EXECUTIVE SUMMARY
Financial institutions in Europe face an urgent dual mandate: migrate to post-quantum cryptography (PQC) to counter looming quantum threats, while complying with new regulatory standards that demand stronger cryptographic controls.
Upcoming EU regulations like the Digital Operational Resilience Act (DORA) and NIS2, as well as industry standards such as PCI DSS 4.0, require banks and payment providers to upgrade their encryption practices and demonstrate rigorous key management.
All this is happening as quantum computing advances raise the risk of “harvest now, decrypt later ” attacks, wherein adversaries steal encrypted data today to decrypt once quantum capabilities mature. This risk is highlighted by NIST and CISA guidance. The EU’ s coordinated PQC roadmap asks Member States to start transition activities by end-2026 and to secure high-risk systems, including critical financial infrastructure, with PQC by end-2030. It also signals completing as much of the remaining transition as feasible by 2035.
Outside the EU, the NSA’ s CNSA 2.0 guidance sets category-based milestones for migrating away from classical algorithms; these are informative for multinational institutions rather than binding on EU entities. In short, the clock is ticking for banks to achieve crypto agility – the ability to swiftly swap and upgrade cryptographic algorithms – and to modernize their key management across fragmented on-premises and cloud systems .
This white paper addresses the topic in three parts:
1. The regulatory drivers behind this push.
2. The challenges financial institutions face (from crypto‐inventory fragmentation and talent gaps to audit fatigue, tight deadlines, and HSM and cloud exit-strategies).
3. Strategic solutions to navigate the transition. We emphasize practical approaches such as establishing a centralized, crypto-agile key management program, adopting hybrid classical–PQC encryption schemes, and preparing governance and infrastructure for a post-quantum era.
ROADBLOCKS TO PQC MIGRATION
Implementing cryptographic upgrades and key management improvements at an enterprise scale is easier said than done. Financial institutions today face several major challenges in the context of PQC migration and compliance.
-
FRAGMENTED "CRYPTO SPRAWL"
Large banks and payment processors often have a highly distributed cryptographic infrastructure accumulated over years. It’ s common for a Tier-1 bank to be running multiple Hardware Security Module (HSM) brands (2–4 different HSM platforms) and dozens of disparate key management stores or cloud KMS accounts across business units. This fragmentation leads to inconsistent controls and visibility. Keys are siloed in different systems, making it hard to get an enterprise-wide crypto inventory or enforce uniform policies.
Key sprawl drives duplicated tooling and expertise and increases audit surface area and a fragmented crypto estate complicates audits: security teams must pull evidence from multiple platforms to show auditors encryption is in place and keys are managed properly. In short, crypto sprawl undermines both security and auditability. When planning a PQC migration, this is a huge obstacle: identifying and upgrading every algorithm instance across numerous legacy systems is extremely challenging.
-
SHORTAGE OF PQC EXPERTISE
There is a notable skills gap when it comes to post-quantum cryptography. PQC involves novel math and new algorithms that most practitioners are not familiar with. Globally, it’ s estimated that only a few hundred engineers have real-world experience implementing PQC deployments today. Financial institutions report that in-house cryptography teams, if they exist at all, lack PQC-specific knowledge – they are already stretched maintaining classical PKI and HSM operations.
Hiring talent is difficult because seasoned experts in lattice-based or hash-based cryptography are scarce. This expertise shortage makes organizations reluctant to dive into a crypto migration project, fearing they might “ get it wrong ” without specialist guidance. It also drives interest in turnkey solutions: banks would prefer tools and products that encapsulate PQC capabilities, rather than custom-developing everything (as one industry insight put it, turnkey tooling is preferred over bespoke crypto projects given the limited expertise available). Upskilling existing staff on PQC is possible but takes time through training and collaboration with vendors or academia. Until then, the lack of cryptography talent is a bottleneck, especially when regulators are asking for immediate action.
-
AUDIT FATIGUE AND OPERATIONAL OVERHEAD
Financial organizations are under heavy audit and reporting burdens related to security compliance. With multiple overlapping standards (DORA, PCI DSS 4.0, GDPR, etc.), teams face continuous audits and evidence collection. Audit fatigue is a real problem – security officers complain that demonstrating compliance for cryptographic controls in different formats to different auditors is taking a toll. For example, PCI assessments might require detailed proof of encryption and key rotations for cardholder data, while DORA self-assessments demand documentation of an enterprise-wide crypto policy. If cryptographic controls are managed manually or in silos, producing the necessary reports (key inventories, config settings, risk assessments) becomes a labor-intensive process. Many organizations still rely on manual key rotation and spreadsheets, which raises error risk and audit exposure.
