Next Article in Journal
Towards Secure and Adaptive AI Hardware: A Framework for Optimizing LLM-Oriented Architectures
Previous Article in Journal
Transformer-Based Memory Reverse Engineering for Malware Behavior Reconstruction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Enterprise Migration to Post-Quantum Cryptography: Timeline Analysis and Strategic Frameworks

by
Robert Campbell
Independent Researcher, Upper Marlboro, MD 20774, USA
Computers 2026, 15(1), 9; https://doi.org/10.3390/computers15010009
Submission received: 21 November 2025 / Revised: 19 December 2025 / Accepted: 23 December 2025 / Published: 24 December 2025

Abstract

The emergence of quantum computing threatens the security of classical cryptographic algorithms such as RSA and ECC. Post-quantum cryptography (PQC) offers mathematically secure alternatives, but migration is a complex, multi-year undertaking. Unlike past transitions (AES, SHA-2, TLS 1.3), PQC migration requires larger parameter sizes, hybrid cryptographic schemes, and unprecedented ecosystem coordination. This paper presents a structured expert synthesis of migration timelines, based on analysis of migration dependencies, historical precedents, and industry engagement. We analyze migration timelines for small, medium, and large enterprises, considering infrastructure upgrades, personnel availability, budget constraints, planning quality, and inter-enterprise synchronization. We argue that realistic timelines extend well beyond initial optimistic estimates: 5–7 years for small enterprises, 8–12 years for medium enterprises, and 12–15+ years for large enterprises under baseline assumptions. PQC migration is not a siloed technical upgrade but a global synchronization exercise, deeply intertwined with Zero Trust Architecture and long-term crypto-agility. These timelines are contextualized against expected arrival windows for fault-tolerant quantum computers (FTQC), projected between 2028 and 2033. We further analyze the “Store Now, Decrypt Later” threat model, crypto-agility frameworks, and provide comprehensive risk mitigation strategies for enterprises navigating this unprecedented cryptographic transition.

Graphical Abstract

1. Introduction

Quantum computing poses a fundamental and existential threat to classical cryptography that underpins modern digital communications, financial systems, critical infrastructure, and national security. Algorithms such as RSA and elliptic curve cryptography (ECC) are vulnerable to Shor’s algorithm once fault-tolerant quantum computers (FTQC) become available [1]. Migration is not merely a technical upgrade but a systemic transformation requiring coordination across enterprises, vendors, regulators, and communication partners spanning multiple jurisdictions and regulatory frameworks.
Unlike past migrations, PQC introduces larger parameter sizes, hybrid cryptographic requirements, and ecosystem-wide dependencies that fundamentally change the operational characteristics of cryptographic systems [2]. Certificate sizes may increase by factors of 5–10×, impacting bandwidth-constrained networks, embedded systems, and high-frequency trading platforms. Signature generation and verification times increase substantially, affecting real-time systems and time-critical applications. Hardware security modules (HSMs), smart cards, and cryptographic accelerators require firmware updates or complete replacement to support lattice-based and hash-based algorithms with different computational profiles than classical schemes.
This paper explores realistic migration timelines for enterprises of varying sizes, grounded in the interconnectedness of modern IT environments and the urgency imposed by FTQC arrival projections [3,4]. We examine the multi-dimensional challenge space, including technical debt in legacy systems, organizational change management, supply chain coordination, regulatory compliance timelines, and the “Store Now, Decrypt Later” (SNDL) threat model that makes immediate action imperative despite FTQC being years away.

1.1. The Store Now, Decrypt Later Threat

A critical dimension often underestimated in PQC migration planning is the Store Now, Decrypt Later (SNDL) attack vector. Adversaries with sufficient storage capacity and strategic motivation are actively harvesting encrypted communications today with the intent to decrypt them once FTQC becomes available [4]. This represents a binary risk event: once a cryptographically relevant quantum computer exists, all intercepted historical traffic becomes readable. Unlike gradual vulnerabilities, this is a discrete phase transition in threat capability that fundamentally alters the risk calculus for organizations handling sensitive data with long confidentiality requirements.
Data with confidentiality requirements extending beyond 2030 is already at risk. This includes classified national security information, long-term medical research data, financial instruments with extended maturity dates, intellectual property with multi-decade commercial value, and personal identifiable information (PII) subject to privacy regulations like GDPR or CCPA. Organizations must assess their data inventory against SNDL threat timelines and prioritize the migration of systems handling long-shelf-life sensitive data.
The SNDL threat creates an asymmetric advantage for adversaries: they can be patient, investing in harvesting operations today with minimal risk of detection, while defenders must execute complex, costly migrations under resource constraints and coordination challenges. This asymmetry drives the urgency for accelerated PQC adoption even in the absence of near-term FTQC availability [4].

1.2. Quantum Computing Timeline Projections

Recent developments in quantum computing have substantially accelerated timeline projections for cryptographically relevant quantum computers (CRQC). Note: In this paper, CRQC (Cryptographically Relevant Quantum Computer) and FTQC (Fault-Tolerant Quantum Computer) are used interchangeably to denote quantum computers capable of breaking RSA/ECC encryption. While early estimates suggested FTQC arrival in the 2035–2040 timeframe, more aggressive recent projections place CRQC capability as early as 2028–2030 [3,5,6]. This acceleration stems from rapid progress in quantum error correction, increases in qubit coherence times, advances in qubit connectivity architectures, and substantial increases in public and private sector investment in quantum computing research and development.
IBM’s quantum computing roadmap demonstrated a 1121-qubit Condor processor in 2023 and projects systems with over 4000 qubits and expects to scale toward 100,000+ qubits by 2033. The company expects fault-tolerant systems capable of executing Shor’s algorithm against RSA-2048 within the current decade [7]. IonQ has published roadmaps suggesting cryptographically relevant trapped-ion quantum computers by 2028 [6]. Google’s Willow chip achieved below-threshold quantum error correction in December 2024, a critical milestone toward fault-tolerance. Quantinuum has demonstrated fault-tolerant operations with trapped-ion systems [5]. While these timelines remain subject to technical uncertainties, the prudent security posture assumes the more aggressive timelines for risk management purposes.
The convergence of accelerated FTQC timelines with lengthy migration timelines creates a critical security gap. If large enterprises require 12–15 years for complete PQC migration, and FTQC arrives in 2028–2030, enterprises beginning migration in 2025 face a 3–5-year window where significant portions of their infrastructure remain vulnerable to quantum attacks. This gap constitutes a quantifiable risk deficit: the temporal span where mission-critical infrastructure remains vulnerable exceeds the security margin provided by current deployment velocity. For data with confidentiality requirements beyond 2030, the migration timeline is effectively retroactive—such data requires protection today, not when migration completes. The SNDL threat makes this deficit immediate rather than theoretical.

Timeline Selection Methodology

The selection of the 2028–2033 FTQC arrival window in this paper reflects a deliberate risk management approach rather than a probabilistic prediction of most likely outcomes. Security planning must assume adversarial advantage; organizations cannot afford to plan for median-case scenarios when the consequences of underestimating threat timelines include catastrophic and irreversible data exposure through SNDL attacks.
This timeline selection is grounded in specific technical milestones that were not anticipated in earlier 2035–2040 projections: (1) IBM’s demonstrated 1121-qubit Condor processor representing a 3× increase from 2022; (2) Google’s Willow chip achieving below-threshold error correction, the critical prerequisite for fault-tolerance; (3) Quantinuum’s demonstration of fault-tolerant logical qubit operations with trapped-ion systems; and (4) substantial increases in both public and private quantum computing investment accelerating the pace of development.
Critically, the SNDL threat makes this timeline debate somewhat moot for data requiring long-term confidentiality. Adversaries harvesting encrypted traffic today will be able to decrypt it whenever FTQC arrives—whether 2028 or 2038. For data with confidentiality requirements extending beyond the FTQC arrival window, protection is required now, making the precise arrival date less relevant than the certainty of eventual arrival. This risk management rationale is consistent with guidance from CISA, NSA, and NIST, which recommend initiating migration immediately regardless of FTQC timing uncertainty [4].

