the migration."

The teams getting this right are the ones treating it as an inventory problem first and a cryptography problem second.

Harvest-now, decrypt-later is not a hypothetical

Assume that any TLS session, VPN tunnel, encrypted backup, or signed release from before hybrid PQC is a future plaintext exposure for anything with a long confidentiality horizon. Client PII, trade secrets, unreleased source, legal correspondence, and long-lived session tokens all fall into that bucket.

For most teams that means two tracks:

  • Data with a short confidentiality horizon can wait for normal vendor upgrade cycles
  • Data that must stay confidential for 10+ years needs a migration plan on the calendar now, not a research spike "when we have time"

The cryptographic inventory is the hard part

The hard work is rarely the math. It is finding every place your systems do a handshake, sign a thing, or store a key. In a typical mid-sized environment that list includes TLS terminators, load balancers, internal service meshes, message queues, code-signing pipelines, container registries, SSH bastions, backup encryption, disk encryption, hardware tokens, document signing, email S/MIME, VPN concentrators, and anything that speaks mTLS.

Most of those will migrate when the vendor migrates. A few will be stuck on legacy code that the original author left the company in 2019.

A practical starting move

Pick one system. Ideally a public-facing TLS endpoint. Turn on hybrid key exchange, confirm the handshake works across the clients that actually connect, log the negotiated groups for a week, and see what breaks. You will learn more about your real crypto posture in that week than in three months of spreadsheet work.

From there, the migration pattern repeats: measure, enable hybrid, confirm compatibility, retire the pure-classical path on a stated timeline. Do not skip the timeline — "hybrid forever" is how organizations end up carrying both stacks for a decade.

What not to do

  • Do not build your own ML-KEM implementation to "understand it better"
  • Do not let a vendor sell you a "quantum-safe" product that is actually a proprietary rebrand
  • Do not rotate every key in the environment at once to celebrate
  • Do not treat signatures and key exchange as the same migration — they have different urgency profiles

Signature migration can wait a little longer than KEM migration in most threat models. Get the handshake story right first.

Source note

This post draws on NIST FIPS 203/204/205 finalized in 2024, the Cloudflare post-quantum deployment report, and ongoing IETF TLS WG drafts on hybrid key agreement through 2026.

Command Palette

Search for a command to run...