As regulatory deadlines near (e.g. PCI 4.0 by 2025), organizations worry about keeping up with audit requirements in time. Without automation, each new mandate (such as NIS2’ s broad security measures) adds to the fatigue. Essentially, the cost of compliance is rising, and cryptography is a prime example: proving that hundreds of applications are using approved algorithms and managing keys properly is nontrivial. This challenge underscores the need for centralized visibility and automated compliance reporting in crypto operations.
-
LOOMING DEADLINES & UNCERTAIN TIMELINE
The regulatory timelines discussed put financial institutions under pressure, yet the exact arrival of threats is uncertain. Core PQC standards are now finalized, though profiles and protocol updates continue to evolve and it’ s possible (though increasingly unlikely) that large-scale quantum computers might be more than a decade away. This uncertainty can lead to analysis paralysis or half-measures (for instance, some firms encrypt new data with larger classical keys as a stopgap, which may or may not be effective against future quantum attacks). Furthermore, because regulators have set hard dates, institutions can ’t afford to ignore the problem; e.g. if by 2027 a supervisor asks for evidence of cryptographic inventory and a PQC transition plan, firms must be ready.
The challenge is how to prioritize and phase the work: which cryptosystems to migrate first (probably those protecting long-lived sensitive data), how to align upgrades with regular IT refresh cycles, and how to do it all without breaking production systems. It’ s a massive program management challenge under a deadline – as Marin Ivezic (a cybersecurity advisor) noted, overhauling enterprise cryptography can be “five years of hard work” and if you haven ’t started, you ’ re already late.
-
IMMATURE VENDOR LANDSCAPE
Finally, financial institutions face the reality that the ecosystem of PQC-ready solutions is still maturing. Many critical components – HSMs, database encryption tools, network security appliances – currently do not support PQC algorithms or certificate formats out-of-the-box. Vendors are working on it (some HSM providers have beta support for lattice-based algos, some TLS libraries have experimental hybrid modes), but as of 2025 the offerings are limited. This means early adopters may have to deal with integration challenges and vendor lock-in risks. For example, a bank might find that one cloud provider offers a quantum-safe VPN but another doesn ’t, complicating multi-cloud architectures. Or a vendor ’ s “ quantumresistant” encryption module might rely on a proprietary scheme not aligned with NIST standards, leading to potential interoperability or compliance issues. The lack of widely adopted standards beyond the core algorithms (e.g. standard PQC certificate formats, quantum-safe TLS profiles) adds to uncertainty. Moreover, some products in the market that claim quantum-security may not be fully vetted, introducing execution risk if chosen. In summary, being a first mover in PQC migration can mean navigating uncharted territory with immature tools, which is daunting for risk-averse financial firms.
This challenge reinforces the need for crypto-agility: since algorithms and solutions may change, banks want architectures that can plug in new components or swap vendors with minimal disruption. It also means collaboration with reputable vendors and consultancies is important – many institutions will lean on external partners to fill the gaps (for instance, using a managed cryptography service that stays up-to-date with PQC, rather than building everything in-house).
-
IMPLICATIONS
These challenges illustrate that PQC and cryptographic compliance is not just a technical issue but an operational and strategic one. Fragmented key systems, lack of skilled personnel, and pressing compliance deadlines form a “ perfect storm ” that can overwhelm organizations if not addressed holistically.
In the next section, we outline strategic solutions and best practices that can help overcome these hurdles. The focus will be on achieving crypto agility and centralized key management, which are recurring themes for solving fragmentation, easing audit burdens, and enabling smooth migration despite uncertainty.
STRATEGIC SOLUTIONS AND BEST PRACTICES
To address the above challenges, financial institutions should pursue a multi-pronged strategy centered on crypto agility, robust key management, and phased implementation of PQC.
Below are the key strategic solutions and best practices recommended:
An essential first step is to discover and catalog all cryptographic assets in the organization. This means identifying where and how encryption is used – certificates, TLS connections, VPNs, application-layer encryption, databases, HSM-stored keys, etc. along with the algorithms and key lengths in use. Many institutions are now performing “ crypto discovery ” scans and creating centralized crypto inventories as part of their DORA/NIS2 compliance and PQC readiness.
Alongside inventory, perform a risk assessment: classify which systems and data are most sensitive or at risk from quantum threats. For example, any data with long confidentiality requirements (customer PII, longterm secrets, PKI keys) should be prioritized for early migration to PQC because it could be intercepted now and decrypted later.
