APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key
APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key
MIGRATION GUIDE

NIST Post-Quantum Migration Guide (2026)

How to convert your stack to NIST post-quantum cryptography without rebuilding everything. Step-by-step migration plan.

Published 2026-04-25 · H33 Engineering · NIST Migration Series

The NIST post-quantum cryptography standards are finalized. FIPS 203 (ML-KEM/Kyber) and FIPS 204 (ML-DSA/Dilithium) are production-ready. Federal agencies have a hard deadline. Private sector organizations face mounting pressure from regulators, insurers, and customers.

The question is no longer whether to migrate. It's how — without rebuilding your entire infrastructure.

This guide covers the complete migration path: what needs to change, what doesn't, what breaks if you get it wrong, and how to do it in weeks instead of years.

Why Migration Can't Wait

Quantum computers capable of breaking RSA-2048 and ECC P-256 are estimated to arrive between 2030 and 2035. But the threat is already here — adversaries are executing "harvest now, decrypt later" (HNDL) attacks, capturing encrypted data today with the intention of decrypting it once quantum hardware matures.

Every day your systems transmit data encrypted with classical algorithms, that data becomes a future liability. Medical records, financial transactions, legal communications, authentication tokens — all of it is being collected.

NIST finalized the post-quantum standards in August 2024 specifically because this window is closing. The migration timeline is not a suggestion. It's a countdown.

What Actually Needs to Change

Most organizations assume post-quantum migration means replacing everything. It doesn't. Here's what actually changes:

Must Change

Does Not Change

The migration surface is narrower than most organizations think. It's the asymmetric cryptography layer — key exchange and signatures — that needs to be replaced. Everything else stays.

The Three Migration Approaches

1. Full Rebuild ($2M–$18M, 12–24 months)

Replace your entire cryptographic stack. Rewrite TLS configurations, re-issue all certificates, update every SDK, retrain every team. This is what most consultants recommend because it's the most billable approach.

For most organizations, this is unnecessary and dangerous. You're introducing migration risk across every system simultaneously.

2. Hybrid Mode ($500K–$2M, 6–12 months)

Run classical and post-quantum algorithms in parallel. TLS connections negotiate both ML-KEM and ECDH. Signatures include both ML-DSA and ECDSA. If the post-quantum layer fails, the classical layer catches it.

This is the recommended approach for organizations with existing infrastructure they can't afford to break. It's also what NIST recommends during the transition period.

3. API Abstraction ($0–$200/mo, days)

Route your cryptographic operations through an API that handles post-quantum algorithms on the backend. Your application code doesn't change. Your infrastructure doesn't change. The API handles ML-KEM, ML-DSA, and FIPS compliance.

This is what H33 provides. One API call replaces your encryption, signing, and key exchange layer with NIST-compliant post-quantum cryptography. No library changes. No certificate re-issuance. No infrastructure rebuild.

Step-by-Step Migration Plan

Phase 1: Audit (Week 1)

Identify every system that uses asymmetric cryptography. This includes:

H33's HICS scanner can automate this audit. Run hics scan . against your codebase to identify classical cryptography dependencies.

Phase 2: Prioritize (Week 2)

Not everything needs to migrate at once. Prioritize by data sensitivity and exposure window:

Phase 3: Integrate (Weeks 3–4)

For each system, choose your integration method:

API integration (recommended for most systems):

POST /v1/decision
{
  "input": encrypted_data,
  "policy": "pq_sign_and_verify"
}
→ returns: result + H33-74 proof

One endpoint. H33 handles ML-KEM key exchange, ML-DSA signing, and FIPS 204 compliance automatically. No cryptographic decisions required.

SDK integration (for latency-sensitive paths):

cargo add h33-client
# or
npm install @h33/sdk
# or
pip install h33

Phase 4: Verify (Week 5)

Every H33 API call returns an H33-74 attestation — a 74-byte proof that the operation was executed with NIST-compliant post-quantum cryptography. This proof is independently verifiable and anchored to Bitcoin mainnet.

Your auditors, regulators, and insurers can verify compliance without trusting your word. The proof is mathematical.

Phase 5: Attest Continuously (Ongoing)

Migration is not a one-time event. Controls drift. Configurations change. New services get deployed with classical cryptography.

HATS continuously attests that your post-quantum controls are operating as declared. If a service falls back to RSA or ECDH, HATS detects it in real time and produces a cryptographic record of the deviation.

Key Size and Performance Considerations

Post-quantum algorithms have larger key sizes than their classical counterparts:

AlgorithmPublic KeySignatureSecurity Level
RSA-2048256 bytes256 bytes112-bit (broken by quantum)
ML-DSA-65 (Dilithium)1,952 bytes3,309 bytesNIST Level 3 (quantum-safe)
FALCON-512897 bytes690 bytesNIST Level 1 (quantum-safe)
SLH-DSA-128f (SPHINCS+)32 bytes17,088 bytesNIST Level 1 (quantum-safe)

Larger keys mean more bandwidth and storage. But the performance impact is manageable. H33's production pipeline processes ML-DSA signing and verification in under 400 microseconds — fast enough for real-time authentication at 1.6M+ operations per second.

What Happens If You Don't Migrate

Regulatory pressure is accelerating. The White House issued NSM-10 requiring federal agencies to inventory cryptographic systems. OMB M-23-02 requires agencies to submit migration plans. CNSA 2.0 sets specific deadlines for Department of Defense systems.

For private sector organizations, the pressure comes from:

The H33 Approach: One API, No Rebuild

H33 is verifiable decision infrastructure. One API call gives you NIST-compliant post-quantum cryptography — ML-KEM key exchange, ML-DSA signatures, FHE encrypted computation, and ZK-STARK proofs — without changing your application code or infrastructure.

You are not integrating cryptography. You are calling an endpoint.

Every call returns an H33-74 attestation: 74 bytes of post-quantum proof, independently verifiable, anchored to Bitcoin mainnet. Your migration is not just complete — it's provable.

Get API Key — Start Your Migration →

Sandbox free. No credit card. Full NIST FIPS 203/204 compliance from your first call.