2. Background and Related Work

2.1. Post-Quantum Cryptography Standards

NIST finalized three post-quantum cryptography standards in August 2024 following an eight-year standardization process involving international academic, industry, and government participation: FIPS 203 (ML-KEM, Module-Lattice-Based Key-Encapsulation Mechanism, derived from CRYSTALS-Kyber), FIPS 204 (ML-DSA, Module-Lattice-Based Digital Signature Algorithm, derived from CRYSTALS-Dilithium), and FIPS 205 (SLH-DSA, Stateless Hash-Based Digital Signature Algorithm, derived from SPHINCS+) [8].
ML-KEM (FIPS 203) provides key encapsulation for establishing shared secrets in key exchange protocols. It offers three security levels (ML-KEM-512, ML-KEM-768, ML-KEM-1024) corresponding to AES-128, AES-192, and AES-256 equivalent security. ML-KEM-768 is recommended for most applications, producing ciphertexts of approximately 1088 bytes and public keys of 1184 bytes, compared to 32 bytes for classical ECDH public keys [per FIPS 203 specifications]. This 30–40× increase for key exchange materials creates a bandwidth tax that impacts network protocols, certificate repositories, and embedded systems with limited memory.
ML-DSA (FIPS 204) provides digital signatures for authentication and non-repudiation. Similarly, offering three security levels (ML-DSA-44, ML-DSA-65, ML-DSA-87), the recommended ML-DSA-65 produces signatures of approximately 3309 bytes compared to 64 bytes for ECDSA P-256 signatures—a 50× increase [per FIPS 204 specifications]. This dramatic expansion affects high-volume signing operations, blockchain systems, secure boot chains, and audit logging systems where signature storage accumulates over time. Second-order effects include database schema extensions: enterprise directory services (Active Directory, LDAP) with fixed-width certificate fields require schema migrations that can break downstream applications, and Certificate Revocation Lists (CRLs), bloating 50× can saturate WAN links during distribution.
SLH-DSA (FIPS 205) provides stateless hash-based signatures as a conservative fallback with stronger security assumptions than lattice-based schemes. However, SLH-DSA signatures range from 7856 to 49,856 bytes depending on the parameter set, making them impractical for bandwidth-constrained applications. SLH-DSA serves primarily as a hedge against potential future cryptanalytic breakthroughs against lattice assumptions and finds application in high-security, low-frequency signing scenarios such as firmware signing and root certificate authorities.
These algorithms feature fundamentally different performance characteristics compared to classical cryptography. Lattice-based schemes exhibit fast encryption and key generation, but slower signature verification compared to RSA. Hash-based schemes provide conservative security assumptions, but at the cost of significantly larger signatures. These trade-offs may impact infrastructure design, requiring careful parameter selection based on application requirements [9].

2.2. Performance and Implementation Characteristics

Beyond parameter sizes, PQC algorithms exhibit different computational profiles that affect deployment strategies. ML-KEM demonstrates excellent performance on modern CPUs with AVX2 instruction sets, achieving key generation, encapsulation, and decapsulation operations in microseconds. However, embedded systems without vector instructions may experience 10–100× performance degradation, potentially necessitating hardware acceleration or protocol modifications to maintain acceptable latency.
ML-DSA signature generation scales linearly with security level, but verification requires sampling operations that introduce variable-time execution risks. Constant-time implementations add 20–40% overhead, which may be unacceptable for real-time systems. Side-channel protections against timing attacks, cache timing, and power analysis attacks add further complexity and performance cost to embedded implementations.
The stateless nature of SLH-DSA eliminates state management vulnerabilities present in earlier hash-based schemes like XMSS, but at the cost of substantially larger signatures. Organizations must evaluate whether the conservative security assumptions justify the 10–100× size increase over lattice-based signatures in their specific threat models.

2.3. Historical Cryptographic Migrations

Past migrations provide valuable lessons but also reveal why PQC migration presents unprecedented challenges:
AES adoption (∼5 years): The transition from DES/3DES to AES during 2001–2006 was relatively smooth, driven by clear performance advantages and security improvements. However, the cryptographic ecosystem was far less complex, with fewer devices, simpler protocols, and limited internet connectivity among embedded systems. AES adoption primarily affected server infrastructure and high-security applications rather than pervasive embedded devices [10]. This historical precedent informs the lower bound of our timeline estimates, adjusted upward for PQC’s greater complexity.
SHA-1 deprecation (∼7 years): The transition from SHA-1 to SHA-2 (2010–2017) required coordinated browser vendor enforcement and certificate authority policy changes. Unlike algorithm upgrades, deprecation faces stronger resistance since it provides no immediate benefit to adopters while imposing costs. Browser vendors ultimately forced the transition by rejecting SHA-1 certificates, demonstrating the necessity of coordinated enforcement mechanisms [11]. This precedent illustrates how ecosystem coordination requirements can extend timelines beyond pure technical constraints.
TLS 1.3 rollout (∼3–5 years): Despite being a simpler protocol upgrade offering clear performance improvements (reduced handshake latency, forward secrecy by default, removed obsolete cryptographic options), TLS 1.3 deployment was slowed by middlebox incompatibility, particularly in enterprise networks with deep packet inspection systems. This illustrated how network infrastructure dependencies extend migration timelines even for well-designed backwards-compatible protocols [12]. This experience directly informs our estimates of network infrastructure upgrade timelines.
Key differences for PQC migration: Compared to these precedents, PQC migration is substantially more complex due to: (1) larger parameters impacting bandwidth, storage, and processing across all layers; (2) hybrid requirements necessitating dual cryptographic operations during transition; (3) vastly more devices, applications, and networks than existed during earlier migrations; (4) deeper integration of cryptography into hardware (TPMs, HSMs, secure enclaves) requiring firmware or hardware replacement; (5) supply chain complexities with multi-tier vendor dependencies; and (6) regulatory compliance requirements across multiple jurisdictions with varying timelines [2,13].
The AES migration primarily affected the centralized server infrastructure. PQC migration affects everything from satellites with 15-year replacement cycles to vehicle telematics units with 10-year operational lifetimes to industrial control systems with 20–30 year deployed lifespans. This orders-of-magnitude increase in scope and heterogeneity fundamentally changes the migration challenge.

2.4. Dependencies Shaping PQC Migration

2.4.1. Infrastructure Upgrades

PKI and Certificate Infrastructure: Public Key Infrastructure repositories must scale to handle 5–10× larger certificates, impacting OCSP responders, CRL distribution, and certificate transparency logs. Certificate chains grow proportionally; a three-certificate chain with ML-DSA-65 signatures totals approximately 10 KB compared to ∼2 KB for classical ECDSA chains. High-volume certificate issuance systems require throughput scaling and storage expansion [9].
Hardware Security Modules face particularly acute challenges. Many deployed HSMs lack sufficient memory or processing power to support PQC algorithms efficiently. Firmware updates may be impossible for end-of-life models, requiring complete HSM replacement. Before deployment, vendors must achieve FIPS 140-3 certification—a process historically requiring 12–24 months [based on NIST CMVP historical processing data]. Furthermore, current HSMs optimized for RSA/ECC secure storage will experience 50× faster capacity consumption with PQC keys, potentially requiring enterprises to deploy 5–10× more HSM units to maintain equivalent key volume capacity. The combined procurement, certification, racking, and key ceremony rituals can consume 2–3 years of migration timelines. HSM replacement in high-availability environments requires parallel operation of old and new systems during cutover, effectively doubling infrastructure costs during transition [14].
Network Protocol Impacts: TLS handshakes grow substantially with PQC, particularly when employing hybrid schemes combining classical and post-quantum algorithms for defense-in-depth. A hybrid TLS 1.3 handshake using X25519+ML-KEM-768 and ECDSA+ML-DSA-65 may exceed 15 KB compared to ∼4 KB for classical-only handshakes [per IETF draft measurements]. This 4× increase creates potential prohibitive overhead in:
  • Bandwidth-constrained networks: Satellite links, cellular networks in remote areas, and tactical military communications where larger handshakes fragment across multiple network packets, increasing vulnerability to packet loss and amplifying performance degradation in high-latency networks.
  • Packet fragmentation: Fragmentation increases packet-loss vulnerability and introduces reassembly overhead that compounds latency in lossy environments.
  • Middlebox compatibility: Enterprise firewalls, DPI systems, and load balancers with fixed buffer sizes may drop these fragments as anomalies, potentially causing connection failures. Remediation may require network transport layer re-architecture, not merely software updates [15].
Testing network infrastructure for PQC compatibility requires comprehensive protocol analysis across diverse network conditions, which many enterprises lack the capacity to perform without external consulting support.
IoT and Embedded Devices: Internet of Things devices and embedded systems present the most severe migration challenges. Many IoT devices lack over-the-air firmware update capabilities, requiring physical access or field replacement. Devices embedded in critical infrastructure (smart grid meters, industrial sensors, medical implants) have 10–20-year operational lifespans that extend well beyond expected FTQC arrival [16].
Microcontrollers with limited RAM (32–64 KB) cannot accommodate PQC certificate chains and cryptographic operations simultaneously. Even with careful optimization, ML-KEM-768 requires approximately 15 KB of working memory, leaving insufficient space for application logic in resource-constrained devices. Organizations must choose between early device replacement, segmented network architectures isolating non-PQC devices, or accepting quantum vulnerability for legacy systems.
The sheer scale compounds the challenge: large enterprises may operate hundreds of thousands or millions of IoT devices across dispersed locations. A major manufacturer may have 50,000 industrial robots, a utility may deploy 10 million smart meters, and a logistics company may operate 100,000 telematics-equipped vehicles. Replacing these fleets on accelerated timelines requires massive capital expenditure and operational disruption [16]. Table 1 presents sector-specific cost frameworks for IoT/OT migration scenarios.