This inventory and risk map will guide a phased migration – it’ s the groundwork that both regulators and internal stakeholders will expect. In practice, firms are using tools to automate crypto discovery (scanning code and network endpoints for instances of cryptography). The outcome should be a catalogue of CBOMs (cryptographic bill of materials) that gives a clear visibility of your “ crypto estate ” – which then informs all other strategic steps. Prioritize long-lived confidentiality data for early PQC or hybrid protections due to HNDL risk.
Crypto agility is the ability to change cryptographic algorithms and implementations with minimal disruption. This needs to be embraced as a core architectural principle going forward. Practically, this means designing systems and applications such that algorithms are pluggable or configurable, rather than hard-coded. Wherever possible, use standardized APIs and protocols that support algorithm negotiation or swapping. For instance, use PKI libraries that will support new PQC certificate types, or use an abstraction layer for encryption in applications so that you can redirect from an RSA implementation to a PQC implementation easily.
At the enterprise level, consider establishing a Cryptography Center of Excellence or similar governance group that defines coding guidelines and ensures new projects use approved crypto libraries (facilitating future updates). The payoff is significant: crypto-agile organizations can respond rapidly to new standards or threats (e.g. if a weakness is found in an algorithm, they can “hot-swap ” it out).
Regulators and boards are increasingly demanding this agility – vendor-independent, agile cryptographic architectures that avoid lock-in and allow quick algorithm swaps are seen as winners. A concrete example is implementing TLS 1.3 with support for hybrid key exchanges (classical + PQC) so that when browsers and servers agree on a PQC algorithm, your systems can participate with a config change, not a full redesign. Crypto agility also means maintaining multiple algorithms in parallel during a transition (e.g. supporting both RSA and MLDSA in a key infrastructure) which requires careful planning.
Organizations should update their cryptography policy (as required by DORA/NIS2) to explicitly include agility – e.g. a policy clause that new solutions must support approved PQC algorithms by a certain date, and that systems should be designed to facilitate crypto updates. Embracing crypto agility now is an investment that will reduce technical debt and compliance risk in the coming years.
Tackling the fragmentation of crypto systems is paramount. Financial institutions should move toward a centralized key management strategy, often enabled by a unified key management system or platform. The goal is to consolidate the management of keys from on-prem HSMs, cloud KMS services, and software key stores into a single pane of glass or coordinated control plane. By doing so, institutions can enforce uniform key policies (e.g. rotation intervals, strength requirements), get a global view of key usage, and dramatically streamline audit reporting. For example, Barclays integrated its multiple HSM clusters and cloud accounts under one central Cryptomathic ’ s CrystalKey360 solution; the result was a 65% reduction in operating, hardware and licensing costs and much improved auditability.
A unified key manager also enables automated key rotation and lifecycle management – rather than adhoc manual rotations, keys can be rotated on schedule across environments, with logs automatically recorded for compliance. Crucially, centralization is an enabler for crypto agility: when you need to introduce a new PQC key type, you can do it in one central system and propagate across all uses, instead of updating dozens of separate systems.
Many institutions are evaluating vendor-agnostic key orchestration solutions (including bring your own key (BYOK) services for cloud) to achieve this central control.
CrystalKey360 is an example of such a platform; it unifies on-prem HSM and multi-cloud key management under one roof and automates compliance reporting for standards like PCI DSS 4.0 and DORA. By deploying a centralized crypto management solution, a CISO can alleviate “key sprawl” and ensure that audit evidence (key inventories, rotation logs, encryption coverage) can be generated in clicks rather than via months of spreadsheet work. Centralization also brings role-based access control and strong segregation of duties (e.g. separation of who can generate keys vs. who can approve usage), which is important for compliance (PCI requires strict access controls for keys). In summary, a robust Enterprise Key Management (EKM) program – like CrystalKey360 – is foundational for crypto agility and governance. It creates a single source of truth for all cryptographic assets and significantly reduces the operational burden.
Adopting a hybrid approach allows organizations to get started with PQC without fully replacing existing cryptography overnight. In practice, “hybrid” means using classical and post-quantum algorithms in parallel so that each compensates for the other ’ s uncertainties. For example, one can implement TLS handshakes that perform two key exchanges: one using a traditional algorithm like ECDH and one using a PQC algorithm like CRYSTALS-Kyber, combining the shared secrets – this way, even if one algorithm is broken, the session remains secure as long as the other is safe. Similarly, one could issue digital certificates that contain two public keys (RSA and ML-DSA), or sign code with both an ECC signature and a PQC signature.
