Close

New Research from CDW on Workplace Friction

Learn how IT leaders are working to build a frictionless enterprise.

May 21 2026
Security

Agencies Question Security Protocols Amid Shift to Post-Quantum Cryptography

Experts say the PQC migration is less about quantum threats and more about whether agencies can build the infrastructure to handle any cryptographic shift ahead.

The federal government's migration to post-quantum cryptography was supposed to be about preparing for a future threat. Instead, it may be surfacing a more immediate one.

According to several experts in a recent PQC panel at the Federal News Network’s Risk and Compliance Exchange, many agencies can't say with confidence what type of cryptography is protecting their systems today. Experts described a PQC migration effort that has become, in practice, a stress test of federal security infrastructure — one that many agencies are struggling to pass.

Agencies Struggle With Cryptographic Inventory Requirements

Quantum computers, once fully realized, will be able to break the public-key cryptographic algorithms that federal agencies rely on to protect everything from classified communications to financial transactions. Adversaries are already harvesting encrypted data today with the intention of decrypting it in the future — a strategy known as “harvest now, decrypt later” (HNDL) — making the threat immediate even before the decryption technology exists. In response, the National Institute of Standards and Technology has finalized a set of post-quantum cryptographic standards, and federal directives now require agencies to inventory their cryptographic assets and begin transitioning to these quantum-resistant algorithms ahead of a 2035 deadline.

Click the banner to read the white paper on optimizing cyber defense with managed security services.

 

The first step of the migration to PQC is deceptively simple: Inventory every cryptographic asset in the agency. Bill Newhouse, cybersecurity engineer and project lead at NIST's National Cybersecurity Center of Excellence, said agencies were directed to take their existing high-value asset lists and identify what cryptography currently protects them.

“They said, take that list and then on this spreadsheet, please tell us what cryptography is in there,” Newhouse said. “That's practical for some and less practical for other agencies.” Newhouse added that the task came with no new associated funding for federal agencies.

Stephen Hunt, CTO for federal markets at HCLSoftware, said the inventory challenge exposes three distinct gaps. First, an ownership gap: Inventories are treated as compliance projects, completed and shelved. “When the audit is closed, somebody owns the data, but it's sitting probably on a disk somewhere, and it's not operationalized,” Hunt said. Second, a continuity gap: “The inventory may be accurate the day it's delivered, and it's stale the next week.” And third, a completeness gap, because “cryptography lives in places that tools or manual searches never reach.”

The result is that weak algorithms persist longer than they should, remediation targets shift before fixes arrive, and agencies plan around data that may already be outdated.

Why Crypto Agility Matters More Than the PQC Migration Itself

Several panelists argued the harder question isn't necessarily how to complete the migration; it's what comes after. Prathibha Rama, a computer engineering and security researcher at the Johns Hopkins University Applied Physics Lab, said the PQC transition is part of a pattern as old as cryptography itself.

“I think of it as a cat and mouse game,” Rama said. “We're using difficult math to hide our data, and we publish that for other people to see, to see if they can break it with the tools that we have. But at some point in time, those things can get broken.”

Rama pointed to the arc from early shift ciphers — the kind broken by Alan Turing's team during World War II — through RSA and number theory, to today's lattice-based systems. Each era of cryptography held until a new tool or insight broke it. Quantum computing is simply the latest such tool.

“For a while, we rested on the laurels of RSA with number theory,” Rama said. “And at some point, somebody was clever enough to say, ‘Well, if we have a quantum computer, this new tool, we can break it.’”

That history is what makes the concept of “crypto agility” — the ability to swap cryptographic algorithms in and out of infrastructure without rebuilding everything — so central to the current conversation. Rama compared the goal to building with toys: “Can you swap out your crypto systems within your larger infrastructure, sort of like Lego blocks?”

Hunt put it more bluntly: “The long-term strategy really isn't about post-quantum specifically,” he said. “It's about building the capability to move when algorithms are forced to change.” He compared the PQC migration to work agencies should already be doing and argued the same process can carry an organization through future cryptographic transitions.

“We're not going to have one day where we need to all change, and then we're done and we can go back to our lives,” Hunt said. “This is going to be in our lives for a while to come.”

READ MORE: How to enhance operations and better protect data.

Federal Agencies Should Prepare for Post-Quantum Deadlines

The timeline is tightening. Google has announced its plans to complete its PQC migrations by 2029, six years ahead of the federal government's 2035 target. NIST expects agencies to stop purchasing technology that relies solely on classic cryptographic algorithms by the end of 2030.

For agencies still working through basic inventory, the gap between where they are and where industry is heading is stark. Hunt's advice for federal agencies was concrete: Name a single PQC lead with authority and budget, train system owners so they understand the risk and establish continuous discovery — ideally, daily — to ensure remediation sticks and retired algorithms don't creep back in.

Rama, for her part, urged a longer view. The trust that underpins pillars of modern digital society — such as banking, communications and classified information — rests on cryptographic systems that have gone largely unexamined for decades. “We've been able to rely on a lot of these public-key crypto systems for the past 30, 40, 50 years without having to think about it,” she said. “It's not something to panic over. But it's this idea of just, slow and steady, start shifting.”

The quantum threat may be what finally forces that change. But the real lesson of the PQC migration, these experts suggest, is that the math was always going to change eventually, and agencies that build the infrastructure to adapt will be the ones that survive the next break, whenever it comes.

cofotoisme/Getty Images