DoD has until 2026 to migrate to quantum-resistant encryption. Here's why we're not ready—and what that means for classified systems.
We're at the end of 2025, and the post-quantum cryptography migration timeline that seemed distant when NIST published its first standards in August 2024 is now very much real. Defense agencies face 2026 mandates requiring quantum-resistant encryption across critical systems—communications infrastructure, PKI hierarchies, and data-at-rest encryption for classified networks.
The question isn't whether the quantum threat is real. The question is whether defense contractors and system integrators are actually ready to deploy NIST's standardized algorithms at the scale required for DoD classified systems.
From where I sit working on Navy ERP systems and financial management infrastructure, the answer is: it depends on who you ask, and whether you believe vendor roadmaps or actual product deployments.
In August 2024, NIST finalized three post-quantum cryptographic algorithms:
CRYSTALS-Kyber (now FIPS 203: ML-KEM) - Module-Lattice-Based Key-Encapsulation Mechanism
CRYSTALS-Dilithium (now FIPS 204: ML-DSA) - Module-Lattice-Based Digital Signature Algorithm
SPHINCS+ (now FIPS 205: SLH-DSA) - Stateless Hash-Based Signature Scheme
These are not experimental algorithms. These are finalized standards that federal agencies are required to migrate to. The problem is that finalized standards and production-ready implementations are two very different things.
The real urgency behind PQC migration isn't that quantum computers can break encryption today—they can't, at least not at scale. The urgency is "harvest now, decrypt later" attacks: adversaries collecting encrypted data now with the expectation of decrypting it once quantum computers become viable.
For classified defense communications, this threat model is existential. Signals intelligence from 2025 that remains classified through 2035 could be decrypted retroactively if protected only by RSA-2048 or ECC P-256. For adversaries willing to store petabytes of encrypted network traffic, the investment pays off the moment a sufficiently powerful quantum computer comes online.
The threat timeline most defense analysts accept:
This means data encrypted today with classical algorithms has a 10-15 year window before quantum decryption becomes feasible. For anything classified beyond 2035, you need quantum-resistant encryption now.
Not every system requires immediate quantum-resistant encryption. But several categories of defense infrastructure absolutely do:
The challenge: Many tactical radios and communications devices have limited processing power and cannot handle the larger key sizes and computational overhead of lattice-based cryptography without hardware upgrades.
The challenge: PKI migration is not just algorithm replacement—it is a complete re-issuance of every certificate in the DoD ecosystem. Hybrid modes (classical + quantum-resistant) are required during transition, doubling certificate sizes and processing overhead.
The challenge: Migrating data-at-rest encryption requires re-encrypting potentially petabytes of existing data, with availability constraints that make "big bang" migrations impossible.
The challenge: Legacy systems with burned-in public keys cannot verify PQC signatures without firmware updates—creating a chicken-and-egg problem for secure software distribution.
Defense agencies don't build cryptographic implementations themselves—they rely on commercial vendors and system integrators. The gap between vendor roadmaps and production-ready products is where the real migration risk lives.
Microsoft Azure Government / Azure for Government Secret
Amazon Web Services (AWS GovCloud)
Network Equipment Vendors (Cisco, Juniper, etc.)
Database Vendors (Oracle, Microsoft SQL Server, PostgreSQL)
Here's the real constraint: even when vendors have working implementations of CRYSTALS-Kyber and CRYSTALS-Dilithium, those implementations must go through NIST's Cryptographic Module Validation Program (CMVP) to receive FIPS 140-3 certification. This process takes 6-12 months under normal circumstances, and the CMVP lab backlog is now measured in years.
For DoD systems at Impact Level 4 and above, FIPS 140-3 validation is not optional—it's a hard requirement. So even if a vendor ships PQC-enabled firmware in early 2026, it may not be accredited for use on classified networks until late 2026 or 2027.
If PQC migration were simply replacing one algorithm with another, it would be straightforward. It's not.
Post-quantum algorithms have larger key sizes and higher computational overhead than RSA and ECC:
For high-throughput systems—network switches, VPN concentrators, database clusters—this overhead is measurable. Hardware acceleration for lattice-based cryptography isn't yet widespread.
During the migration period (likely 2026-2030), defense systems must operate in hybrid mode: supporting both classical and post-quantum algorithms simultaneously. This means:
Hybrid mode is essential for gradual migration, but it also increases attack surface—every additional cipher suite is another potential vulnerability.
The hardest challenge isn't migrating new systems—it's dealing with legacy platforms that were never designed for cryptographic agility:
For these systems, the only migration path is replacement—which means multi-year procurement cycles and budget constraints.
If you're a government contractor working on DoD systems, waiting for vendor PQC products to become available isn't a strategy. Here's what you should be doing:
Map every instance of public key cryptography in your systems:
You can't migrate what you haven't inventoried.
Which of your systems can support algorithm changes without code rewrites?
Cryptographic agility—the ability to swap algorithms without re-architecting systems—should have been a design principle all along. For systems that lack it, migration will require significant rework.
Don't accept generic "we support PQC" statements. Ask:
Vendor answers to these questions in late 2025 will tell you whether they have actual products or just marketing slides.
Pure PQC deployments aren't realistic in 2026. Plan for hybrid mode:
Hybrid mode is more complex, but it's the only way to maintain interoperability during multi-year migrations.
Lab benchmarks are useful, but they don't reflect operational constraints. Test PQC implementations under:
If PQC algorithms introduce unacceptable performance degradation, you need to know now—not after deployment.
As we close out 2025, the honest assessment is that defense agencies aren't ready for full-scale PQC migration in 2026. The standards are finalized, the threat is real, but the ecosystem—vendors, integrators, accreditation processes—isn't moving fast enough.
This isn't a failure of standards development. NIST did its job. This is a failure of procurement timelines, budget prioritization, and vendor readiness to meet government timelines.
The result will be:
For defense contractors, the message is clear: PQC migration isn't a single project—it's a decade-long transformation. Treat it accordingly.
Amyn Porbanderwala is Director of Innovation at Navaide, where he works on Navy ERP modernization, financial systems audit readiness, and defense technology transformation. He is a Marine Corps veteran with deep experience in mission-critical systems and cybersecurity.