Hybrid modes are being exercised at Internet scale in browsers and CDNs and are progressing through IETF drafts; treated as a pragmatic near-term measure, not yet a universal standard. It offers a pragmatic path: you retain the assurance of well-trusted classical crypto while adding quantum-resistant protection as an overlay.
Many financial firms are testing such approaches in non-production environments – for instance, pilot projects to transact between two offices with a VPN that has dual encryption (AES-256 and a PQC algorithm).
The advantage of hybrid is that it buys time to vet the new algorithms ’ performance and reliability, and it mitigates the risk in case early PQC algorithms later exhibit weaknesses (you ’d still have classical security as a backstop). Regulators also view hybrid positively; it demonstrates proactive risk mitigation (“defense in depth” for cryptography). Therefore, a key part of the strategy is to deploy hybrid crypto solutions wherever feasible in the next few years – particularly for protecting high-value data. This could be as simple as using libraries that implement composite certificates, or using a HSM’ s capability to generate dual signatures. As standards solidify (e.g. the IETF is standardizing hybrid key exchange in TLS 1.3), organizations that have experimented with hybrid will be ahead of the curve in rolling out full PQC. One must, however, manage the complexity (two algorithms mean extra computational load and complexity in key handling), so planning and testing are important.
Since the cryptographic landscape is evolving, it is wise to rely on trusted, validated libraries and HSM firmware for PQC rather than improvising. Prefer FIPS-validated or vendor-audited implementations of ML-KEM, ML-DSA, and SLH-DSA; track NIST HQC progress as a backup KEM. Financial institutions should avoid jumping on unproven “ proprietary ” PQC solutions that haven ’t been peer-reviewed. Engage with vendors (HSM, KMS, software providers) to understand their roadmap for PQC support – many will have modules ready to deploy as standards are finalized. Plan upgrades or patches in your infrastructure lifecycle to incorporate those updates.
It’ s also recommended to participate in industry interoperability tests or pilots (for instance, the ATM or payment networks might run quantum-safe pilots – joining these can provide practical experience). Keep an eye on guidance from ENISA, NIST, ETSI, and national cryptographic agencies; they often publish migration guidelines. NIST’ s National Cybersecurity Center of Excellence (NCCoE) has a draft practice guide for migrating to PQC which can serve as a playbook. In Europe, bodies like ENISA have published studies on integration of PQC into existing protocols. Staying informed will help ensure your solution is standards-compliant and audit-friendly.
Remember that compliance frameworks may eventually require specific algorithms or strengths – for example, an EU regulatory update might in 2028 mandate that any new signature must use a PQC algorithm from the EU’ s recommended list. By aligning with recognized standards early, you minimize future rework.
Given the lack of internal expertise, organizations should consider partnerships and training as strategic investments. Use NCCoE migration materials and ENISA guidance to structure staff enablement and pilots. This can mean hiring external consultants for the migration project’ s duration. Analyst firms and big consultancies are developing quantum readiness assessment services – these can provide an outside perspective and help in drafting the roadmap. In parallel, invest in training your existing security architects and developers: send them to cryptography courses, workshops, or have them participate in open-source PQC projects for hands-on exposure.
Another emerging practice is establishing a cross-functional crypto working group that brings together the PKI team, network security, app development leads, and compliance officers. This group can collectively hammer out the migration steps and ensure nothing is overlooked (for instance, updating an internal CA to issue PQC certificates touches many stakeholders).
Also, involve internal audit and risk management in this journey – their buy-in will ensure that once solutions are in place, they tick the right boxes for compliance.
By building at least some in-house competence, you ’ll be better positioned to operate and maintain the new cryptographic environment once the consultants leave.
Many banks are finding that the PQC migration is an opportunity to rejuvenate their cryptography practice overall – to clear out legacy algorithms (3DES, old RSA keys), to update documentation, and to instill a culture of crypto-agility among developers.
Each of these strategic initiatives reinforces the others. For example, having a strong centralized key platform makes it easier to implement hybrid solutions (you can generate classical and PQC keys from one place and distribute them). Adopting crypto-agile design means when you do your inventory you can tag which systems are upgradable vs. which need replacement. All strategies ultimately serve the goal of reducing risk – risk of non-compliance, risk of cryptographic failure, and operational risk during the transition.