2.4.2. Personnel and Expertise

Skilled personnel in PQC, PKI architecture, cryptographic engineering, and crypto-agility frameworks are scarce [14]. The cryptographic engineering community is relatively small, and few professionals have hands-on experience with lattice-based or hash-based cryptography beyond academic contexts. Enterprises must train cross-disciplinary teams spanning cryptographers, network engineers, application developers, security architects, and compliance officers to manage hybrid environments and navigate complex interoperability requirements.
Training and Skill Development: Effective PQC migration requires understanding not just the new algorithms, but their security properties, implementation pitfalls, side-channel vulnerabilities, and parameter selection trade-offs. Organizations must invest in:
  • Algorithm-specific training for cryptographic engineers on lattice problems, rejection sampling, and side-channel countermeasures
  • PKI modernization training for certificate authority operators on hybrid certificates and parameter negotiation
  • Developer training on API changes and hybrid cryptographic libraries
  • Security operations training on monitoring PQC implementations and detecting quantum-capable threats
  • Executive and management training on risk assessment and resource allocation for migration programs
Without adequate staffing, testing, and rollout coordination, personnel bottlenecks extend migration timelines by years. This creates a supply chain constraint on intellectual capital: vendors, enterprises, and government agencies compete simultaneously for the same limited pool of cryptographic engineering expertise. This consultant bottleneck means medium enterprises will queue for ‘PQC-as-a-Service’ product maturity, directly extending the 8–12-year timeline [5,14]. Organizations cannot simply hire their way out of the skills gap—the global shortage of qualified personnel means training existing staff and phased rollout paced by organizational absorption capacity are necessary constraints.
Regional Variation in Expertise Availability
PQC expertise is geographically concentrated in regions with strong academic cryptography programs and sustained government investment. The United States benefits from the NIST ecosystem, major technology company research labs, and federal agency investment. Western Europe—particularly the Netherlands, Germany, France, and the United Kingdom—maintains strong national cryptographic agencies (NCSC, BSI, ANSSI) with active PQC programs. Select Asian centers, including Japan’s CRYPTREC ecosystem, Singapore’s government-backed initiatives, and emerging Chinese domestic standards development, represent additional concentration points.
Organizations headquartered in regions with less developed PQC ecosystems face additional constraints in sourcing expertise, potentially extending timelines by 1–2 years. Multinational enterprises face compounding challenges: different regulatory timelines across jurisdictions (U.S. federal mandates vs. EU NIS2 requirements vs. Asian national standards), varying vendor ecosystem maturity by region, and potential algorithm approval differences. China’s development of domestic PQC standards separate from NIST selections may require enterprises operating in both markets to maintain distinct cryptographic implementations, further extending timelines by 1–3 years for globally synchronized deployment.
Remote consulting and globally distributed teams partially mitigate geographic constraints, though time zone coordination, data sovereignty requirements limiting where sensitive migration work can be performed, and the need for local regulatory knowledge remain friction factors. The COVID-19 pandemic normalized remote security consulting, providing some relief, but hands-on HSM key ceremonies, physical security assessments, and air-gapped system migrations still require on-site presence.
Organizational Change Management: PQC migration is not purely technical but requires organizational transformation. Governance structures must be established for crypto-agility decision-making. Risk management frameworks must be updated to assess quantum threats alongside traditional threat models. Compliance processes must incorporate PQC requirements as regulatory mandates emerge. Change management requires executive sponsorship, cross-functional working groups, and sustained funding over multi-year timelines [17].

2.4.3. Inter-Enterprise Coordination

Enterprises cannot migrate in isolation. Modern business operations depend on cryptographic interoperability with communication partners, SaaS vendors, cloud providers, financial networks, supply chain partners, and regulatory reporting systems [2,18]. This interdependence creates synchronization requirements that substantially extend timelines.
Vendor Ecosystem Dependencies: Organizations depend on software vendors, appliance manufacturers, and service providers to deliver PQC-capable products. Enterprise software procurement cycles typically span 12–24 months from initial RFP to production deployment, including vendor evaluation, pilot testing, contract negotiation, and staged rollout. If a critical vendor delivers PQC support 2–3 years after standardization, their customers’ migrations are delayed by that amount, plus their internal procurement and deployment cycles [19].
Cloud service providers have announced PQC support timelines, but comprehensive availability across all services (compute, storage, database, networking, identity management, and key management) may take 3–5 years. Organizations with hybrid cloud architectures must coordinate migrations across multiple providers with different timelines and implementation approaches. Multi-cloud strategies amplify complexity, as each provider may prioritize different algorithm sets or parameter configurations [14].
Communication Partner Coordination: B2B communications often involve mutual authentication and encrypted channels, requiring both parties to support compatible cryptographic algorithms. Industries with complex supply chains (automotive, aerospace, pharmaceuticals) involve dozens or hundreds of partners that must coordinate upgrades. Without industry-wide coordination mechanisms, organizations face choices between maintaining legacy systems indefinitely, building dual-stack environments supporting both classical and PQC indefinitely, or accepting communication failures with non-PQC partners [18].
Financial networks present acute coordination challenges. Payment card networks, SWIFT, automated clearing houses, and securities trading systems require synchronized upgrades across thousands of participating institutions spanning multiple countries and regulatory jurisdictions. A single laggard institution can block other participants from fully retiring classical cryptography, forcing perpetual hybrid operation [2].
Hybrid Cryptography and Parameter Uniformity: Hybrid cryptographic schemes combine classical and post-quantum algorithms, providing defense-in-depth against cryptanalytic breakthroughs in either family. However, hybrid approaches double cryptographic operations (key generation, signing, verification) and further increase certificate and signature sizes. The operational overhead of hybrid cryptography is substantial but necessary during the multi-year transition period [9].
Parameter uniformity across ecosystems is critical to avoid interoperability failures. If different sectors or geographic regions standardize on incompatible PQC parameter sets, cross-sector communication requires protocol negotiation overhead and increases the attack surface through downgrade attacks. International standardization bodies (NIST, ETSI, ISO) must coordinate to ensure global parameter alignment, but regional variations driven by national security concerns or industrial policy create fragmentation risks [19].

2.4.4. Budget and Planning

Infrastructure upgrades, personnel training, interoperability labs, consulting support, and extended hybrid operation require significant sustained funding [6,14]. Enterprise IT budgets typically allocate 70–80% to operations and maintenance, leaving limited capacity for transformational projects. PQC migration competes with other priorities: cloud adoption, Zero Trust implementation, OT security modernization, and regular security operations.
Capital and Operational Expenditure: Organizations must budget for:
  • Hardware replacement: HSMs, cryptographic accelerators, non-upgradeable embedded devices
  • Software licensing: upgraded applications, operating systems, security tools with PQC support
  • Network infrastructure: middlebox upgrades, bandwidth expansion, testing equipment
  • Personnel costs: training, consulting, additional staffing for migration programs
  • Opportunity costs: deferred projects, slower feature development during migration
Budget constraints force deferrals and phased approaches that extend timelines by several years. Organizations with limited capital budgets may stretch hardware replacement over 5–7 year refresh cycles rather than accelerated 2–3 year replacement needed for timely PQC adoption [17].
Planning Quality and Program Management: Migration success depends critically on planning quality and program management rigor. Organizations that conduct comprehensive cryptographic inventories, prioritize systems based on risk and data sensitivity, develop detailed migration roadmaps with milestone dependencies, and establish governance structures for decision-making execute faster and more reliably than organizations approaching migration reactively [17].
However, many organizations lack mature asset management and cryptographic inventories. Discovering all cryptographic implementations across thousands of applications and devices is itself a multi-year undertaking. Organizations that defer cryptographic discovery until migration becomes urgent face compressed timelines and higher execution risk [14].

