TL;DR
The post-quantum cryptographic migration is driven by multiple independent timelines: standards body schedules (NIST FIPS standards, published 2024), US defence deadlines (NSA CNSA 2.0, 2025-2035), EU coordinated roadmap (2030 target for critical systems), agency-specific guidance (BSI, ANSSI, UK NCSC), and industry rollouts (browser vendors, CDN providers, cloud platforms). This post consolidates every published deadline on one page, with links to primary sources. Specific per-scope dates: software-firmware signing begins 2025 (CNSA), critical systems target 2030 (EU), full National Security Systems by 2035 (NSA). Non-regulated organisations have no legal deadline but have a risk-management case to migrate before 2030 for any data with multi-year confidentiality requirements.
Who this is for
Compliance officers, security architects, and executive teams planning the post-quantum migration. Programme managers building multi-year roadmaps. Anyone who needs to cite the authoritative deadlines in a planning document.
Table of contents
- Why there is no single timeline
- Standards body timeline (NIST)
- US National Security Systems (NSA CNSA 2.0)
- EU coordinated implementation roadmap
- Germany (BSI)
- France (ANSSI)
- United Kingdom (NCSC)
- Industry rollouts (browsers, CDNs, clouds)
- QuickZTNA roadmap
- A consolidated visual timeline
- What to do now
1. Why there is no single timeline
Post-quantum migration is not one project. It is a set of parallel migrations across protocols, products, sectors, and jurisdictions, each with its own regulator and its own deadline.
Four layers of timeline operate simultaneously.
- Standards. NIST publishes the algorithm standards (FIPS 203, 204, 205 in 2024). Until these exist, nothing can be “PQ-compliant”.
- Regulator mandates. Specific agencies mandate adoption on specific dates for specific scopes (NSA for NSS; some sector regulators).
- Industry adoption. Browsers, clouds, CDNs, and VPN vendors ship post-quantum without waiting for mandates, because their users ask for it or their threat model requires it.
- Organisation decisions. Each organisation picks its own target dates informed by the first three plus its own risk tolerance.
A coherent post-quantum plan addresses all four. An organisation-specific plan is written against regulator mandates and risk, informed by what industry is shipping.
2. Standards body timeline (NIST)
| Year | Milestone | Primary source |
|---|---|---|
| 2016 | NIST Post-Quantum Cryptography Standardisation process begins | NIST announcement |
| 2022 | Kyber, Dilithium, SPHINCS+ selected; Falcon as additional signature | NIST Round 3 results |
| 2024 (August 13) | FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), FIPS 205 (SLH-DSA) published | FIPS 203 at csrc.nist.gov, FIPS 204, FIPS 205 |
| 2024 | NIST IR 8547 (draft) — Transition to Post-Quantum Cryptography Standards | NIST IR 8547 |
| 2025 (expected) | NIST IR 8547 finalisation and ongoing guidance updates | NIST |
| Ongoing | SP 800-series updates referencing PQ algorithms | NIST |
NIST standards are the foundation. Everything downstream (FIPS 140-3 module validation, vendor implementations, compliance regimes) builds on them.
3. US National Security Systems (NSA CNSA 2.0)
From the September 2022 NSA Cybersecurity Advisory. See our CNSA 2.0 deadlines post for the detail.
| Technology class | Begin using | Use exclusively |
|---|---|---|
| Software and firmware signing | 2025 | 2030 |
| Software customisations | 2025 | 2030 |
| Traditional networking equipment (VPN, router) | 2026 | 2030 |
| Web browsers, web servers, cloud services | 2025 | 2033 |
| Operating systems | 2027 | 2033 |
| Niche equipment | 2028 | 2030 |
| NSS-wide | — | 2035 |
These are NSS scope. Non-NSS federal systems follow NIST general guidance. Non-federal organisations can use CNSA 2.0 as a reference but are not bound.
4. EU coordinated implementation roadmap
The European Commission’s Recommendation on a Coordinated Implementation Roadmap for the Transition to Post-Quantum Cryptography (2024) sets coordinated transition targets across EU member states.
Key targets from the recommendation:
- By end of 2026: member states complete initial PQ transition strategies and asset inventories.
- By 2030: critical systems across the EU operating on post-quantum cryptography.
- Beyond 2030: transition extends across broader scope per member state implementations.
The recommendation is guidance, not a regulation — member states set their own binding schedules. NIS2 transposition in each member state will typically reference or align with the roadmap. See our NIS2 post.
5. Germany (BSI)
The BSI’s position papers, particularly “Migration zu Post-Quanten-Kryptografie” (2024), set planning expectations.
- Now: migrate any system with confidentiality requirements extending past 2030 to hybrid PQ.
- 2025-2028: wider hybrid deployments become standard.
- Annual updates to TR-02102-1 progressively formalise PQ expectations.
6. France (ANSSI)
ANSSI’s three-phase plan (see our ANSSI post):
- Phase 1 (2022-2024): hybrid deployments with early-PQ primitives.
- Phase 2 (2025-onwards): hybrid deployments with FIPS-standardised primitives.
- Phase 3 (2030+, conditional): potential migration to pure PQ.
Timeline expectations for French public sector and OIV operators align with Phase 2 being the current state.
7. United Kingdom (NCSC)
The UK’s NCSC “Next steps in preparing for post-quantum cryptography” (November 2023) provides the UK position.
Key NCSC positions:
- Now: understand cryptographic dependencies; assess data protection lifetimes.