ROLE OF CRYPTO AGILITY & CENTRALIZED KEY MANAGEMENT
Crypto agility and centralized key management are cornerstones of a successful response to the postquantum migration challenge. Their roles can be understood in terms of enabling flexibility, consistency, and efficiency in cryptographic operations:
Crypto Agility as a Safety Net and Force Multiplier
A crypto-agile environment is one where changing an algorithm (or cryptographic provider) does not require a complete system redesign. This agility is crucial in the post-quantum context because there is still uncertainty about the longevity of specific algorithms – for instance, if a breakthrough attack is discovered against a PQC algorithm, organizations might need to pivot quickly to an alternative. With agility, such a pivot is feasible and timely, without agility, it could be a catastrophic delay. Moreover, regulators implicitly expect agility: being able to “hot-swap ” algorithms to meet new standards is now seen as a marker of good governance. From a business continuity perspective, crypto agility is akin to insurance – it reduces the chance that your institution gets stuck on an unsafe algorithm or fails an audit because you couldn ’t adopt the required cipher in time. Technologically, agility is achieved by abstraction and smart engineering (as noted earlier: configuration-driven crypto, support for multiple algorithms in protocols, etc.).
Organizations can test their agility by drills – e.g. attempt to replace an algorithm in a test system and measure the effort – to identify gaps. In sum, crypto agility is the ability to respond to change in the cryptography landscape rapidly, and that ability will differentiate institutions that can smoothly handle compliance and security updates from those that struggle. It is a mindset as much as a technical feature, affecting procurement (avoid vendor lock-in), architecture (loose coupling of crypto modules), and policy (mandating agility in design).
Centralized Key Management for Control and Compliance
If agility is about speed and flexibility, centralized key management is about control and visibility. Bringing all key-related processes into a unified system or team yields multiple benefits: it enforces consistency (every application uses keys that meet the same criteria), it prevents shadow crypto implementations, and it gives a holistic view of the organization’s cryptographic posture. For compliance with regulations like DORA and PCI, a centralized approach is almost becoming a necessity – consider DORA’ s requirement for a cryptographic controls policy: it’ s far easier to enforce such a policy when one team or platform manages all keys, rather than chasing disparate IT teams each doing their own thing. Audit and reporting are significantly simplified too. DORA RTS Article 7 explicitly requires a certificate register for ICT assets supporting critical or important functions.
As an example, a centralized key management solution can produce on-demand reports of all encryption keys, algorithms, and rotations, which can then be shown to auditors for PCI DSS 4.0 or internal risk assessments. This directly tackles audit fatigue. In addition, operational resilience (which DORA is about) is improved by centralization: you can monitor in one place if any key or certificate is about to expire or if any encryption subsystem is misconfigured, thereby preventing outages or security incidents. Central management also means better security for keys – HSMs or hardened key vaults can be used universally, eliminating weaker storage practices that sometimes creep in with decentralized approaches. For financial institutions in particular, having a unified cryptographic key infrastructure supports new business needs too, like customer-controlled encryption (BYOK) or inter-bank secure data exchange, because you have a central point to insert such capabilities.
When combined, crypto agility relies on centralized key management to be effective. If you need to roll out a new algorithm, doing it from a central platform means you can push it across the enterprise consistently. Conversely, a centralized system that wasn ’t built for agility could become a bottleneck – which is why modern key management solutions emphasize being “ crypto agile ” themselves, supporting both classical and PQC algorithms and future updates. Notably, CrystalKey360 is positioning exactly on this intersection: it provides a single control plane for keys that is vendor-neutral (works with different HSMs and cloud providers) and algorithm-agnostic (extensible to new algorithms via software updates).
For example, CrystalKey360’ s approach of unifying HSMs and cloud KMS allows an organization to manage both RSA/ECC keys and new PQC keys side by side, and perform tasks like generating a hybrid key pair or rotating a certificate to a PQC version, in a coordinated workflow. It also boasts automated compliance checks – e.g. it can automatically log every key action required for PCI or produce DORAspecific encryption policy documentation on demand. This illustrates how a solution can operationalize both agility and centralized control: the end-users (app teams, DevOps, etc.) consume cryptography as a service without needing to know the underlying algorithms, and the central team can introduce upgrades (say, enabling a Dilithium-based signing service) without the app teams needing to overhaul their code.
