← All articles

NIST's 2030 Post-Quantum Deadline: What Your Team Needs to Do Now

Published 2026-04-14 · 10 min read · QVS Blog

In November 2024, NIST published Internal Report 8547, "Transition to Post-Quantum Cryptography Standards." It is the first formal NIST document to set hard deprecation deadlines for the asymmetric algorithms that protect virtually every internet transaction today: RSA, ECDSA, ECDH, and DH. The headline dates: 2030 (deprecated for new uses) and 2035 (disallowed entirely). For federal systems and any vendor in the federal supply chain, those dates are now binding.

If you operate any system that touches U.S. federal data, processes payments, handles regulated healthcare or financial information, or sells into the European market under NIS2 or DORA, the 2030 deadline is closer than it looks. It's not 4 years to a goal — it's 4 years to complete migration, which means about 18-24 months to plan, design, and start, plus 24-30 months to roll out and validate.

This article walks through what NIST IR 8547 actually requires, how it intersects with CNSA 2.0 and other regulatory frameworks, and what your team should be doing this quarter, this year, and through 2030.

Start with where you are today

Before you can plan migration, you need a baseline. Run a free quantum readiness scan to see exactly which NIST-deprecated algorithms your systems still depend on.

Get your baseline scan →

What NIST IR 8547 actually says

NIST IR 8547 establishes a transition timeline for cryptographic algorithms that will be broken by sufficiently large quantum computers. The specific dates depend on the algorithm and use case:

AlgorithmUse caseDeprecatedDisallowed
RSA (≥ 2048-bit)Digital signaturesAfter 2030After 2035
RSA (≥ 2048-bit)Key establishmentAfter 2030After 2035
ECDSADigital signaturesAfter 2030After 2035
ECDHKey establishmentAfter 2030After 2035
EdDSADigital signaturesAfter 2030After 2035
DH (finite-field)Key establishmentAfter 2030After 2035

"Deprecated" in NIST language means: still allowed to use, but discouraged, and any new system MUST be designed for migration. "Disallowed" means: cannot be used for any security purpose in federal systems or systems sold to federal customers.

The replacements are the three NIST PQC standards finalized in August 2024:

How NIST IR 8547 interacts with CNSA 2.0

NIST IR 8547 isn't the only post-quantum mandate. The NSA's Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) is the binding standard for U.S. national security systems and the contractors that supply them. CNSA 2.0 is more aggressive than IR 8547:

YearCNSA 2.0 milestone
2025New equipment must support PQC algorithms (ML-KEM-1024, ML-DSA-87, SLH-DSA, SHA-384/512, AES-256)
2027Software/firmware in use must support PQC; new procurements must use it as default
2030All RSA, ECC, and Diffie-Hellman use must end in NSS environments

If your organization sells into the U.S. defense, intelligence, or national security supply chain — directly or as a subcontractor — CNSA 2.0 is binding through your contracts. Even if you don't, expect CNSA 2.0 timelines to flow downstream into FedRAMP, StateRAMP, and DoD CMMC requirements over the next 24 months.

Other regulatory frameworks pulling in the same direction

NIST and NSA aren't operating in a vacuum. The same migration is required (with slightly different framing) by other major regulators:

The pattern: every major data-protection regulator is now either explicitly requiring PQC migration or interpreting existing rules to require it. The 2030 deadline isn't just NIST's deadline. It's a global regulatory convergence.

What your team needs to do now (the quarter-by-quarter plan)

Migration is a multi-year program. Here's a realistic phased plan starting from Q2 2026:

Q2-Q3 2026: Discovery and inventory

Goal: produce a Cryptographic Bill of Materials (CBOM) for your entire stack.

Tools that help: SBOM scanners (Syft, CycloneDX CLI), TLS scanners (QVS, SSL Labs, testssl.sh), package auditors. For internal services, a static-analysis pass over code looking for crypto-library imports gives you the rest.

Q4 2026: Triage and prioritization

Goal: rank every finding by risk and migration effort.

Risk is a function of:

Migration effort is a function of:

Q1-Q2 2027: Hybrid TLS rollout

Goal: every external and internal TLS endpoint negotiates hybrid post-quantum key exchange.

Q3 2027 - Q4 2028: Signature migration begins

Goal: pilot ML-DSA in production for internal signing operations.

2029: Full external migration

Goal: be ready to switch from RSA/ECDSA certificates to ML-DSA when public CAs make them broadly available.

2030: NIST IR 8547 deadline

Goal: no new RSA/ECDSA/ECDH/DH for signing or key exchange in any system you control.

By this point, hybrid PQC should be the default everywhere, ML-DSA signatures should be in production for high-value signing, and you should have a documented exception process for any remaining classical-only system with a closure plan.

What happens if you miss the deadline

For federal systems and CNSA 2.0-bound contractors: failed audits, contract loss, and remediation orders. For PCI DSS 4.0: failed assessments and the fines that come with non-compliance. For EU NIS2 / DORA: regulatory penalties up to a percentage of annual revenue.

For everyone else: the more dangerous failure mode is silent. Quantum computers don't announce their arrival with a press release. The first sign that RSA-2048 is broken in practice will likely be the disclosure of a successful attack on real-world infrastructure — and at that point, the migration window is no longer 4 years, it's 4 weeks. Anyone not already in late-stage migration will be in panic mode.

The bottom line

NIST IR 8547 made the post-quantum migration timeline official. CNSA 2.0 made it binding for federal systems. PCI DSS 4.0, NIS2, and DORA are pulling the same direction in the financial and infrastructure sectors. The 2030 deprecation deadline is real, the 2035 disallowance deadline is enforceable, and most organizations are dramatically behind the planning curve.

The good news: the technical path is clear, the standards are finalized, the libraries are ready, and the operators who have already started (Cloudflare, Apple, Google, Signal, OpenSSH, AWS) have proven the migration is feasible. The work in front of you is operational, not research.

Start with discovery. Get a CBOM. Get a baseline. Build the plan. Four years sounds like a long time. It isn't.

Start your CBOM today

Run a free quantum readiness scan on your TLS endpoints. The QVS report includes a NIST IR 8547 compliance mapping and a phased remediation roadmap aligned to the 2030 deadline.

Run a free scan →

Related reading: Why Your TLS Will Break by 2030 · Is Your Website Quantum Safe? · When Will Quantum Computers Break RSA?