The cryptographic foundations that protect every citizen record, every tax filing, and every inter-agency communication your organization handles today are on a countdown clock. Quantum computers capable of breaking widely used public-key encryption may arrive within the next decade, and adversaries are already harvesting encrypted data now with plans to decrypt it later. The good news: the standards and tools you need to begin preparing are available today.
This guide walks state and local government IT leaders through a practical, phased roadmap to reach quantum readiness before NIST’s 2035 deprecation deadline for quantum-vulnerable algorithms.
The Threat: Why “Harvest Now, Decrypt Later” Demands Urgency
Modern public-key cryptography, including RSA and Elliptic Curve Cryptography (ECC), relies on math problems that are extraordinarily difficult for classical computers to solve. A sufficiently powerful quantum computer, however, could solve those same problems efficiently using algorithms like Shor’s algorithm, rendering today’s encryption ineffective.
The danger is not hypothetical. Nation-state adversaries are executing “harvest now, decrypt later” (HNDL) strategies: intercepting and storing encrypted government communications today with the intention of decrypting them once quantum computers become available. For government organizations that handle sensitive citizen data, law enforcement records, and critical infrastructure systems, this means that data encrypted today could be exposed in the future.
CISA has identified this threat as a priority for state, local, tribal, and territorial (SLTT) entities and established its Post-Quantum Cryptography Initiative to help organizations across all levels of government prepare for the transition.
NIST Post-Quantum Cryptography Standards: What You Need to Know
In August 2024, NIST released the first three finalized post-quantum cryptography (PQC) standards, marking a watershed moment for cybersecurity. These standards are ready for immediate use:
- FIPS 203 (ML-KEM): Module-Lattice-Based Key-Encapsulation Mechanism, intended as the primary standard for general encryption and key exchange. Based on the CRYSTALS-Kyber algorithm, it offers small encryption keys and fast performance.
- FIPS 204 (ML-DSA): Module-Lattice-Based Digital Signature Algorithm, the primary standard for digital signatures. Built on the CRYSTALS-Dilithium algorithm.
- FIPS 205 (SLH-DSA): Stateless Hash-Based Digital Signature Algorithm, a backup digital signature method based on a different mathematical approach (SPHINCS+), providing defense-in-depth.
Additional algorithms are in the pipeline. The Falcon digital signature algorithm (to be standardized as FN-DSA) and the HQC key encapsulation mechanism have been selected for ongoing standardization.
Critically, NIST has published NIST IR 8547, a transition roadmap that calls for deprecating quantum-vulnerable algorithms from federal standards by 2035, with high-risk systems expected to transition much earlier. Government organizations should treat this timeline as a firm deadline, not a suggestion.
Microsoft’s Quantum-Safe Capabilities in Azure
Microsoft has been investing in post-quantum cryptography since 2014 and is deeply involved in the standards that will protect your data. Here is how Azure is positioning government organizations for the quantum-safe future:
Azure Key Vault Managed HSM
Azure Key Vault Managed HSM provides FIPS 140-3 Level 3 validated hardware security modules as a fully managed cloud service. Importantly, OCT-HSM 256-bit symmetric keys used with AES algorithms in Managed HSM are already quantum-resistant. As noted in Microsoft’s key documentation, these keys align with the Commercial National Security Algorithm Suite (CNSA) 2.0 guidance for quantum-resistant symmetric cryptography.
For government agencies, this means you can begin using quantum-resistant symmetric encryption for data at rest today, while planning the migration of asymmetric (public-key) algorithms to PQC standards.
Azure Quantum Resource Estimator for Quantum-Safe Planning
The Azure Quantum Resource Estimator includes a dedicated quantum-safe planning tool available free of charge at quantum.microsoft.com. This tool allows your security team to estimate the resources a future quantum computer would need to break specific encryption algorithms (RSA, ECC, AES) based on key strength, qubit type, and error rates.
This is invaluable for risk assessment: you can model exactly how vulnerable your current encryption posture is under different quantum computing scenarios and make data-driven decisions about migration priorities.
Microsoft Research and the Open Quantum Safe Project
Microsoft Research maintains an active Post-Quantum Cryptography research program that contributed candidates to the NIST standardization process. Microsoft is also a key participant in the Open Quantum Safe (OQS) project, part of the Linux Foundation’s Post-Quantum Cryptography Alliance, helping develop the open-source liboqs library and protocol integrations for TLS and SSH.
Additionally, Microsoft is participating in the NIST NCCoE PQC Migration Project, working alongside government and industry partners to build tools for detecting vulnerable algorithms and testing quantum-safe protocol interoperability.
Your Five-Phase Quantum Readiness Roadmap
Here is a practical, phased approach to achieving quantum readiness by 2030, well ahead of NIST’s 2035 deprecation deadline.
Phase 1: Cryptographic Discovery and Inventory (Now through Mid-2026)
You cannot protect what you do not understand. The first step is a complete inventory of where and how cryptography is used across your environment.
