In November 2024, NIST published Internal Report 8547, "Transition to Post-Quantum Cryptography Standards." It is the first formal NIST document to set hard deprecation deadlines for the asymmetric algorithms that protect virtually every internet transaction today: RSA, ECDSA, ECDH, and DH. The headline dates: 2030 (deprecated for new uses) and 2035 (disallowed entirely). For federal systems and any vendor in the federal supply chain, those dates are now binding.
If you operate any system that touches U.S. federal data, processes payments, handles regulated healthcare or financial information, or sells into the European market under NIS2 or DORA, the 2030 deadline is closer than it looks. It's not 4 years to a goal — it's 4 years to complete migration, which means about 18-24 months to plan, design, and start, plus 24-30 months to roll out and validate.
This article walks through what NIST IR 8547 actually requires, how it intersects with CNSA 2.0 and other regulatory frameworks, and what your team should be doing this quarter, this year, and through 2030.
Before you can plan migration, you need a baseline. Run a free quantum readiness scan to see exactly which NIST-deprecated algorithms your systems still depend on.
Get your baseline scan →NIST IR 8547 establishes a transition timeline for cryptographic algorithms that will be broken by sufficiently large quantum computers. The specific dates depend on the algorithm and use case:
| Algorithm | Use case | Deprecated | Disallowed |
|---|---|---|---|
| RSA (≥ 2048-bit) | Digital signatures | After 2030 | After 2035 |
| RSA (≥ 2048-bit) | Key establishment | After 2030 | After 2035 |
| ECDSA | Digital signatures | After 2030 | After 2035 |
| ECDH | Key establishment | After 2030 | After 2035 |
| EdDSA | Digital signatures | After 2030 | After 2035 |
| DH (finite-field) | Key establishment | After 2030 | After 2035 |
"Deprecated" in NIST language means: still allowed to use, but discouraged, and any new system MUST be designed for migration. "Disallowed" means: cannot be used for any security purpose in federal systems or systems sold to federal customers.
The replacements are the three NIST PQC standards finalized in August 2024:
NIST IR 8547 isn't the only post-quantum mandate. The NSA's Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) is the binding standard for U.S. national security systems and the contractors that supply them. CNSA 2.0 is more aggressive than IR 8547:
| Year | CNSA 2.0 milestone |
|---|---|
| 2025 | New equipment must support PQC algorithms (ML-KEM-1024, ML-DSA-87, SLH-DSA, SHA-384/512, AES-256) |
| 2027 | Software/firmware in use must support PQC; new procurements must use it as default |
| 2030 | All RSA, ECC, and Diffie-Hellman use must end in NSS environments |
If your organization sells into the U.S. defense, intelligence, or national security supply chain — directly or as a subcontractor — CNSA 2.0 is binding through your contracts. Even if you don't, expect CNSA 2.0 timelines to flow downstream into FedRAMP, StateRAMP, and DoD CMMC requirements over the next 24 months.
NIST and NSA aren't operating in a vacuum. The same migration is required (with slightly different framing) by other major regulators:
The pattern: every major data-protection regulator is now either explicitly requiring PQC migration or interpreting existing rules to require it. The 2030 deadline isn't just NIST's deadline. It's a global regulatory convergence.
Migration is a multi-year program. Here's a realistic phased plan starting from Q2 2026:
Goal: produce a Cryptographic Bill of Materials (CBOM) for your entire stack.
Tools that help: SBOM scanners (Syft, CycloneDX CLI), TLS scanners (QVS, SSL Labs, testssl.sh), package auditors. For internal services, a static-analysis pass over code looking for crypto-library imports gives you the rest.
Goal: rank every finding by risk and migration effort.
Risk is a function of:
Migration effort is a function of:
Goal: every external and internal TLS endpoint negotiates hybrid post-quantum key exchange.
X25519MLKEM768 as the preferred key exchange group.Goal: pilot ML-DSA in production for internal signing operations.
EdDSA-style API; pilot it for service-to-service auth.Goal: be ready to switch from RSA/ECDSA certificates to ML-DSA when public CAs make them broadly available.
Goal: no new RSA/ECDSA/ECDH/DH for signing or key exchange in any system you control.
By this point, hybrid PQC should be the default everywhere, ML-DSA signatures should be in production for high-value signing, and you should have a documented exception process for any remaining classical-only system with a closure plan.
For federal systems and CNSA 2.0-bound contractors: failed audits, contract loss, and remediation orders. For PCI DSS 4.0: failed assessments and the fines that come with non-compliance. For EU NIS2 / DORA: regulatory penalties up to a percentage of annual revenue.
For everyone else: the more dangerous failure mode is silent. Quantum computers don't announce their arrival with a press release. The first sign that RSA-2048 is broken in practice will likely be the disclosure of a successful attack on real-world infrastructure — and at that point, the migration window is no longer 4 years, it's 4 weeks. Anyone not already in late-stage migration will be in panic mode.
NIST IR 8547 made the post-quantum migration timeline official. CNSA 2.0 made it binding for federal systems. PCI DSS 4.0, NIS2, and DORA are pulling the same direction in the financial and infrastructure sectors. The 2030 deprecation deadline is real, the 2035 disallowance deadline is enforceable, and most organizations are dramatically behind the planning curve.
The good news: the technical path is clear, the standards are finalized, the libraries are ready, and the operators who have already started (Cloudflare, Apple, Google, Signal, OpenSSH, AWS) have proven the migration is feasible. The work in front of you is operational, not research.
Start with discovery. Get a CBOM. Get a baseline. Build the plan. Four years sounds like a long time. It isn't.
Run a free quantum readiness scan on your TLS endpoints. The QVS report includes a NIST IR 8547 compliance mapping and a phased remediation roadmap aligned to the 2030 deadline.
Run a free scan →Related reading: Why Your TLS Will Break by 2030 · Is Your Website Quantum Safe? · When Will Quantum Computers Break RSA?