BenchmarksStack RankingAPIsPricingDocsWhite PaperTokenBlogAbout
Log InGet API Key
Banking NIST · 9 min read

NIST Post-Quantum Standards for Banking
What Your Auditor Will Ask

The post-quantum compliance clock is ticking for financial institutions. FIPS 203 and 204 are finalized. OCC guidance is issued. PCI DSS is updating. Here's exactly what your examiner will ask in your next audit -- and how to have the right answers ready.

Why Banking Is Uniquely Exposed to the Quantum Threat

Financial institutions face a quantum threat profile that is fundamentally different from most industries. Three factors converge to make banking the highest-priority sector for post-quantum migration:

Long-term data value. Financial records retain regulatory, legal, and economic value for decades. Bank Secrecy Act records must be retained for 5 years. Suspicious Activity Reports are retained indefinitely. Mortgage records persist for 30+ years. Tax-related transaction data has a minimum 7-year retention. In a Harvest Now, Decrypt Later scenario, every encrypted financial transaction recorded today becomes a future quantum target with decades of value.

Regulatory density. Banks operate under more overlapping compliance frameworks than virtually any other industry. OCC, FDIC, Federal Reserve, FFIEC, PCI DSS, SOX, GLBA, state regulators -- each of these authorities is independently evaluating quantum risk and will independently expect evidence of migration planning. A hospital might face HIPAA; a bank faces a dozen simultaneous regulatory expectations.

Systemic interconnection. The banking system is a network. SWIFT, FedWire, ACH, CHIPS, real-time payment networks, correspondent banking relationships, card network integrations -- a quantum vulnerability at any node in this network creates cascading risk. You can upgrade your own cryptography, but if your correspondent bank, payment processor, or clearinghouse has not, the chain is only as strong as its weakest classical link.

The NIST Standards That Matter

Three NIST publications form the foundation of post-quantum compliance for banking:

FIPS 203: ML-KEM (Module Lattice-Based Key Encapsulation Mechanism)

Published August 2024, FIPS 203 standardizes the post-quantum replacement for RSA and ECDH key exchange. For banks, this is the most urgent standard because it addresses the HNDL threat. Every TLS connection to your online banking portal, every API call to your payment processor, every SWIFT message relay -- all of these use key exchange that FIPS 203 is designed to replace. Your auditor will ask whether you have begun deploying ML-KEM for key exchange on external-facing connections.

FIPS 204: ML-DSA (Module Lattice-Based Digital Signature Algorithm)

Published August 2024, FIPS 204 standardizes the post-quantum replacement for RSA and ECDSA digital signatures. For banks, this affects code signing, document signing, certificate chains, API authentication, and transaction non-repudiation. Unlike key exchange (where the threat is retroactive), digital signature forgery requires real-time access to a quantum computer. The migration timeline for signatures is therefore slightly less urgent than for key exchange, but auditors are already including it in their questionnaires because deployment timelines are long.

NISTIR 8547: Transition to Post-Quantum Cryptography Standards

Published November 2024, this document provides the migration roadmap. It explicitly deprecates RSA, ECDSA, ECDH, and DSA for new applications and sets timelines for complete phase-out. For banks, the key guidance is that NIST expects organizations to begin migration immediately and to have completed migration of the most critical systems by 2030. NISTIR 8547 is not a standard -- it is guidance -- but auditors treat it as the authoritative migration timeline.

What Bank Examiners Will Ask in 2026-2027

Based on published OCC and FFIEC guidance, industry working group outputs, and conversations with audit firms preparing their 2026-2027 examination procedures, here are the specific questions your institution should expect:

Cryptographic Inventory

Migration Planning

Technical Implementation

The examiner's real question: "Show me that you understand the quantum threat to your institution, that you have a credible plan to address it, and that you are making measurable progress against that plan." The worst answer is not "we haven't finished migrating" -- it's "we haven't started planning."

OCC and FFIEC Guidance on Emerging Technology Risks

The OCC's Bulletin 2023-17 on Third-Party Risk Management requires banks to evaluate the security practices of their technology vendors, including their approach to emerging threats. Quantum computing falls squarely within this scope. In 2025, the OCC supplemented this with specific guidance noting that "the transition to post-quantum cryptography represents a significant operational risk that institutions should address proactively."

The FFIEC's Information Security booklet, updated in 2024, now explicitly references quantum computing as a threat to cryptographic controls. The booklet states that institutions should "evaluate the potential impact of quantum computing on encryption algorithms currently in use" and "develop a migration plan to transition to quantum-resistant algorithms as standards are finalized."

These are not suggestions. FFIEC examination procedures are binding on all federally regulated financial institutions. Examiners use these booklets as their checklists. If your institution cannot demonstrate awareness of and planning for the quantum threat, you will receive examination findings.

PCI DSS and the Post-Quantum Timeline

PCI DSS v4.0, effective March 2025, does not yet mandate specific post-quantum algorithms. However, Requirement 12.3.3 requires that organizations perform a targeted risk analysis for any security control that is "not explicitly stated in PCI DSS as a specific configuration." The use of classical-only cryptography in an environment where quantum threats are documented and NIST has published replacement standards is exactly the kind of risk that 12.3.3 is designed to surface.

The PCI Security Standards Council has formed a Quantum Readiness Working Group that is developing supplemental guidance for post-quantum migration in payment environments. Early drafts indicate that PCI DSS v4.1 (expected 2027) will include explicit requirements for post-quantum key exchange on cardholder data transmission and post-quantum digital signatures on payment application integrity verification.

Banks that wait for PCI DSS v4.1 to mandate PQ algorithms will find themselves scrambling to deploy in the 18-month compliance window. Banks that begin deploying now will already be compliant when the requirement arrives.

How SWIFT Is Approaching Post-Quantum Migration

SWIFT's Customer Security Programme (CSP) has incorporated quantum readiness into its 2026 assessment framework. SWIFT's Technical Advisory Group published its PQ migration roadmap in late 2025, recommending that member institutions begin hybrid deployment of ML-KEM on SWIFTNet FIN connections by Q4 2026, with full PQ migration targeted for 2029.

For correspondent banking relationships, SWIFT is evaluating a centralized PQ certificate authority that would issue ML-DSA-signed certificates for inter-bank communication. This would simplify the migration for smaller institutions but requires that all SWIFT members upgrade their infrastructure to handle ML-DSA signatures (which are 2-4x larger than ECDSA signatures).

Banks with high-volume SWIFT traffic should begin testing ML-KEM integration with their Alliance gateway infrastructure now. The SWIFT test environment (SAG-T) supports hybrid PQ handshakes as of January 2026.

Cross-Border Implications: ANSSI, BSI, and Beyond

Banks operating internationally face additional complexity because different national standards bodies have different PQ migration timelines and, in some cases, different approved algorithms:

AuthorityKey ExchangeSignaturesMandatory Date
NIST (US)ML-KEM (FIPS 203)ML-DSA (FIPS 204), SLH-DSA (FIPS 205)2035 (NSM-10), 2027 (CNSA 2.0 for NSS)
ANSSI (France)ML-KEM + hybrid mandatoryML-DSA (hybrid recommended)2025 (hybrid deployment begin)
BSI (Germany)ML-KEM-1024, FrodoKEMML-DSA, XMSS, LMS2025 (government), 2030 (critical infrastructure)
CCCS (Canada)Aligned with NISTAligned with NISTFollowing NIST timeline
NCSC (UK)ML-KEM (hybrid recommended)ML-DSA, SLH-DSA2035 target, early movers encouraged

Note the divergence: ANSSI mandates hybrid mode (classical + PQ) for the transition period, while NIST and BSI allow pure PQ deployments. BSI approves FrodoKEM (a conservative, non-NTT-based lattice scheme) in addition to ML-KEM. Banks operating in multiple jurisdictions need a cryptographic architecture that can accommodate these differences -- or a vendor whose products already cover all approved algorithms.

H33 for Banking: FraudShield and Share

H33 provides two products specifically designed for banking use cases that go beyond transport-layer PQ migration:

H33-FraudShield enables cross-bank fraud detection on fully encrypted data. Using BFV Fully Homomorphic Encryption, FraudShield allows multiple institutions to run fraud scoring models against shared transaction data without any institution seeing another's plaintext transactions. This addresses both the quantum threat (all data remains FHE-encrypted end-to-end) and the data sharing challenge (no PII is ever exposed between institutions).

H33-Share provides encrypted intelligence sharing between financial institutions. SAR filings, threat indicators, and fraud patterns can be shared in encrypted form, queried with STARK zero-knowledge proofs, and acted upon -- without revealing the underlying data to any party except the intended recipient. This meets FinCEN's 314(b) information-sharing expectations while maintaining quantum-safe encryption throughout.

Don't wait for the audit finding. H33 provides SOC 2 Type II, HIPAA, and ISO 27001 compliance at 100% in Drata. Every API call is post-quantum protected by default. Start with the free tier and have a working PQ implementation before your next examination.

Further Reading