2.5. Zero Trust Architecture Implications

Zero Trust Architecture has emerged as the dominant security paradigm for modern enterprises, predicated on “never trust, always verify” principles. Zero Trust depends fundamentally on strong cryptographic assurances for identity, access control, and secure communication [20]. PQC migration directly impacts every Zero Trust pillar:

2.5.1. Identity and Authentication

PKI and Certificate Management: Zero Trust identity relies on cryptographic certificates and ephemeral tokens (e.g., JSON Web Tokens) for device authentication, user authentication, and service-to-service authentication. ML-DSA-signed tokens can exceed default HTTP header limits: many web servers (Apache, Nginx, IIS) and load balancers enforce 4 KB–8 KB header size limits. A Dilithium-signed JWT plus Kyber-encapsulated session key can breach these limits, requiring reconfiguration of thousands of web servers and ingress controllers across global estates—a discovery and remediation effort spanning years. Larger PQC certificates additionally impact:
  • Certificate enrollment: Increased bandwidth and processing for certificate issuance at scale
  • Certificate storage: Limited storage on smart cards, HSMs, and embedded authenticators
  • Certificate validation: OCSP and CRL bandwidth requirements scale with certificate size
  • Certificate renewal: Automated renewal systems must handle larger payloads
Hybrid certificates combining classical and post-quantum keys double storage requirements and validation overhead. Organizations implementing Zero Trust must plan for a 5–10× expansion of PKI infrastructure capacity to maintain performance [8,9].
Multi-Factor Authentication: MFA systems employing certificate-based authentication or FIDO2 tokens require firmware updates or hardware replacement to support PQC. FIDO Alliance has published PQC specifications, but device availability and organizational deployment timelines lag standardization by 2–4 years. Organizations cannot complete Zero Trust deployments until all authentication factors achieve quantum resistance [14].

2.5.2. Access Control and Policy Enforcement

Latency Impacts: Zero Trust architectures enforce access decisions at the transaction level, requiring cryptographic operations for each request. Increased PQC signature verification times affect:
  • API gateway performance: Per-request signature verification becomes a bottleneck
  • Microsegmentation: Increased latency between microservices
  • Real-time systems: Latency-sensitive applications may violate performance requirements
Organizations must evaluate whether to accept performance degradation, invest in cryptographic acceleration hardware, or redesign applications to reduce per-transaction cryptographic overhead [15].
Crypto-Agility in Policy Enforcement: Zero Trust policy engines must support crypto-agility, allowing gradual rollout of PQC algorithms without disrupting access for legacy systems. Policy engines must negotiate supported algorithms, maintain allowlists of permitted algorithm combinations, and enforce minimum security levels while preventing downgrade attacks. This flexibility adds complexity to policy management and increases the attack surface during transition [21].

2.5.3. Secure Communication Channels

Hybrid TLS and Network Segmentation: Zero Trust assumes all network segments are untrusted, requiring end-to-end encryption for all communications. During PQC transition, networks must support:
  • Classical TLS for legacy systems unable to upgrade
  • Hybrid TLS for systems in transition
  • Pure PQC TLS for fully migrated systems
Network segmentation strategies may isolate non-PQC systems in separate VLANs or security zones, but this complicates network management and may conflict with microsegmentation principles requiring fine-grained access control [12].
Service Mesh and Encryption: Service mesh architectures implementing Zero Trust for microservices face challenges. Sidecar proxies handling encryption must support multiple cryptographic configurations simultaneously, increasing resource consumption and operational complexity. Latency-sensitive microservices may require architectural changes to maintain acceptable performance with PQC overhead [15].

2.5.4. Monitoring and Audit

Log Volume and Storage: Larger PQC signatures affect security event logging and audit trails. If every API transaction logs a 3300-byte ML-DSA signature for non-repudiation, log storage requirements increase 50× compared to ECDSA. Organizations must expand SIEM capacity, extend log retention periods to accommodate volume, or implement selective signature logging based on risk assessment [9].
Security Monitoring Tools: Security monitoring and threat detection tools must understand PQC protocols to differentiate legitimate traffic from attacks. Signature validation failures may indicate quantum attacks, implementation errors, or configuration mismatches. Security operations teams require training to interpret PQC-related security events and distinguish actual threats from migration-related transient issues [14].

2.5.5. Partner Trust and Federated Identity

Cross-Organization Authentication: Zero Trust principles extend to partner organizations through federated identity and trust brokers (SAML, OAuth, OpenID Connect). Partner migrations operate on independent timelines, requiring long-term hybrid operation at federation boundaries. Trust frameworks must specify minimum cryptographic requirements and upgrade schedules to prevent weakest-link vulnerabilities [2,18].
Supply Chain Security: Zero Trust for supply chains requires cryptographic verification of software components, firmware updates, and hardware authenticity throughout the supply chain. Software Bill of Materials (SBOM) signing, secure boot, and attestation mechanisms must transition to PQC concurrently with other enterprise systems to maintain end-to-end security assurance [16].

2.5.6. Zero Trust Timeline Extension

The interdependencies between Zero Trust implementation and PQC migration mean that organizations pursuing both initiatives simultaneously face extended timelines for either or both. Organizations must carefully sequence initiatives, potentially accepting interim security postures that compromise neither pure Zero Trust nor complete quantum resistance, but represent pragmatic progress toward both goals. This strategic planning requires executive-level risk acceptance and resource commitment [20].

2.6. Methodology and Analytical Framework

This paper employs structured expert synthesis as its analytical methodology—a recognized approach in technology forecasting where empirical data is unavailable or necessarily limited. As Tetlock and Gardner [22] demonstrate, structured expert judgment that decomposes complex problems into constituent factors, triangulates across multiple evidence sources, and explicitly acknowledges uncertainty can achieve forecasting accuracy superior to both unaided intuition and many formal models.
Evidence Sources: The timeline estimates presented in this paper synthesize multiple evidence streams:
  • NIST standards and technical specifications (FIPS 203, 204, 205) providing algorithm performance characteristics and parameter sizes
  • Vendor roadmaps and product documentation from major HSM manufacturers, cloud providers, and cryptographic library maintainers
  • Government guidance documents from CISA, NSA, NIST, BSI, and NCSA providing official migration timeline recommendations
  • Historical migration case studies (AES, SHA-2, TLS 1.3) providing empirical precedent for cryptographic transition timelines
  • Industry working group participation, including Cloud Security Alliance PQC Working Group and NIST NCCoE Migration Project engagement
  • Professional experience in federal and enterprise PQC migration planning, providing a practitioner perspective
Estimation Framework: Timeline estimates decompose migration into constituent phases: cryptographic discovery (1–3 years depending on enterprise size and asset management maturity), infrastructure upgrades (2–7 years depending on HSM refresh cycles and network complexity), application migration (3–10 years depending on application portfolio size and legacy burden), and partner ecosystem coordination (1–5 years depending on supply chain complexity). These phases exhibit dependencies—infrastructure upgrades cannot be completed before discovery identifies requirements—but also parallelism where independent systems can migrate concurrently.
Validation Approach: Estimates are triangulated against independently-derived timelines from authoritative sources. CISA/NSA/NIST joint guidance [4] recommends immediate migration initiation given multi-year timelines, implicitly endorsing the 5–15 year range. The Netherlands NCSA Migration Handbook [18] projects 5–10 year enterprise transitions. BSI TR-02102 [20] emphasizes extended hybrid operation requirements consistent with our extended timeline projections. This convergence across independent expert assessments—derived through different methodologies by different organizations—provides external validation absent direct empirical measurement.
Confidence Qualifiers: Different estimate components carry different confidence levels. High confidence attaches to infrastructure-driven constraints based on known hardware refresh cycles and documented FIPS certification processing times. Medium confidence applies to organizational factors extrapolated from the historical migration analogy. Lower confidence applies to ecosystem synchronization, timing dependent on vendor and partner behavior outside organizational control. Section 4.4 provides a detailed uncertainty analysis.

3. Migration Timeline Analysis

3.1. Enterprise Size Definitions

Enterprise size classification varies by jurisdiction and industry, affecting how organizations approach migration planning and resource allocation. In the United States, the Small Business Administration (SBA) defines “small business” using industry-specific thresholds typically expressed in number of employees or average annual receipts [23]. Internationally, “SME” definitions depend on country-specific policy, such as revised thresholds in India reflecting investment and turnover limits [24,25,26].
For this paper, the following working definitions are used:
Small enterprise: ≤500 employees or within SBA “small business” receipts thresholds for respective industry sectors; limited internal security engineering capacity; high reliance on cloud/SaaS vendors; typically, single-location or limited geographic footprint; minimal formal governance structures; usually exempt from most regulatory reporting requirements; budget constraints typically limiting major capital expenditures.
Medium enterprise: Exceeds SBA “small” thresholds but below “large” enterprise characteristics; typically, 500–5000 employees; multiple business units with some autonomy; hybrid cloud estates combining on-premises and cloud infrastructure; moderate internal engineering capacity supplemented by contractors; established governance structures without comprehensive program management; annual IT security budgets typically $5 M–$100 M.
Large enterprise: Global or multi-regional operations spanning multiple countries and regulatory jurisdictions; typically >5000 employees with thousands in IT/security functions; characterized by complex supply chains and extensive partner ecosystems; thousands of applications and business processes; dedicated security, compliance, and architecture teams; comprehensive governance and program management capabilities; extensive regulatory requirements (SOX, PCI-DSS, FISMA, etc.); annual IT budgets exceeding $100 M; substantial legacy system accumulation over decades of operation.
These definitions align broadly with international SME definitions while recognizing that regulatory and industry-specific variations create substantial heterogeneity within each category. Organizations near category boundaries may exhibit characteristics of adjacent categories, requiring flexible migration planning approaches.