- Catalog all cryptographic assets: Identify every system, application, and service that uses public-key cryptography (RSA, ECC, Diffie-Hellman). Include certificates, VPN tunnels, TLS endpoints, code signing, email encryption, and database encryption.
- Map data sensitivity and lifecycle: Determine which data needs to remain confidential for 10, 20, or 30+ years. Citizen records, law enforcement data, and critical infrastructure configurations are top priorities because they are most vulnerable to HNDL attacks.
- Document vendor dependencies: Many government systems rely on third-party software and cloud services. Identify which vendors have published PQC migration roadmaps.
Phase 2: Risk Assessment and Prioritization (Mid-2026 through End of 2026)
- Use the Azure Quantum Resource Estimator to model quantum threats against your current encryption algorithms and key sizes.
- Prioritize by data longevity: Systems protecting data with the longest required confidentiality periods should migrate first.
- Assess certificate infrastructure: Public Key Infrastructure (PKI) and certificate authorities are particularly complex to migrate. Begin planning early.
- Evaluate HNDL exposure: Any data currently traversing public networks (including internet-facing services) is potentially being harvested.
Phase 3: Architecture Planning and Crypto-Agility (2027)
Crypto-agility, the ability to swap cryptographic algorithms without redesigning entire systems, is the single most important architectural principle for the quantum transition.
- Adopt crypto-agile design patterns: Ensure new systems abstract cryptographic operations so algorithms can be changed via configuration rather than code changes.
- Leverage Azure Key Vault: Centralizing key management in Azure Key Vault simplifies algorithm rotation across your environment.
- Begin using quantum-resistant symmetric encryption: Deploy AES-256 with Azure Key Vault Managed HSM for data-at-rest protection.
- Update procurement policies: Require PQC readiness and crypto-agility in all new technology acquisitions.
Phase 4: Pilot Migration and Testing (2028)
- Stand up a PQC test lab: Use the NIST-standardized ML-KEM and ML-DSA algorithms in a non-production environment to evaluate performance impacts (PQC algorithms generally have larger key sizes and signatures).
- Test protocol integrations: Validate that PQC works with your TLS, VPN, and SSH implementations. The Open Quantum Safe project provides prototype integrations for testing.
- Measure performance: PQC algorithms introduce different computational and bandwidth trade-offs. Test against your real-world workloads, especially for latency-sensitive citizen-facing services.
- Train your teams: Ensure security architects, developers, and operations staff understand PQC concepts and implementation requirements.
Phase 5: Production Migration (2029-2030)
- Deploy hybrid cryptography first: Use PQC algorithms alongside classical algorithms in a hybrid mode during transition. This provides quantum resistance while maintaining backward compatibility.
- Migrate highest-risk systems first: Internet-facing services, PKI infrastructure, and long-lived data stores should be first in production.
- Update compliance documentation: Revise security policies, system security plans, and audit procedures to reflect PQC adoption.
- Establish ongoing monitoring: Quantum computing advances rapidly. Maintain awareness of new developments and be prepared to update algorithms as standards evolve.
Why This Matters for Government
State and local government organizations face unique urgency in the quantum transition:
- Long data retention requirements: Government records often must be preserved for decades. Data encrypted with quantum-vulnerable algorithms today could be decrypted by adversaries in the future, violating privacy obligations and regulatory requirements.
- Critical infrastructure dependencies: Government IT systems underpin essential services, from water treatment and traffic management to emergency response. A cryptographic failure could have cascading consequences.
- Compliance mandates are coming: NIST IR 8547 establishes a clear federal timeline. While state and local governments are not directly bound by federal mandates, CISA guidance strongly recommends that SLTT entities follow the same migration path. Many state compliance frameworks reference NIST standards.
- Budget planning takes time: Government procurement and budget cycles are long. Starting planning now ensures you can secure funding for PQC migration in upcoming fiscal years rather than scrambling for emergency appropriations.
- Azure provides a head start: Organizations already using Azure benefit from Microsoft’s proactive investment in quantum-safe capabilities. Azure Key Vault Managed HSM with quantum-resistant symmetric keys, the Azure Quantum Resource Estimator for threat modeling, and Microsoft’s deep involvement in PQC standardization mean your cloud platform is already moving in the right direction.
The quantum threat is not a distant hypothetical. Standards are finalized, tools are available, and adversaries are already positioning for a post-quantum world. The organizations that begin their cryptographic migration today will be the ones best positioned to protect their citizens’ data for decades to come.
Additional Resources
- NIST Post-Quantum Cryptography Standards
- NIST Releases First 3 Finalized Post-Quantum Encryption Standards (August 2024)
- NIST IR 8547: Transition to Post-Quantum Cryptography Standards
- CISA Post-Quantum Cryptography Initiative
- Azure Key Vault Managed HSM Overview
- Azure Key Vault Keys - Quantum-Resistant Cryptography
- Azure Quantum Resource Estimator for Quantum-Safe Planning
- Microsoft Research: Post-Quantum Cryptography
- Open Quantum Safe Project