- 2024-2028: pilot PQ in new system designs.
- 2028-2035: widespread transition.
- By 2035: UK government systems predominantly on PQ cryptography.
NCSC’s framing is lighter on hard deadlines than NSA CNSA 2.0, emphasising planning and incremental transition.
8. Industry rollouts (browsers, CDNs, clouds)
Specific industry deployments, verified against public announcements on publish date.
Browsers
- Chrome: Hybrid X25519Kyber768 rolled out starting mid-2023, enabled by default for connections to hybrid-capable servers. Transitioned to ML-KEM-based naming post-FIPS 203.
- Edge: Inherits Chromium support.
- Firefox: Hybrid PQ supported and enabled by default on connections to hybrid-capable servers.
- Safari: Rollout varies by macOS version; consult Apple release notes.
CDNs and edge networks
- Cloudflare: Post-quantum TLS 1.3 hybrid on edge endpoints from 2023 onward. See Cloudflare Zero Trust blog.
- AWS: Post-quantum rollouts on KMS, several TLS endpoints, other services. See AWS post-quantum signature algorithms page.
- Google Cloud: Hybrid PQ on internal traffic documented in 2024; edge services rollout ongoing.
VPN and ZTNA vendors
- QuickZTNA: Hybrid X25519 + ML-KEM-768 on every tunnel, every tier, from product launch.
- Tailscale, NetBird, Twingate, Zscaler, others: check current vendor documentation for per-product status.
Messaging
- Signal: PQXDH post-quantum key exchange rolled out 2023-2024.
- iMessage: PQ3 protocol launched 2024.
9. QuickZTNA roadmap
Our specific commitments through 2027.
- Shipping (2026-Q2): Hybrid X25519 + ML-KEM-768 on every tunnel, every tier.
- Shipping (2026-Q2): Per-session kex mode logging, dashboard visibility.
- 2026-Q3: ML-KEM-1024 opt-in per organisation, for CNSA 2.0 alignment.
- 2026-Q3: LMS signing on Windows MSI and Linux installers.
- 2026-Q4: ML-DSA-87 certificate signatures on control-plane paths.
- 2026-Q4: FIPS 140-3 CMVP submission for the crypto module.
- 2027-Q1: Strict policy option to refuse classical-only fallback tunnels.
- 2027-Q2: Published interop test vectors for third-party audit.
We publish roadmap updates quarterly. Specific milestones may move. What will not move: our commitment that every tunnel ships with hybrid PQ by default on every tier.
10. A consolidated visual timeline
2020 2022 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035
│ │ │ │ │ │ │ │ │ │ │ │ │ │
│ │ FIPS │ │ │ │ │ │ │ │ │ │ │
│ │ 203 204 │ │ │ │ │ │ │ │ │ │ │
│ │ 205 │ │ │ │ │ │ │ │ │ │ │
│ │ published │ │ │ │ │ │ │ │ │ │ │
│ │ │ │ │ │ │ │ │ │ │ │ │
│ CNSA 2.0 CNSA CNSA CNSA CNSA CNSA
│ announced SW+FW Net Web OS NSS-wide
│ begin begin begin begin exclusive
│ use use use use
│
│ ML-KEM enabled in major browsers, CDNs, clouds
│
│ EU roadmap: critical systems on PQ by 2030
│
NIST PQC CNSA 2.0 transition period CNSA
competition complete
in progress
Visual is simplified. Each regulator has its own fine-grained schedule. Dates shown are the earliest “begin using” date per class from CNSA 2.0.
11. What to do now
Six actions independent of which regulator applies to you.
11.1 Build a cryptographic inventory (CBOM)
You cannot migrate what you have not catalogued. Document every protocol, every library, every key exchange, every signature algorithm in use. Align with NIST IR 8413 format or an internal schema.
11.2 Classify data by retention
For each data category, document how long confidentiality must be maintained. Categories with confidentiality past 2030 are the priority for PQ migration.
11.3 Deploy hybrid PQ on new systems by default
Any greenfield system specifying TLS 1.3 should enable hybrid PQ. Any new VPN or ZTNA deployment should use hybrid PQ. Do not wait for a mandate.
11.4 Audit third-party dependencies
What PQ posture do your cloud providers, SaaS vendors, and CDN providers have? Update vendor questionnaires to include PQ questions (see our vendor-questions post).
11.5 Plan the transition in your multi-year budget
PQ migration is typically a multi-year programme. Budget for it in 2027 and 2028 cycles. Compliance-driven migrations may need dedicated funding earlier.
11.6 Track the regulator calendar
Subscribe to NIST CSRC announcements, NSA Cybersecurity Advisories, your jurisdictional agency (BSI, ANSSI, NCSC) and your sector regulator. New memoranda and RTS adjustments arrive with little fanfare.
Further reading
- NIST FIPS 203 — ML-KEM.
- NSA CNSA 2.0 Advisory (2022).
- EU PQC Implementation Roadmap.
- UK NCSC PQC Guidance.
- NIST IR 8413.
Related reading on this blog
- ML-KEM-768 Explained
- NSA CNSA 2.0 Deadlines
- BSI TR-02102-1 and Post-Quantum
- ANSSI PQC Transition Plan
Try QuickZTNA
If PQ migration is on your 2026 roadmap, QuickZTNA can be part of your first concrete deployment — every tunnel ships with hybrid X25519 + ML-KEM-768 by default. Start on Free.