3.2. Timeline Estimates by Enterprise Size

Migration timelines vary significantly depending on enterprise size, infrastructure complexity, legacy system prevalence, budget availability, personnel capacity, and inter-enterprise coordination requirements. Table 2 summarizes optimistic, baseline, and pessimistic estimates for PQC migration, alongside the expected arrival window for FTQC and critical dependencies driving timeline variations.
Dependency Analysis and Critical Path
Migration timelines are shaped by causal dependencies between factors that create critical paths constraining overall duration regardless of resource availability. Understanding these dependencies enables organizations to focus planning efforts on high-leverage activities.
Key Dependency Chains: Several causal chains drive timeline outcomes:
  • Personnel → Discovery → Planning: Insufficient cryptographic expertise extends the discovery phase, which delays infrastructure planning, which compresses application migration timelines, which increases execution risk.
  • HSM → Certificates → Applications: HSM replacement delays block certificate migration, which stalls application upgrades dependent on PKI, which extends hybrid operation costs.
  • Vendor → Procurement → Deployment: Vendor PQC support delays trigger procurement delays, which defer deployment, which may cause regulatory compliance gaps if mandates arrive before migration completes.
Critical Path by Enterprise Size: For large enterprises, HSM replacement and partner coordination typically constitute the critical path—these are the longest sequential dependencies that cannot be parallelized. Adding resources to application migration provides limited benefit if HSMs remain the bottleneck. For small enterprises, vendor ecosystem readiness dominates—organizations dependent on SaaS vendors cannot migrate faster than those vendors deliver PQC support. For medium enterprises, the critical path varies based on infrastructure composition; organizations with significant on-premises HSM deployments face infrastructure-dominated critical paths, while cloud-native organizations face vendor-dominated critical paths (see Figure 1).
Feedback Dynamics: Migration timelines exhibit reinforcing dynamics. Early migration success builds organizational capability and confidence, accelerating subsequent phases. Conversely, early failures—pilot deployments that cause outages, performance degradation discovered late in testing—create risk aversion that extends timelines for remaining systems. The ‘consultant bottleneck’ creates an industry-wide negative feedback loop: as more organizations initiate migration simultaneously, demand for scarce expertise increases, extending everyone’s timelines and creating scheduling conflicts that compound delays.

3.2.1. Small Enterprise Migration Scenarios

Small enterprises typically have simpler IT environments but face distinct challenges. With 500 or fewer employees and limited internal security engineering capacity, small enterprises depend heavily on external vendors, cloud services, and SaaS applications [23]. This dependence creates both advantages and constraints.
Advantages: Small enterprises benefit from lower infrastructure complexity, fewer applications to assess and migrate, limited legacy system burden, and potentially faster decision-making without extensive governance overhead. Organizations heavily reliant on SaaS vendors may achieve rapid migration as vendors update their platforms, requiring minimal internal effort beyond user acceptance testing [19].
Constraints: Limited internal expertise necessitates external consulting support, increasing costs, and introducing scheduling dependencies on consultant availability. Budget constraints may force phased approaches or deferrals. Small enterprises often lack leverage to accelerate vendor timelines, making them dependent on vendor migration priorities. Critical custom applications without vendor support may require expensive rewrites or extended hybrid operation [14].
Timeline Drivers: Baseline 5–7-year timelines for small enterprises assume vendors deliver PQC-capable products within 2–3 years, organizations allocate budget for consulting and infrastructure upgrades within 1–2 years, cryptographic discovery and risk assessment completed within 1 year, and phased migration execution over 2–4 years with contingency for vendor delays or budget constraints.
Organizations in highly regulated industries (healthcare, finance) face extended timelines due to compliance requirements and audit cycles, potentially pushing timelines toward the upper bound or beyond.

3.2.2. Medium Enterprise Migration Scenarios

Medium enterprises occupy the middle ground in complexity and resources. Exceeding SBA small business thresholds but remaining below large enterprise scale, medium enterprises typically operate multiple business units, maintain hybrid cloud estates combining on-premises and cloud infrastructure, and have established but not comprehensive governance structures [24,25,26].
Complexity Factors: Medium enterprises face infrastructure diversity requiring multiple migration approaches: aging on-premises data centers with limited refresh budgets, growing cloud footprints across multiple providers, business unit autonomy creating siloed technology decisions, and moderate accumulations of technical debt in legacy applications. These enterprises often maintain their own PKI for internal systems while depending on external CAs for public-facing services [18].
Resource Availability: Medium enterprises have dedicated security and infrastructure teams but frequently lack specialized cryptographic engineering expertise. They can afford external consulting support but must carefully manage consultant engagement scope to control costs. Personnel bandwidth remains a constraint, as security teams balance PQC migration against ongoing operations, compliance audits, incident response, and other security initiatives [14].
Governance and Planning: Medium enterprises benefit from more structured planning and governance than small enterprises, but lack the comprehensive program management offices typical of large enterprises. Establishing clear accountability, cross-functional coordination, and sustained executive attention represents a significant organizational challenge. Without dedicated migration program leadership, efforts fragment across business units with inconsistent progress [17].
Timeline Drivers: Baseline 8–12 year timelines for medium enterprises reflect: cryptographic inventory and risk assessment spanning 1–2 years across diverse infrastructure, governance establishment and program planning requiring 6–12 months, phased infrastructure upgrades over 3–5 years aligned with refresh cycles, application migration spanning 4–6 years with complex legacy system remediation, and partner coordination overhead adding 1–2 years for synchronized B2B communication migration [18,20].
Organizations at the lower end of medium enterprise scale (closer to small business thresholds) may achieve timelines toward the 8-year mark, while those approaching large enterprise complexity trend toward 12+ years.

3.2.3. Large Enterprise Migration Scenarios

Large enterprises face the most complex and protracted migration challenges. With global or multi-regional operations, thousands of applications and business processes, extensive IoT and OT deployments, heavy regulatory burden across multiple jurisdictions, and complex supply chains involving hundreds or thousands of partners, large enterprises require comprehensive, well-resourced migration programs sustained over 12–15+ years [13,17,20].
Scale and Complexity: A typical large enterprise may operate: 5000–50,000 applications across on-premises, cloud, and hybrid environments; hundreds of data centers and thousands of network locations globally; millions of endpoints including laptops, mobile devices, IoT sensors, and OT controllers; complex supply chains with 100–1000+ technology vendors and thousands of business partners requiring cryptographic interoperability [20].
Discovering, cataloging, and prioritizing this vast attack surface requires dedicated teams and sophisticated asset management systems, often taking 2–3 years for comprehensive visibility. Even with sophisticated tooling, shadow IT, undocumented systems, and acquired company infrastructure create blind spots requiring manual discovery [14].
Legacy System Burden: Large enterprises accumulate substantial technical debt over decades of operation. Mission-critical systems written in COBOL or other legacy languages may lack cryptographic agility or employ cryptography through obsolete libraries without clear upgrade paths. Industrial control systems and building management systems may operate proprietary protocols with vendor-specific cryptography implementations requiring expensive vendor engagement for upgrades [16].
Aircraft avionics, satellite communications systems, and defense systems have 15–30-year operational lifespans and may require a complete redesign for PQC support. Replacing these systems on accelerated timelines requires enormous capital expenditure and introduces operational risk during cutover [13].
Regulatory Complexity: Large enterprises operate across multiple regulatory jurisdictions with varying PQC mandates and compliance timelines. U.S. federal contractors must comply with DoD and DHS guidance, financial institutions face evolving SEC and Federal Reserve requirements, healthcare organizations must satisfy HIPAA evolution, and European operations must align with ENISA recommendations and potentially emerging EU regulatory mandates [4,8].
Compliance demonstration requires extensive documentation, third-party audits, and regulatory approval cycles that add 6–12 months per major system certification. Organizations must sequence migrations to maintain continuous compliance across overlapping regulatory requirements [17].
Program Management Requirements: Large enterprise PQC migration requires dedicated program management offices with executive sponsorship, sustained multi-year funding, cross-functional governance structures, and sophisticated risk management. Migration programs compete with other enterprise initiatives for resources and executive attention. Without sustained commitment, migrations stall as organizational priorities shift [17].
Timeline Drivers: Baseline 12–15+ year timelines for large enterprises reflect a ‘green path’ scenario assuming typical conditions: cryptographic discovery and inventory across global infrastructure requiring 2–3 years, risk assessment and prioritization spanning 1 year, governance establishment and detailed roadmap development requiring 6–12 months, infrastructure upgrades phased over 5–7 years aligned with refresh cycles but accelerated beyond normal pace, application migration across thousands of applications spanning 8–10 years with complex legacy remediation, IoT/OT replacement programs requiring 5–8 years for fleet renewal, partner ecosystem coordination requiring 3–5 years for key partner synchronization, and regulatory compliance demonstration requiring ongoing effort throughout migration [13,17,18,20].
Organizations with particularly complex global footprints, extensive OT deployments, or heavy regulatory burden may experience 20+ year migration cycles, potentially requiring acceptance of residual quantum risk for some systems approaching end-of-life.

