2 min read
Challenges of PQC Migration and Cryptographic Compliance for Financial Institutions
Cryptomathic : 28. August 2025
Post-quantum cryptography (PQC) is no longer a theoretical concern. With standards finalized and regulatory frameworks such as DORA, PCI DSS 4.0, and NIS2 setting strict requirements, financial institutions must begin the process of upgrading their cryptographic systems. The transition, however, is far from straightforward.
Banks and payment providers face a combination of fragmented systems, talent shortages, audit burdens, tight deadlines, and a vendor landscape that is still maturing.
Together, these challenges make PQC migration one of the most complex transformation programs the industry has faced in decades.
Fragmented Cryptographic Infrastructure
Over time, large financial institutions have accumulated diverse and distributed cryptographic systems. It is common for a global bank to operate multiple hardware security module (HSM) platforms, several cloud key management services (KMS), and dozens of independent key stores across business units.
This fragmentation creates significant barriers:
- Lack of a unified cryptographic inventory.
- Inconsistent policies and controls.
- Increased costs due to duplicated tools and expertise.
- Complex and time-consuming audits.
For PQC migration, this fragmentation is a critical obstacle. Identifying and replacing every vulnerable algorithm across legacy systems becomes a near-impossible task without centralization and visibility.
Limited Post-Quantum Cryptography Expertise
The expertise needed to deploy PQC is in short supply. Only a small number of engineers worldwide have practical experience implementing lattice-based or hash-based cryptography. Within financial institutions, existing cryptography teams are already fully occupied maintaining public key infrastructures and HSM operations.
Hiring PQC specialists is difficult, and training existing staff requires time that most organizations do not have. As a result, many institutions prefer vendor-provided or turnkey solutions that package PQC capabilities in a manageable way, reducing the risk of implementation errors.
Audit Fatigue and Compliance Pressures
Financial organizations already face overlapping regulatory obligations under DORA, PCI DSS 4.0 and NIS2. Each framework demands detailed evidence of encryption policies, key rotations, and risk assessments.
Without automation, the burden of compliance can overwhelm security teams:
- Evidence must be collected from multiple, inconsistent systems.
- Manual processes such as spreadsheet-based key tracking increase the risk of errors
- New regulatory deadlines, including PCI DSS 4.0 requirements by 2025, add to the workload.
Institutions that continue relying on fragmented systems and manual reporting risk falling behind. Centralized key visibility and automated compliance reporting are becoming essential to reduce audit fatigue and maintain accuracy.
Deadlines Against an Uncertain Threat Horizon
Regulators have set clear deadlines for cryptographic modernization. Supervisors are beginning to require cryptographic inventories and PQC transition plans with fixed target dates. At the same time, the timeline for large-scale quantum computing remains uncertain.
This uncertainty often results in hesitation or short-term fixes, such as extending the size of classical keys. Yet experts agree that enterprise-wide cryptographic transformation takes years to complete. For systems protecting long-lived sensitive data, waiting is not an option. Institutions that delay planning are likely to miss compliance deadlines and increase their long-term risk exposure.
An Immature Vendor Ecosystem
While PQC algorithms have been standardized, the surrounding technology ecosystem remains incomplete. Many HSMs, TLS libraries, and database encryption tools do not yet support PQC. In some cases, solutions marketed as “quantum-safe” rely on proprietary schemes that may not align with official standards.
This creates several risks:
- Integration challenges across heterogeneous environments.
- Vendor lock-in when proprietary tools are adopted.
- Interoperability issues in multi-cloud or hybrid infrastructures.
To address this, financial institutions are beginning to prioritize crypto-agility: designing systems that allow algorithms or vendors to be swapped with minimal disruption as standards evolve and products mature.
Strategic Implications
The challenges outlined above make clear that PQC migration is not simply a technical upgrade. It is a strategic transformation that affects people, processes, and technology. Institutions that treat PQC as an enterprise program—rather than a tactical project—will be best positioned to navigate the transition successfully.
To prepare effectively, financial institutions should:
- Establish centralized cryptographic visibility across all systems.
- Invest in crypto-agility to accommodate evolving standards.
- Leverage trusted vendor solutions to bridge the skills gap.
- Automate compliance reporting to ease audit pressures.
- Begin planning immediately, recognizing that migration will take years.
By addressing these areas, financial institutions can meet regulatory deadlines, strengthen resilience, and ensure that they are ready for a post-quantum future.
Discover how you can protect yourself against quantum attacks by adopting a strategy for cryptographic agility. Download now.