HardChecklist

Post-Quantum Cryptography Migration Checklist

Your roadmap from classical to quantum-resistant cryptography. This checklist guides PKI teams through the post-quantum cryptography migration process across four phases. PQC migration is a multi-year journey - this checklist helps teams track progress and ensures nothing gets missed before the January 2035 deadline.

6-24 months (varies by organization size)
Last Updated: January 2026
Progress: 0/142 complete0%

When to Use

  • Planning your organization's PQC migration strategy
  • Quarterly progress reviews on PQC readiness
  • Preparing for compliance audits related to cryptography
  • After NIST releases new PQC guidance or standards

Do NOT Use For

  • Single certificate renewal (use Certificate Renewal Runbook)
  • Emergency certificate replacement (use Emergency Runbook)
  • Learning about PQC concepts (see Post-Quantum Cryptography Guide)

Quick Reference (TL;DR)

  1. Phase 1 (Discovery): Inventory all RSA, ECC, and DH usage across your organization
  2. Phase 2 (Planning): Assess crypto-agility, contact vendors, get budget approval
  3. Phase 3 (Testing): Set up lab environment, test hybrid TLS, pilot deployment
  4. Phase 4 (Migration): Roll out PQC across production, starting with key exchange
  5. High-risk systems should be migrated by January 2030; full migration by January 2035

1Phase 1.1: Algorithm Inventory

Objective: Identify all cryptographic algorithm usage across your organization

💡 All RSA, ECC, and DH algorithms are vulnerable to quantum computers using Shor's algorithm

💡 Symmetric algorithms (AES-256) and hash functions (SHA-256) are quantum-resistant

2Phase 1.2: Certificate Inventory

Objective: Create a complete inventory of all certificates in your organization

3Phase 1.3: Data Classification

Objective: Identify data at risk from "harvest now, decrypt later" attacks

💡 Adversaries may be capturing encrypted traffic today to decrypt with future quantum computers

💡 Long-lived secrets are the highest priority for PQC migration

4Phase 1.4: Infrastructure Assessment

Objective: Inventory infrastructure components and their PQC readiness

Check OpenSSL PQC support

openssl list -kem-algorithms

List signature algorithms

openssl list -signature-algorithms

5Phase 2.1: Risk Assessment

Objective: Prioritize systems for migration based on risk level

6Phase 2.2: Crypto-Agility Assessment

Objective: Evaluate your organization's ability to swap algorithms

7Phase 2.3: Vendor Assessment

Objective: Understand vendor PQC roadmaps and support timelines

💡 First PQC certificates expected commercially available in 2026

💡 OpenSSL 3.x includes PQC algorithm providers

8Phase 2.4: Budget & Resources

Objective: Estimate costs and secure budget approval

9Phase 2.5: Create Migration Plan

Objective: Document the migration approach with phases and target dates

10Phase 3.1: Lab Environment Setup

Objective: Create isolated test environment for PQC validation

Check available KEM algorithms

openssl list -kem-algorithms

Generate ML-DSA key pair

openssl genpkey -algorithm ml-dsa-65 -out ml-dsa.key

11Phase 3.2: Hybrid TLS Testing

Objective: Validate hybrid key exchange (ML-KEM + classical) works correctly

Test PQC TLS connection

openssl s_client -connect example.com:443 -groups mlkem768

Check browser PQC support

Visit: https://pq.cloudflareresearch.com

12Phase 3.3: PQC Certificate Testing

Objective: Validate PQC certificates work in your environment

13Phase 3.4: Pilot Production Deployment

Objective: Deploy hybrid TLS in limited production for real-world validation

14Phase 4.1: Key Exchange Migration (First)

Objective: Enable hybrid TLS key exchange across production infrastructure

15Phase 4.2: Signature Migration (Second)

Objective: Transition to PQC certificates for digital signatures

16Phase 4.3: Legacy System Handling

Objective: Document and mitigate systems that cannot migrate to PQC

17Phase 4.4: Completion & Validation

Objective: Verify migration is complete and update policies

18Ongoing Maintenance

Objective: Establish processes for ongoing PQC monitoring and updates

Check OpenSSL PQC support

openssl list -kem-algorithms

List signature algorithms

openssl list -signature-algorithms

Test PQC TLS connection

openssl s_client -connect example.com:443 -groups mlkem768

💡 NIST Standards: FIPS 203 (ML-KEM for key exchange), FIPS 204 (ML-DSA for signatures), FIPS 205 (SLH-DSA conservative signatures), FIPS 206 (FN-DSA compact signatures)

💡 Key Deadlines: 2026 (first PQC certs available), 2027 (HQC standard expected), January 2030 (NIST deprecates 112-bit classical), January 2035 (NIST removes quantum-vulnerable algorithms)

Troubleshooting

Problem: Clients fail to connect after enabling hybrid TLS

Solution: Some older clients may not support hybrid key exchange. Configure server to fall back to classical algorithms for incompatible clients while offering hybrid to capable clients.

Problem: HSM does not support PQC algorithms

Solution: Contact HSM vendor for firmware update timeline. If no update available, plan for HSM replacement or use software-based PQC alongside hardware-protected classical keys.

Problem: Certificate Authority does not offer PQC certificates

Solution: First PQC certificates expected in 2026. Start with hybrid TLS (PQC key exchange with classical certificates) while waiting for PQC certificate availability.

Problem: Performance degradation with PQC

Solution: PQC algorithms have larger key sizes and may impact performance. Test thoroughly and consider ML-KEM-512 for lower-security use cases. Optimize TLS session resumption.