3.3. Comparative Analysis

Table 3 provides a comparative view highlighting that migration speed is not solely determined by enterprise size, but by the interplay of infrastructure complexity, personnel capacity, governance maturity, and vendor dependencies.
Large enterprises, despite having greater budgets and personnel, face the longest timelines due to scale, complexity, regulatory obligations, and the necessity of maintaining operational continuity throughout migration [20]. The “slow but thorough” characterization reflects both the burden of complexity and the benefit of comprehensive testing and validation, reducing implementation failures.
Small enterprises face a “fast but risky” scenario where rapid migration through vendor dependence introduces risk if vendors stumble or if custom applications lack proper migration planning. Medium enterprises achieve the most balanced posture, with sufficient resources and governance to manage risk while avoiding the overwhelming complexity of large enterprise scale [19].

4. Risk Mitigation and Strategic Frameworks

4.1. Risk Analysis and Mitigation Strategies

4.1.1. Quantum Threat Risk Assessment

Organizations must conduct quantum-specific threat modeling to prioritize migration efforts. Not all systems face equal quantum risk. Risk factors include:
Data Sensitivity and Longevity: Systems handling high-value intellectual property, national security information, long-term medical records, or multi-decade financial contracts face the highest Store Now Decrypt Later risk. These systems should receive migration priority even if quantum computing remains years away [4].
Cryptographic Algorithm Exposure: Systems employing RSA-1024 or ECC P-256 face a higher risk than those using RSA-4096 or ECC P-384, providing slightly more security margin. However, all classical public-key cryptography should be considered vulnerable within the FTQC arrival window [1].
Attack Surface: Internet-facing systems with direct adversary access face a higher risk than air-gapped or physically controlled systems. However, supply chain attacks may compromise even isolated systems through firmware or software updates [16].

4.1.2. Phased Migration Strategies

Parallel Operation: Maintain classical and PQC systems in parallel during transition, routing traffic based on capability negotiation. This approach provides fallback capability but increases operational complexity and infrastructure costs [9].
Hybrid Cryptography: Employ hybrid schemes combining classical and PQC algorithms during transition. Hybrid approaches provide defense-in-depth but create ‘zombie’ algorithms: RSA and ECC become cryptographically obsolete (insecure against quantum attacks) yet operationally alive, wrapped inside PQC tunnels. These zombie libraries require continued patching for conventional vulnerabilities (buffer overflows, side-channels) throughout the multi-year transition, creating a long-term maintenance burden. Based on IPv4/IPv6 dual-stack maintenance experience, which showed 15–25% additional network operations overhead [27], and analysis of OpenSSL CVE frequency (averaging 4.2 security patches per year affecting RSA/ECC implementations 2019–2024), we estimate hybrid cryptographic maintenance adds 20–40% overhead to cryptographic operations staff time during transition. This estimate carries medium confidence given limited direct empirical data on PQC hybrid deployments; longitudinal studies of early adopters will provide validation as migrations progress. Hybrid approaches double the cryptographic overhead and increase certificate sizes further [8].
Prioritized Rollout: Migrate highest-risk systems first (SNDL-vulnerable data, internet-facing authentication, critical infrastructure), followed by moderate-risk systems, with low-risk or end-of-life systems potentially accepting residual quantum risk [14].

4.1.3. Contingency Planning

Organizations should develop contingency plans for:
FTQC Arrival Earlier Than Expected: Maintain accelerated migration plans that can be activated if quantum computing progress exceeds projections. Identify critical systems that absolutely must achieve quantum resistance and ensure these receive priority regardless of timeline pressures [3,7].
Algorithm Cryptanalysis: Monitor cryptanalytic research for potential vulnerabilities in NIST-standardized PQC algorithms. Maintain crypto-agility, allowing rapid algorithm substitution if needed [21].
Vendor Delays: Identify critical vendor dependencies and develop alternatives (competing vendors, open-source implementations, custom development) to maintain migration momentum if key vendors fail to deliver [19].
Budget Constraints: Develop phased approaches with clear dependencies allowing work to pause and resume if budget constraints force temporary deferrals without losing progress [17].

4.2. Crypto-Agility Framework

4.2.1. Principles of Crypto-Agility

Crypto-agility—the capability to rapidly switch cryptographic algorithms without extensive system redesign—has emerged as a critical discipline for managing PQC transition and future cryptographic evolution [21]. Organizations that design systems with crypto-agility can respond rapidly to cryptanalytic breakthroughs, regulatory mandate changes, or performance optimization opportunities.
Key Principles:
Algorithm Abstraction: Design systems with clear separation between cryptographic operations and application logic. Applications should invoke cryptographic services through well-defined APIs without direct algorithm dependencies [21].
Parameter Flexibility: Avoid hardcoding key sizes, signature formats, or protocol versions. Store cryptographic parameters in configuration systems, allowing updates without code changes [9].
Protocol Negotiation: Implement robust capability negotiation in communication protocols, allowing endpoints to agree on supported algorithms dynamically. Ensure negotiation mechanisms resist downgrade attacks [15].
Monitoring and Metrics: Instrument systems to track cryptographic algorithm usage, performance characteristics, and failure modes. Analytics should identify systems lacking crypto-agility requiring prioritized remediation [14].

4.2.2. Implementation Strategies

Cryptographic Service Layer: Implement centralized cryptographic services providing algorithm-agnostic APIs to applications. Applications request “sign this data at security level X” rather than “generate an ECDSA P-256 signature.” The service layer maps security levels to appropriate algorithms based on the current policy [21].
Configuration Management: Maintain cryptographic policies in centralized configuration systems supporting gradual rollout, A/B testing, and rapid rollback. Policy updates should propagate through enterprise systems within minutes to hours, not days or weeks [14].
Testing and Validation: Develop comprehensive test suites validating system behavior across all supported algorithm combinations. Automated testing should prevent regressions when updating cryptographic libraries or introducing new algorithms [17].

4.2.3. Organizational Capabilities

Crypto-agility requires organizational capabilities beyond technical implementation:
Governance: Establish cryptographic review boards with authority to mandate algorithm changes, evaluate new cryptographic techniques, and enforce minimum security levels across the enterprise [17].
Expertise: Develop or acquire cryptographic engineering expertise capable of evaluating algorithm security, understanding implementation vulnerabilities, and advising on parameter selection [14].
Lifecycle Management: Integrate cryptographic algorithm lifecycle management into existing IT governance, treating algorithms as assets requiring regular assessment, planned obsolescence, and replacement [21].

4.3. Policy and Regulatory Considerations

4.3.1. Emerging Regulatory Mandates

Governments worldwide are developing PQC transition mandates with varying timelines and requirements:
United States: The Office of Management and Budget (OMB) and CISA have issued guidance for federal agencies requiring PQC migration planning and inventory completion. DoD has established timelines for quantum-resistant cryptography deployment across defense systems. Financial regulators are evaluating PQC requirements for critical financial infrastructure [4,8]. NIST IR 8547 (November 2024) provides updated federal guidance on transition planning and algorithm selection [28].
European Union: ENISA has published PQC implementation guidance and recommendations for EU member states. Individual countries are developing national migration strategies aligned with EU cybersecurity frameworks. Critical infrastructure operators face emerging requirements for quantum-resilient security [20].
International: Other nations, including China, the UK, Canada, Australia, and Japan, have initiated PQC transition programs with varying degrees of mandatory requirements for government systems, critical infrastructure, and regulated industries [18].

4.3.2. Compliance Timeline Challenges

Regulatory mandates face challenges in establishing realistic timelines. Regulators must balance security urgency against industry capacity constraints. Mandates that are too aggressive risk mass non-compliance or prioritization of compliance over security effectiveness. Mandates that are too lenient may fail to drive adequate urgency given SNDL threats and FTQC arrival projections [4].
Enterprises operating across multiple jurisdictions must navigate potentially conflicting requirements, different timeline expectations, and varying cryptographic algorithm approvals. International coordination on regulatory harmonization remains limited, creating compliance complexity for multinational enterprises [18].

