Post-Quantum Cryptography Migration Checklist
Your roadmap from classical to quantum-resistant cryptography. This checklist guides PKI teams through the post-quantum cryptography migration process across four phases. PQC migration is a multi-year journey - this checklist helps teams track progress and ensures nothing gets missed before the January 2035 deadline.
When to Use
- • Planning your organization's PQC migration strategy
- • Quarterly progress reviews on PQC readiness
- • Preparing for compliance audits related to cryptography
- • After NIST releases new PQC guidance or standards
Do NOT Use For
- • Single certificate renewal (use Certificate Renewal Runbook)
- • Emergency certificate replacement (use Emergency Runbook)
- • Learning about PQC concepts (see Post-Quantum Cryptography Guide)
Quick Reference (TL;DR)
- Phase 1 (Discovery): Inventory all RSA, ECC, and DH usage across your organization
- Phase 2 (Planning): Assess crypto-agility, contact vendors, get budget approval
- Phase 3 (Testing): Set up lab environment, test hybrid TLS, pilot deployment
- Phase 4 (Migration): Roll out PQC across production, starting with key exchange
- High-risk systems should be migrated by January 2030; full migration by January 2035
1Phase 1.1: Algorithm Inventory
Objective: Identify all cryptographic algorithm usage across your organization
💡 All RSA, ECC, and DH algorithms are vulnerable to quantum computers using Shor's algorithm
💡 Symmetric algorithms (AES-256) and hash functions (SHA-256) are quantum-resistant
2Phase 1.2: Certificate Inventory
Objective: Create a complete inventory of all certificates in your organization
3Phase 1.3: Data Classification
Objective: Identify data at risk from "harvest now, decrypt later" attacks
💡 Adversaries may be capturing encrypted traffic today to decrypt with future quantum computers
💡 Long-lived secrets are the highest priority for PQC migration
4Phase 1.4: Infrastructure Assessment
Objective: Inventory infrastructure components and their PQC readiness
Check OpenSSL PQC support
openssl list -kem-algorithmsList signature algorithms
openssl list -signature-algorithms5Phase 2.1: Risk Assessment
Objective: Prioritize systems for migration based on risk level
6Phase 2.2: Crypto-Agility Assessment
Objective: Evaluate your organization's ability to swap algorithms
7Phase 2.3: Vendor Assessment
Objective: Understand vendor PQC roadmaps and support timelines
💡 First PQC certificates expected commercially available in 2026
💡 OpenSSL 3.x includes PQC algorithm providers
8Phase 2.4: Budget & Resources
Objective: Estimate costs and secure budget approval
9Phase 2.5: Create Migration Plan
Objective: Document the migration approach with phases and target dates
10Phase 3.1: Lab Environment Setup
Objective: Create isolated test environment for PQC validation
Check available KEM algorithms
openssl list -kem-algorithmsGenerate ML-DSA key pair
openssl genpkey -algorithm ml-dsa-65 -out ml-dsa.key11Phase 3.2: Hybrid TLS Testing
Objective: Validate hybrid key exchange (ML-KEM + classical) works correctly
Test PQC TLS connection
openssl s_client -connect example.com:443 -groups mlkem768Check browser PQC support
Visit: https://pq.cloudflareresearch.com12Phase 3.3: PQC Certificate Testing
Objective: Validate PQC certificates work in your environment
13Phase 3.4: Pilot Production Deployment
Objective: Deploy hybrid TLS in limited production for real-world validation
14Phase 4.1: Key Exchange Migration (First)
Objective: Enable hybrid TLS key exchange across production infrastructure
15Phase 4.2: Signature Migration (Second)
Objective: Transition to PQC certificates for digital signatures
16Phase 4.3: Legacy System Handling
Objective: Document and mitigate systems that cannot migrate to PQC
17Phase 4.4: Completion & Validation
Objective: Verify migration is complete and update policies
18Ongoing Maintenance
Objective: Establish processes for ongoing PQC monitoring and updates
Check OpenSSL PQC support
openssl list -kem-algorithmsList signature algorithms
openssl list -signature-algorithmsTest PQC TLS connection
openssl s_client -connect example.com:443 -groups mlkem768💡 NIST Standards: FIPS 203 (ML-KEM for key exchange), FIPS 204 (ML-DSA for signatures), FIPS 205 (SLH-DSA conservative signatures), FIPS 206 (FN-DSA compact signatures)
💡 Key Deadlines: 2026 (first PQC certs available), 2027 (HQC standard expected), January 2030 (NIST deprecates 112-bit classical), January 2035 (NIST removes quantum-vulnerable algorithms)
Troubleshooting
Problem: Clients fail to connect after enabling hybrid TLS
Solution: Some older clients may not support hybrid key exchange. Configure server to fall back to classical algorithms for incompatible clients while offering hybrid to capable clients.
Problem: HSM does not support PQC algorithms
Solution: Contact HSM vendor for firmware update timeline. If no update available, plan for HSM replacement or use software-based PQC alongside hardware-protected classical keys.
Problem: Certificate Authority does not offer PQC certificates
Solution: First PQC certificates expected in 2026. Start with hybrid TLS (PQC key exchange with classical certificates) while waiting for PQC certificate availability.
Problem: Performance degradation with PQC
Solution: PQC algorithms have larger key sizes and may impact performance. Test thoroughly and consider ML-KEM-512 for lower-security use cases. Optimize TLS session resumption.