NIST FIPS 203 · 204 · 205 — RATIFIED

Your data is
being harvested
today. Decrypted
tomorrow

The cryptographic algorithms protecting the modern internet — RSA, ECDSA, Diffie-Hellman — will collapse the moment a cryptographically-relevant quantum computer arrives. Adversaries are already storing intercepted traffic, waiting. We migrate organizations to post-quantum cryptography before the clock runs out.

quantum_threat_monitor.live
Estimated Q-day window
2030–2035
Based on NIST & Global Risk Institute projections
RSA-2048BROKEN
ECDSA P-256BROKEN
ML-KEM-768SAFE
ML-DSA-65SAFE
NIST FIPS 203 ML-KEM standardised FIPS 204 ML-DSA ratified FIPS 205 SLH-DSA finalised CNSA 2.0 mandates PQC by 2033 Harvest-now, decrypt-later in progress Shor's algorithm breaks RSA in polynomial time Grover's algorithm halves symmetric security EU NIS2 directive cites PQC readiness NIST FIPS 203 ML-KEM standardised FIPS 204 ML-DSA ratified FIPS 205 SLH-DSA finalised CNSA 2.0 mandates PQC by 2033 Harvest-now, decrypt-later in progress Shor's algorithm breaks RSA in polynomial time Grover's algorithm halves symmetric security EU NIS2 directive cites PQC readiness
01 / The threat

Quantum computing breaks every public-key system the internet was built on.

Shor's Algorithm

Factors 2048-bit RSA in hours on a sufficiently large quantum computer. Elliptic curves fall just as easily. Every TLS handshake, VPN tunnel, and signed certificate in existence is retroactively vulnerable.

ImpactCATASTROPHIC

Harvest Now, Decrypt Later

Nation-state actors are recording encrypted traffic at backbone level today — banking, medical, diplomatic, intellectual property — storing it for the day quantum decryption becomes viable. Anything with >10 year sensitivity is already compromised.

StatusACTIVE

Q-Day Uncertainty

Expert surveys place cryptographically-relevant quantum computers between 2030 and 2040. Migration to post-quantum standards takes 5–10 years for most enterprises. The math is already unforgiving.

Runway< 8 YEARS
02 / NIST standards

Four algorithms. One quantum-safe future.

FIPS 203 · KEM
ML-KEM
formerly CRYSTALS-Kyber
Lattice-based key encapsulation. Replaces RSA / ECDH key exchange in TLS, SSH, and IKE. Small ciphertexts, blazing fast.
BasisM-LWE
Pub key1184 B
FIPS 204 · SIG
ML-DSA
formerly CRYSTALS-Dilithium
General-purpose lattice signatures. The new default for code-signing, document signing, and certificate authorities.
BasisM-LWE
Signature3293 B
FIPS 205 · SIG
SLH-DSA
formerly SPHINCS+
Hash-based signatures with minimal assumptions. Large but conservative — the hedge against a lattice break.
BasisHash
Signature7856 B
DRAFT · SIG
FN-DSA
formerly Falcon
NTRU-lattice signatures. Smallest signature sizes of any PQ scheme — ideal where bandwidth is precious.
BasisNTRU
Signature666 B
03 / Live demonstration

Watch a post-quantum key exchange happen in real time.

ml-kem-768 · key encapsulation mechanism ● READY

Alice // initiator

Client
pk
sk
shared

Bob // responder

Server
ct
shared
$ ready — press START to begin the ML-KEM-768 key exchange.
stage 0 / 4
04 / Migration path

From vulnerable to quantum-safe in five stages.

01

Discover

Cryptographic bill-of-materials. Find every RSA key, every TLS endpoint, every embedded certificate across your stack.

Week 1 – 4
02

Prioritise

Classify by sensitivity lifetime. Data that must stay secret for 10+ years gets migrated first — it's already being harvested.

Week 4 – 8
03

Hybridise

Deploy classical + post-quantum combined schemes. Belt-and-braces security while the ecosystem matures.

Month 2 – 6
04

Replace

Swap legacy primitives for ML-KEM and ML-DSA across TLS, code-signing, PKI, VPN, and firmware update channels.

Month 6 – 18
05

Operate

Crypto-agility as a permanent practice. Monitoring, rotation, and readiness for the next standard shift.

Ongoing

The migration takes years.
Q-day doesn't wait.

Book a 45-minute assessment with our cryptography team. We'll map your exposure, estimate migration cost, and build a concrete roadmap — at no charge.

Book assessment Replay demo