4.4. Limitations and Uncertainty Analysis

Technology forecasting inherently carries uncertainty, and responsible analysis must explicitly characterize that uncertainty rather than presenting estimates as definitive predictions. This section documents the sources of uncertainty in our timeline estimates, the sensitivity of conclusions to key assumptions, and the methodological limitations of the analysis.
Sources of Uncertainty: Several factors introduce uncertainty into timeline projections:
  • FTQC Arrival Timing: The 2028–2033 window represents a range, not a point prediction, with substantial tail risk in both directions. Unexpected breakthroughs in quantum error correction could accelerate arrival; unforeseen technical barriers could delay it. Our timeline estimates assume FTQC arrives within this window; earlier arrival compresses the available migration window, while later arrival provides additional margin.
  • Vendor Ecosystem Development: Timelines assume major vendors deliver PQC-capable products within 2–4 years of standardization, which may prove optimistic if implementation challenges emerge or pessimistic if competitive pressure accelerates development.
  • Regulatory Mandate Timing: Emerging government requirements could accelerate organizational timelines through mandate pressure or extend them if compliance demonstration requirements prove burdensome.
  • Cryptanalytic Developments: Potential vulnerabilities discovered in NIST-standardized PQC algorithms could necessitate re-migration, significantly extending overall timelines. While NIST’s extensive review process reduces this risk, it cannot be eliminated.
Sensitivity Analysis: Timeline estimates are most sensitive to: (1) HSM replacement cycle timing (high sensitivity)—organizations able to accelerate HSM refresh can compress timelines by 2–3 years, while those locked into long refresh cycles face corresponding extensions; (2) Personnel availability (high sensitivity)—adequate cryptographic engineering capacity can accelerate discovery and planning phases significantly; (3) Vendor ecosystem readiness (medium sensitivity)—heavily affects SaaS-dependent small enterprises, less relevant for organizations with in-house development capacity; (4) Partner coordination requirements (variable sensitivity)—critical for organizations in tightly-coupled supply chains, less relevant for organizations with primarily internal-facing systems.
Methodological Limitations: This analysis is subject to several limitations that readers should consider when applying findings to specific organizational contexts:
  • Estimates are derived from structured expert judgment rather than empirical measurement of completed migrations, which are not yet available.
  • Historical migration analogies (AES, SHA-1, TLS 1.3) have limited applicability given PQC’s unique characteristics—larger parameters, hybrid requirements, and broader ecosystem scope.
  • The analysis is weighted toward U.S. and European enterprise contexts given the author’s experience and source availability; generalization to other regions requires adjustment for local vendor ecosystem maturity, regulatory environment, and expertise availability.
  • The rapidly evolving technology and policy landscape may render specific timeline estimates obsolete as conditions change; the analytical framework and dependency relationships are more durable than point estimates.
Despite these limitations, the convergence of our estimates with independently-derived timelines from CISA/NSA/NIST, Netherlands NCSA, and BSI provides confidence that the order of magnitude is correct even if specific year estimates carry significant uncertainty bands.

5. Conclusions and Future Directions

5.1. Future Research Directions

Several critical areas warrant further investigation:
Automated Migration Tools: Development of automated discovery, assessment, and migration planning tools could substantially reduce timeline and resource requirements. Research into AI-assisted cryptographic code analysis and automated hybrid implementation could accelerate deployment [14].
Performance Optimization: Continued research into PQC algorithm optimization, particularly for embedded systems and resource-constrained environments, could enable broader deployment. Hardware acceleration and specialized cryptographic coprocessors may prove critical for maintaining performance [9].
Post-Quantum Blockchain: Blockchain systems face unique migration challenges given distributed consensus requirements and backward compatibility constraints. Research into PQC-resilient blockchain architectures and migration strategies remains nascent [16].
Supply Chain Coordination: Development of industry-specific coordination frameworks, standardized migration playbooks, and interoperability testing regimens could reduce inter-enterprise synchronization overhead [2,18].
Quantum-Resistant Zero Trust: Further research into optimized Zero Trust architectures accounting for PQC performance characteristics could inform design patterns minimizing migration disruption [20].
Simulation-Based Migration Modeling: Discrete-event simulation of enterprise migration processes and agent-based modeling of ecosystem coordination dynamics represent promising approaches for validating and refining the expert-judgment-based estimates presented in this paper. Such models, once calibrated against early migration experiences, could provide more precise timeline predictions and enable scenario analysis for specific organizational configurations. Longitudinal empirical studies tracking actual migration outcomes as early adopters progress will provide critical validation data for both expert estimates and simulation models.

5.2. Concluding Remarks

Migration to post-quantum cryptography represents an estimated decade-long undertaking for most enterprises, with baseline timelines of 5–7 years for small enterprises, 8–12 years for medium enterprises, and 12–15+ years for large enterprises under typical assumptions. These timelines reflect the compounding effects of infrastructure complexity, non-portable embedded devices, personnel scarcity, budget constraints, planning quality variability, and essential inter-enterprise coordination [6,13,14].
Unlike past cryptographic migrations, PQC requires unprecedented ecosystem-wide synchronization spanning industries, national boundaries, and regulatory frameworks [2,18]. The multi-dimensional challenge space encompasses technical, organizational, economic, and geopolitical factors that resist simple solutions or accelerated timelines through resource allocation alone.
Enterprises should plan for extended hybrid operation, maintaining both classical and post-quantum cryptographic capabilities throughout multi-year transitions. This hybrid operation increases operational complexity, infrastructure costs, and attack surface, but represents the only pragmatic path forward given ecosystem dependencies and vendor timeline constraints [9,21].
Investment in crypto-agility—designing systems capable of rapidly switching cryptographic algorithms—should be viewed not merely as a PQC migration enabler but as a permanent capability for managing future cryptographic evolution. The PQC transition provides an opportunity to establish organizational structures, technical architectures, and governance processes supporting algorithm agility for decades to come [21].
Given FTQC arrival projections between 2028 and 2033 [3,4], and the Store Now Decrypt Later threat affecting data encrypted today, enterprises should initiate migration planning immediately despite lengthy execution timelines. The juxtaposition of estimated migration timelines (12–15 years) against FTQC arrival (5–10 years) reveals a potential systemic risk exposure. Large enterprises face a risk deficit where the time required to secure infrastructure may exceed the time remaining before the threat materializes. This is not a planning failure but may represent an intrinsic property of complex system inertia meeting advancing threat capability.
Organizations that defer migration planning until FTQC arrives may face crisis scenarios with compressed timelines, emergency resource allocation, and substantially elevated risk of quantum attacks against unprepared systems. Early planning, sustained executive commitment, adequate resource allocation, and ecosystem-wide coordination represent the most promising path to managing quantum cryptographic risk effectively.
The PQC transition represents not merely a technical upgrade but a fundamental transformation of enterprise cryptographic architectures requiring sustained commitment over more than a decade. Success requires treating migration as a strategic imperative, warranting executive attention, dedicated program management, and sustained funding comparable to other enterprise transformations rather than routine technology refreshes.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study.

Acknowledgments

The author acknowledges the contributions of the cryptographic research community, NIST PQC standardization participants, and industry practitioners sharing migration experiences that informed this analysis.

Conflicts of Interest

The authors declare no conflicts of interests.