In a broader sense, the role of crypto agility and key management is to future-proof the organization ’ s security and compliance posture. With quantum threats, we are confronted with a once-in-a-generation paradigm shift in security. Agility and centralized control together ensure that this shift – and likely more shifts to come – can be managed in stride. They turn a potentially chaotic, high-risk transition into a more predictable, governed process. For a CISO or Head of Cryptography, investing in these capabilities is strategic: it not only addresses the PQC migration, but leaves the organization in a far stronger position to handle any cryptographic changes (be it a new compliance requirement, a new threat like a cryptographic vulnerability, or adoption of emerging tech like confidential computing which also ties into key management).
CONCLUSION
Crypto agility gives you options and speed when change is needed, and centralized key management gives you control and visibility at all times. Financial institutions will need both to navigate the coming decade of cryptographic upheaval successfully.
In a separate white paper, we outline a practical migration path that leverages these principles. You can find it here.
APPENDIX: INSTITUTIONS, STANDARDS, REGULATIONS AND REFERENCES
EUROPEAN UNION
European Commission
The EU’ s executive body responsible for regulations, directives, and recommendations affecting financial institutions and cybersecurity.
ENISA (European Union Agency for Cybersecurity)
EU agency providing expertise and studies on cryptographic resilience and post-quantum migration.
NIS2 Directive (Directive (EU) 2022/2555)
Expands the EU cybersecurity framework to cover banks and critical infrastructure. Requires “state-of-theart” encryption and explicit policies for cryptography. Reference: EUR-Lex
DORA – Digital Operational Resilience Act (Regulation (EU) 2022/2554)
Regulation effective January 2025 requiring ICT risk management in financial services, including encryption and key management policies. Reference: EUR-Lex
DORA RTS (Regulatory Technical Standards)
Commission rules specifying encryption and cryptography policy requirements, lifecycle management of keys, and certificate registers. Reference: European Commission
EU Coordinated PQC Roadmap (2024 Recommendation / 2025 Cooperation Group Roadmap)
Milestones: national strategies by 2026, PQC for critical systems by 2030, broad migration by 2035. Reference: European Commission DG CONNECT
UNITED STATES
NIST (National Institute of Standards and Technology)
U.S. standards body leading PQC transition.
-
FIPS 203 (ML-KEM / Kyber) – NIST PDF
-
FIPS 204 (ML-DSA / Dilithium) – NIST PDF
-
FIPS 205 (SLH-DSA / SPHINCS+) – NIST PDF
-
NIST PQC Homepage – csrc.nist.gov PQC portal
-
NIST Selected Algorithms (HQC backup KEM, March 2025) – NIST update
U.S. agency setting cryptographic policy for national security systems.
-
CNSA 2.0 (Commercial National Security Algorithm Suite 2.0) – NSA CNSA 2.0 Guidance
-
CNSA 2.0 FAQ / Migration Timelines – NSA Cybersecurity Information Sheet
-
NSA Press Highlight – NSA CNSA 2.0 News Release
Provides joint factsheets with NIST, e.g. on “Harvest Now, Decrypt Later.” Reference: CISA PQC Factsheet
National Security Memorandum-10 (NSM-10)
U.S. directive requiring PQC migration across federal IT by 2035. Reference: White House NSM-10
GLOBAL INDUSTRY STANDARDS
PCI DSS 4.0 (Payment Card Industry Data Security Standard v4.0.1)
Governs cardholder data protection. Effective March 2024, with future-dated crypto requirements mandatory by March 2025. Reference: PCI SSC Document Library
PCI DSS Timing and Requirements
Reference: PCI SSC Blog
PCI SSC (Payment Card Industry Security Standards Council)
Industry body managing PCI DSS.
IETF (Internet Engineering Task Force)
Standards body developing hybrid cryptography drafts (e.g. hybrid KEMs for TLS 1.3). Reference: IETF Draft on Hybrid Key Exchange
ISO, SWIFT, Card Networks
Global and financial industry standard-setters expected to adopt PQC requirements in upcoming standards.
ETSI (European Telecommunications Standards Institute)
Standards organization with research and technical reports on CBOMs and PQC integration.
KEY CONCEPTS AND RISKS
Crypto Agility
Organizational capability to swap cryptographic algorithms without major redesign. Required implicitly by DORA, PCI DSS, and NIS2.
Harvest Now, Decrypt Later (HNDL)
Adversary model where encrypted data is collected today and decrypted later with quantum computers. References: NIST Quantum Risk Explainer, CISA PQC Factsheet
Hybrid Cryptography
Using classical and PQC algorithms in parallel (e.g. TLS with Kyber + ECDH). References: Cloudflare Blog on Hybrid PQC, Chromium Blog on PQC Trials
