Back to News
NewsQuantum Computing

NIST Finalizes Post-Quantum Cryptography Standards, Global Transition Begins

NIST officially published three Federal Information Processing Standards—FIPS 203, 204, and 205—after an eight-year evaluation process, mandating all U.S. agencies to transition by 2030 and triggering a global cryptographic migration.

NIST post-quantum cryptography standards FIPS 203 204 205

The National Institute of Standards and Technology (NIST) issued a landmark announcement this month, finalizing the long-awaited post-quantum cryptography (PQC) standards that will define how the world protects data against future quantum computers. After an eight-year evaluation process that began in 2016, involving 82 initial submissions from 25 countries and multiple rounds of rigorous analysis, NIST has officially published three Federal Information Processing Standards (FIPS): FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA). A fourth standard for LMS (Leighton-Micali Signatures) was also finalized for specific use cases.

These standards replace the preliminary versions released in 2024 and now carry the full weight of federal government adoption. All U.S. government agencies are required to begin transitioning to these algorithms immediately, with a mandated completion date of 2030. More significantly, these standards are expected to be adopted globally, following the pattern established by previous NIST standards such as AES for encryption and SHA for hashing.

ML-KEM (Module-Lattice Key Encapsulation Mechanism) is the standard for general encryption, designed to secure data at rest and in transit against future quantum attacks. ML-DSA (Module-Lattice Digital Signature Algorithm) and SLH-DSA (Stateless Hash-Based Digital Signature Algorithm) provide options for digital signatures, with ML-DSA offering better performance and SLH-DSA providing a more conservative security margin. The selection of algorithms reflects a balanced approach that prioritizes both security and practical deployability.

Dustin Moody, leader of NIST's PQC project, described the significance in a press conference: "We've been working toward this moment for nearly a decade. The cryptographic standards we use today—RSA, ECC, Diffie-Hellman—were designed in a world without quantum computers. They are fundamentally vulnerable to Shor's algorithm. The standards we're releasing today are designed to be secure against both classical and quantum attacks. This is not just an update; it's a complete replacement of the cryptographic foundation of the internet."

The announcement triggered immediate action across both public and private sectors. The U.S. Office of Management and Budget (OMB) issued a memorandum directing federal agencies to inventory their cryptographic assets and develop migration plans. The Department of Defense, which has been running pilot PQC implementations for several years, accelerated its rollout schedule. In the private sector, major technology companies including Google, Amazon, Microsoft, and Cloudflare announced that they would begin integrating the finalized standards into their products and services within the next quarter.

The financial services sector, which faces particularly acute risks from "harvest now, decrypt later" attacks, moved quickly. JPMorgan Chase and Goldman Sachs both issued internal directives requiring all new cryptographic deployments to use NIST PQC standards starting immediately. The Society for Worldwide Interbank Financial Telecommunication (SWIFT), which handles messaging for 11,000 financial institutions globally, announced a phased migration plan that will complete by 2028.

Europe responded with its own coordinated actions. The European Union Agency for Cybersecurity (ENISA) issued a recommendation endorsing the NIST standards and urged EU member states to adopt them. The European Central Bank announced that PQC migration will be a key focus of its 2026 cybersecurity stress tests. Meanwhile, China's Cryptography Administration released a statement indicating that they would continue developing their own domestic PQC standards, which are based on different mathematical foundations but serve the same purpose.

Perhaps the most critical aspect of the transition is the coordination required across the internet ecosystem. Web browsers, operating systems, cloud providers, hardware security modules, and millions of applications all need to be updated to support the new algorithms. The Internet Engineering Task Force (IETF) has been working parallel to NIST, developing protocols for how these algorithms will be used in TLS (for HTTPS), IPsec (for VPNs), and other internet standards. Those protocol specifications are expected to be finalized later this year.

15 March 2026