References

  1. Gheorghiu, V.; Mosca, M. Benchmarking the Quantum Cryptanalysis of Symmetric, Public-Key and Hash-Based Cryptographic Schemes. arXiv 2019, arXiv:1902.02332. Available online: https://arxiv.org/abs/1902.02332 (accessed on 13 December 2025).
  2. Stebila, D. Standardizing Post-Quantum Cryptography at the IETF. PKIC 2023. 2023. Available online: https://d1kjwivbowugqa.cloudfront.net/files/research/presentations/20230326-RWPQC.pdf (accessed on 13 December 2025).
  3. Mosca, M.; Piani, M. Quantum Threat Timeline Report 2023; Global Risk Institute: Toronto, ON, Canada, 2023; Available online: https://globalriskinstitute.org/publication/2023-quantum-threat-timeline-report/ (accessed on 13 December 2025).
  4. CISA; NSA; NIST. Quantum-Readiness: Migration to Post-Quantum Cryptography. Joint Factsheet. August 2023. Available online: https://media.defense.gov/2023/Aug/21/2003284212/-1/-1/0/CSI-QUANTUM-READINESS.PDF (accessed on 13 December 2025).
  5. Quantinuum. Quantinuum Accelerates the Path to Universal Fully Fault-Tolerant Quantum Computing. November 2024. Available online: https://www.quantinuum.com/blog/quantinuum-accelerates-the-path-to-universal-fault-tolerant-quantum-computing-supports-microsofts-ai-and-quantum-powered-compute-platform-and-the-path-to-a-quantum-supercomputer (accessed on 13 December 2025).
  6. IonQ. IonQ Roadmap toward Cryptographically Relevant Quantum Computer by 2028. June 2024. Available online: https://postquantum.com/industry-news/ionqroadmap-crqc/ (accessed on 13 December 2025).
  7. IBM. IBM Lays Out Clear Path to Fault-Tolerant Quantum Computing. IBM Quantum Blog. June 2024. Available online: https://www.ibm.com/quantum/blog/large-scale-ftqc (accessed on 13 December 2025).
  8. National Institute of Standards and Technology. NIST Announces First Post-Quantum Cryptography Standards (FIPS 203, 204, 205). August 2024. Available online: https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards (accessed on 13 December 2025).
  9. National Institute of Standards and Technology. Getting Ready for Post-Quantum Cryptography. NIST Cybersecurity White Paper. 2021. Available online: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf (accessed on 13 December 2025).
  10. National Institute of Standards and Technology. Announcing the Advanced Encryption Standard (AES). FIPS PUB 197. November 2001. Available online: https://csrc.nist.gov/publications/detail/fips/197/final (accessed on 13 December 2025).
  11. Microsoft. SHA-1 Signed Content Retired. Microsoft Learn. 2017. Available online: https://learn.microsoft.com/en-us/lifecycle/announcements/sha-1-signed-content-retired (accessed on 13 December 2025).
  12. Rescorla, E. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. August 2018. Available online: https://www.rfc-editor.org/rfc/rfc8446 (accessed on 13 December 2025).
  13. National Institute of Standards and Technology. Transitioning the Use of Cryptographic Algorithms and Key Lengths. SP 800-131A Rev. 2. 2019. Available online: https://csrc.nist.gov/publications/detail/sp/800-131a/rev-2/final (accessed on 13 December 2025).
  14. Cloud Security Alliance. Preparing Enterprises for Post-Quantum Cryptography. 2022. Available online: https://cloudsecurityalliance.org/research/post-quantum-cryptography (accessed on 13 December 2025).
  15. IETF. Post-Quantum Cryptography Recommendations for TLS and Related Protocols (draft-ietf-pqc-tls). 2023. Available online: https://datatracker.ietf.org/doc/draft-ietf-uta-pqc-app/ (accessed on 13 December 2025).
  16. National Institute of Standards and Technology. Post-Quantum Cryptography Standardization Project. 2022. Available online: https://csrc.nist.gov/projects/post-quantum-cryptography (accessed on 13 December 2025).
  17. DARPA. Quantum Benchmarking Initiative (QBI). November 2024. Available online: https://www.darpa.mil/program/quantum-benchmarking-initiative (accessed on 13 December 2025).
  18. Netherlands National Communications Security Agency. The PQC Migration Handbook. March 2023. Available online: https://english.aivd.nl/publications/publications/2023/04/04/the-pqc-migration-handbook (accessed on 13 December 2025).
  19. Encryption Consulting. How to Start Your Enterprise PQC Migration Plan. 2023. Available online: https://www.encryptionconsulting.com/how-to-start-your-enterprise-post-quantum-cryptography-migration-plan/ (accessed on 13 December 2025).
  20. BSI. BSI TR-02102-1. Cryptographic Mechanisms: Recommendations and Key Lengths. 2023. Available online: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-1.pdf (accessed on 13 December 2025).
  21. NIST National Cybersecurity Center of Excellence. Migration to Post-Quantum Cryptography. 2021. Available online: https://www.nccoe.nist.gov/crypto-agility-considerations-migrating-post-quantum-cryptographic-algorithms (accessed on 13 December 2025).
  22. Tetlock, P.E.; Gardner, D. Superforecasting: The Art and Science of Prediction; Crown Publishers: New York, NY, USA, 2015. [Google Scholar]
  23. U.S. Small Business Administration. Table of Size Standards. 2025. Available online: https://www.sba.gov/document/support-table-size-standards (accessed on 13 December 2025).
  24. Reserve Bank of India. MSME FAQs. 2025. Available online: https://www.rbi.org.in/commonman/Upload/English/FAQs/PDFs/MICRO30072025E.pdf (accessed on 13 December 2025).
  25. IndiaFilings. MSME Definition: Revised Investment & Turnover Limits. 2025. Available online: https://www.indiafilings.com/learn/msme-new-definition/ (accessed on 13 December 2025).
  26. Economic Times. Firms up to Rs 500 Crore Are Now Medium; MSMEs Get a New Definition. 2025. Available online: https://economictimes.indiatimes.com/small-biz/sme-sector/firms-up-to-rs-500-crore-are-now-medium-msmes-get-a-new-definition/articleshow/117823447.cms (accessed on 13 December 2025).
  27. Huston, G. IPv6 Transition Costs and Operational Overhead. APNIC Blog. 2022. Available online: https://blog.apnic.net/2025/08/25/the-ipv6-divide/ (accessed on 13 December 2025).
  28. National Institute of Standards and Technology. Transition to Post-Quantum Cryptography Standards. NIST IR 8547. November 2024. Available online: https://csrc.nist.gov/pubs/ir/8547/ipd (accessed on 13 December 2025).
Figure 1. Migration Factor Dependency Diagram. Causal relationships between PQC migration factors showing internal vs. external dependencies. Thicker arrows indicate stronger dependencies. Dashed lines indicate timeline pressure or feedback loops. Critical path for small enterprises dominated by vendor ecosystem; for large enterprises by HSM certification and partner coordination.
Figure 1. Migration Factor Dependency Diagram. Causal relationships between PQC migration factors showing internal vs. external dependencies. Thicker arrows indicate stronger dependencies. Dashed lines indicate timeline pressure or feedback loops. Critical path for small enterprises dominated by vendor ecosystem; for large enterprises by HSM certification and partner coordination.
Computers 15 00009 g001
Table 1. IoT/OT Migration Cost Framework by Sector.
Table 1. IoT/OT Migration Cost Framework by Sector.
SectorDevice TypeUnit Cost RangeFleet Scale Impact
UtilitiesSmart meters$150–$400/unit$150 M–$4 B (1–10 M units)
ManufacturingIndustrial robots$5 K–$15 K/unit$250 M–$750 M (50 K units)
HealthcareMedical devicesVaries by FDA classFDA guidance-driven
LogisticsVehicle telematics$200–$800/unit$20 M–$80 M (100 K units)
AlternativeNetwork segmentation$50 K–$500 KPer deployment scope
AlternativeCrypto gateways$100 K–$1 MEnterprise deployment
Note: Costs are order-of-magnitude estimates based on industry consultation. Actual costs vary significantly based on vendor pricing, installation requirements, and organizational context. Organizations should conduct a detailed TCO analysis as part of migration planning.
Table 2. PQC Migration Timeline Estimates by Enterprise Size.
Table 2. PQC Migration Timeline Estimates by Enterprise Size.
Enterprise SizeOptimisticBaselinePessimisticKey Assumptions
Small3–4 years5–7 years8–10 yearsVendor readiness, SaaS reliance, budget
Medium6–8 years8–12 years12–15 yearsHybrid cloud, legacy systems, partners
Large9–12 years12–15 years15–20+ yearsGlobal ops, IoT/OT, regulation, supply chain
Scenario assumptions: Optimistic assumes favorable vendor timelines, adequate budget, minimal legacy burden, and effective coordination. Baseline assumes typical enterprise constraints and dependencies. Pessimistic assumes vendor delays, budget constraints, extensive legacy systems, and coordination failures. FTQC arrival window: 2028–2033 [3,4].
Table 3. Comparative Analysis of Enterprise Migration Factors.
Table 3. Comparative Analysis of Enterprise Migration Factors.
FactorSmallMediumLarge
Infrastructure ImpactLowModerateHigh
Personnel AvailabilityLimitedModerateExtensive but siloed
Geographic ExpertiseRegion-dependentRegion-dependentMulti-region
GovernanceMinimalStructuredHeavy, regulated
Vendor DependenceHighMediumVery high
Legacy System BurdenLowModerateSevere
Migration SpeedFast but riskyBalancedSlow but thorough
Budget FlexibilityConstrainedModerateAvailable, allocated
Compliance OverheadMinimalModerateExtensive
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Campbell, R. Enterprise Migration to Post-Quantum Cryptography: Timeline Analysis and Strategic Frameworks. Computers 2026, 15, 9. https://doi.org/10.3390/computers15010009

AMA Style

Campbell R. Enterprise Migration to Post-Quantum Cryptography: Timeline Analysis and Strategic Frameworks. Computers. 2026; 15(1):9. https://doi.org/10.3390/computers15010009

Chicago/Turabian Style

Campbell, Robert. 2026. "Enterprise Migration to Post-Quantum Cryptography: Timeline Analysis and Strategic Frameworks" Computers 15, no. 1: 9. https://doi.org/10.3390/computers15010009

APA Style

Campbell, R. (2026). Enterprise Migration to Post-Quantum Cryptography: Timeline Analysis and Strategic Frameworks. Computers, 15(1), 9. https://doi.org/10.3390/computers15010009

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop