Post-Quantum Cryptography Is Becoming a Regulatory Requirement

CNSA 2.0, NIST FIPS 203/204/205, and emerging certification expectations are reshaping how device makers secure embedded systems, IoT products, and connected hardware. 

Why regulation is accelerating 

The transition to post-quantum cryptography is no longer just a technical issue — it is becoming a regulatory and compliance requirement.
Governments and standard bodies are defining timelines that already impact procurement, certification, and contractual obligations across critical industries.


At the same time, adversaries are collecting encrypted data today to decrypt it in the future — the “harvest now, decrypt later” threat.
As a result, post-quantum migration is a present-day imperative, not a future consideration. 

Regulatory Countdown

CNSA 2.0 regulatory countdown 

 

The NSA’s Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) provides the most authoritative roadmap for the transition to post-quantum cryptography. While initially defined for National Security Systems, it is widely recognized as the benchmark that will cascade into commercial and regulated markets. 

 

Year Requirement

2025

CNSA 2.0 algorithms should be supported and preferred 
2030 PQC required for software/firmware signing and traditional networking 
2033 PQC required for OS, web, cloud, and general systems 
2035 Full transition target for National Security Systems 

 

These milestones represent more than guidance, they define the compliance trajectory for secure systems worldwide, particularly in regulated industries.

 

Devices and systems expected to operate beyond 2030 must integrate post-quantum cryptography at the design stage. Delaying migration introduces both compliance risk and long-term security exposure. 

NIST post-quantum cryptography standards 

In August 2024, NIST finalized the first set of post-quantum cryptographic standards, marking a critical milestone in the transition from research to deployment. 

These standards define the algorithms that will replace today’s quantum-vulnerable public-key systems. 

FIPS-203

FIPS 203 — ML-KEM (Key Encapsulation Mechanism) 

The primary standard for quantum-safe key exchange, designed to replace protocols such as RSA and Diffie-Hellman. 

FIPS-204

FIPS 204 — ML-DSA (Digital Signature Algorithm) 

The recommended standard for digital signatures, including firmware signing, secure boot, and certificate authority operations. 

FIPS-205

FIPS 205 — SLH-DSA (Hash-Based Signatures) 

A hash-based signature scheme providing algorithmic diversity and resilience, particularly for high-assurance environments. 

 

 

Why device makers are uniquely exposed  

 

Organizations developing embedded and connected systems face unique challenges in the transition to post-quantum security.

Unlike software, hardware devices operate for 10 to 20 years, creating a gap between device lifecycles and rapidly evolving cryptographic standards.

This risk is amplified by structural constraints:

  • Immutable roots of trust: keys in ROM or OTP cannot be updated after manufacturing
  • Secure boot dependency: verification relies on algorithms that may become obsolete
  • Firmware signing impact: post-quantum signatures are larger and more resource-intensive
  • System constraints: increased memory, bandwidth, and performance requirements
  • Legacy exposure: many deployed devices cannot be upgraded

As a result, devices designed today with classical cryptography risk becoming vulnerable and non-compliant within their operational lifetime.

Compliance Risks

Compliance risks for embedded systems  

 

The transition to post-quantum cryptography introduces not only technical challenges but also significant business and regulatory risks.

Failure to anticipate this transition can lead to:

  • Non-compliance with procurement requirements in regulated sectors
  • Delays in certification processes (Common Criteria, FIPS 140-3)
  • Insecure secure boot chains based on deprecated algorithms
  • Exposure to long-term data breaches through harvest-now, decrypt-later attacks
  • Costly redesigns of hardware platforms after production
  • Contractual and reputational risk with customers and partners

Because cryptography is deeply embedded in system architecture, late-stage remediation is often complex, expensive, or impossible.

 

Where to start: securing the most critical layers 

The transition to post-quantum cryptography does not happen uniformly across systems.
Some components can evolve over time. Others — particularly those anchored in hardware — define the long-term security and compliance of the entire device.

A successful strategy begins by identifying and securing these non-negotiable foundations.

Picto SEAL SQ - Improved security (1)

1. Secure boot and root of trust 

The hardware root of trust is the most critical element in any embedded system.
Keys embedded in ROM or OTP at manufacturing cannot be updated once deployed.

If these keys rely on quantum-vulnerable algorithms, the device is permanently exposed.

Picto SEAL SQ - Fast authentication

2. Firmware signing and verification  

Firmware integrity relies on digital signatures that must remain secure over the full device lifecycle.
Post-quantum algorithms introduce larger signatures and higher verification costs, impacting memory and boot design  and must be anticipated early.

Picto SEAL SQ - Clé ID-2

3. Device identity and key establishment  

Provisioning, authentication, and secure communication rely on key exchange mechanisms that are directly impacted by quantum threats.

Post-quantum alternatives such as ML-KEM are required to ensure long-term confidentiality of device communications.

Picto SEAL SQ - Lifecycle management-1

4. Systems with limited update capability 

Many deployed devices cannot be upgraded to support post-quantum cryptography.
This creates a structural risk requiring hardware redesign or system-level compensating controls. 

SEALSQ post-quantum solutions 

MS_600X QS 7001

Quantum Shield - QS7001  security platform

QS7001 is a secure microcontroller platform designed to serve as a hardware root of trust for connected devices.

It enables:

  • Secure key storage and device identity anchored in hardware
  • Execution of cryptographic operations in a protected environment
  • Integration of post-quantum cryptographic algorithms such as ML-KEM and ML-DSA
  • Resistance to physical and side-channel attacks
MS_600X QVault TPM bis

QVault TPM 

QVault is a next-generation Trusted Platform Module designed to provide standardized, certifiable cryptographic services aligned with enterprise and industrial security requirements. 

PKI & Trust Services

INeS PKI Platform

SEALSQ’s INeS PKI platform provides secure digital identity and certificate management capabilities designed for connected devices and regulated environments.

The platform supports:

  • Device identity provisioning and lifecycle management
  • Certificate issuance and management for embedded and IoT systems
  • Integration with post-quantum and hybrid cryptographic approaches
  • Secure onboarding and authentication of connected devices

Combined with SEALSQ hardware security platforms, INeS helps organizations strengthen trust infrastructures while preparing for evolving post-quantum security and compliance requirements.

PQC

Built for post-quantum transition 

SEALSQ platforms are designed to support:

  • Hybrid cryptography (classical + PQC)
  • Progressive integration of post-quantum algorithms
  • Long-term security across device lifecycles
Certifications-1

Aligned with certification requirements   

SEALSQ’s approach is structured around internationally recognized security standards:

  • Common Criteria (EAL5+) for hardware assurance
  • FIPS 140-3 for cryptographic module validation
  • Trusted Computing Group (TCG) TPM standards

This combined model enables manufacturers to accelerate certification, reduce integration complexity, and prepare for evolving regulatory requirements.

Download the Post-Quantum Cryptography White Paper 

Get the full guide to regulatory timelines, PQC standards, and migration strategies for secure systems. 

CCC
ISO 27001 (1)
Logo-partenaireNIST