Migration Intelligence

What CISOs Are Actually Doing About Post-Quantum Cryptography

The data you need to start your PQC migration conversation with your board, today.

Without this, you would be reading 200+ vendor whitepapers, 40+ academic papers, and 17 regulatory documents across 8 industries. We read them. 14 publicly documented migration projects distilled into one navigable page. 115+ verified sources.

14Cases
8Industries
5Cost Data
115+Sources
28Failure Modes
4Network Maps

This is the only cross-industry PQC migration database with verified sources. Vendor whitepapers sell products, not truth. Analyst reports cost $5,000+ and cover one sector. Academic papers assume you read LaTeX. This database covers 14 organizations across 8 industries, every number sourced, failures included. Vendor-neutral.

Four things broken about PQC migration right now

Zero certified HSMs

No FIPS 140-3 PQC hardware security module exists on Earth. Every regulated organization is blocked on production deployment.

Verified April 2026
Zero private-sector cost data

Five cost figures exist globally, all publicly funded. No Fortune 500 company has disclosed what PQC migration costs. Budget conversations are based on guesses.

EU and US disagree

EU mandates hybrid PQC (classical + quantum-safe). US prefers pure PQ. Multinational organizations cannot satisfy both with a single deployment strategy.

No workforce

Of 14 documented cases, only 2 had internal PQC capability (Cloudflare, Signal). The rest relied on vendors or academic partnerships. PQC engineers do not exist at scale.

How to use this page

1
Pick your industry

Filter by sector below. Each card is a real PQC migration project.

2
Click any case to expand

Full details: timeline, cost, algorithms, Mosca score, maturity, failure modes, sources.

3
Compare to your org

Use the patterns and then take the PQC assessment to measure your own readiness across the same 6 dimensions.

The crypto-procrastination problem

Business executives are structurally incentivized to underestimate security risk. When the cost of addressing a risk is visible and immediate, but the cost of the risk materializing is probabilistic and deferred, organizations systematically choose deferral. OPM (20M records), Japan Pension Service (1.25M records), and Fukushima all followed this pattern.

PQC migration has exactly this structure. Of 14 documented cases, 10 are still in progress and 1 is still in planning. Only Signal deployed in months. Every other organization measured timelines in years.

When your board asks "what did we do about quantum risk?", the minimum defensible answer is a cryptographic inventory and a sourced risk assessment. This page gives you the evidence. The PQC assessment gives you the score.

Source: Zenitani, in Takagi et al. (2026), Mathematical Foundations for Post-Quantum Cryptography, Springer, pp. 420-440. Verified April 2026

Mosca's Theorem: X + Y > Z

X = data shelf life (how long your data must stay secret). Y = migration time (years to deploy PQC). Z = threat horizon (years until a cryptographically-relevant quantum computer, estimated ~12 years mid-range per GRI surveys, range 9-20+). If X + Y > Z, you should have started already.

Every case in this database has X+Y > Z. Calculate yours: Calculate your Mosca inequality

14/14
Cases at risk

Case Studies

Click any case to see full details. Filter by industry. Data as of April 2026

All (14)
Finance (4)
Government (3)
Telecom (1)
Energy (1)
Healthcare (1)
Tech (2)
Crypto (1)
Critical Infra (1)

Where the field actually is

Overall PQC maturity scores across all 14 publicly documented cases (1-5 scale). The pattern is the insight.

5 Optimized
4 Measured
3 Structured
2 Ad-hoc
1 None

10 of 14 cases score 3/5 ("Structured"). Only Cloudflare and Signal reach 5/5. The assessment uses these same 6 dimensions to score your organization.

See where you fall on this chart

Build vs buy

The 14 cases split into distinct capability models. Your staffing decision should match.

Internal team
2 cases

Cloudflare and Signal. Both control the full stack. Both deployed in months, not years. Requires deep cryptographic engineering talent already on staff.

Workforce: dedicated crypto engineers. Cloudflare built CIRCL (Go crypto library). Signal designed PQXDH protocol in-house.

Vendor-led
5 cases

USAF (QuSecure), BdF+MAS (CryptoNext), Estonia (Cybernetica), Vodafone (IBM/SandboxAQ), SWIFT (planning). Procurement-driven. Speed depends on vendor maturity.

Workforce: project managers + vendor oversight. PQC expertise outsourced. Risk: single-vendor dependency (Estonia, USAF).

Consortium / R&D
7 cases

BIS Leap, Mastercard, Germany ID, Hydro-Quebec, PQC4MED, Ethereum, PQ-NEXT. Multi-partner, often publicly funded. Slower but builds ecosystem knowledge.

Workforce: mixed academic + industry teams. PQC4MED's consortium model led to Infineon's TEGRION chip (R&D-to-product pipeline).

Crypto-agility is the real requirement

PQC migration is not a one-time algorithm swap. It is a permanent operational capability. ML-KEM (FIPS 203) and ML-DSA (FIPS 204) are the current NIST standards. SLH-DSA (FIPS 205) provides hash-based signature diversity. HQC (FIPS 206, expected 2027) offers a backup KEM if lattice assumptions break. Organizations that build crypto-agility now can swap algorithms without re-architecting.

ML-KEM
FIPS 203
Key encapsulation
ML-DSA
FIPS 204
Digital signatures
SLH-DSA
FIPS 205
Hash-based sigs
HQC
FIPS 206 (2027)
Backup KEM

11 of 14 organizations named specific NIST algorithms. All converged on ML-KEM and ML-DSA. PQC4MED designed for crypto-agility before NIST finalized, which proved correct. Verified April 2026

Cross-Case Patterns

From 14 publicly documented organizations. Last verified April 2026

EU vs US
HSM Gap
Networks

EU mandates hybrid. US prefers pure PQ.

Multinational organizations face a compliance conflict that adds implementation cost.

AuthorityApproachRationale
BSI (Germany)Hybrid mandatoryIf PQC algorithm fails, classical layer survives
ANSSI (France)Hybrid mandatoryJoint statement with BSI + 20 EU states
CNSA 2.0 (US NSA)Pure PQ preferredSimplicity. Trusts NIST algorithm selection.
NCSC (UK)Pure PQ preferredAligned with US approach

Hybrid satisfies both EU and US requirements but adds implementation complexity. The long-term EU position envisions running two PQC schemes simultaneously. Verified April 2026

Zero FIPS 140-3 PQC HSMs exist

As of April 2026, no hardware security module on Earth has a FIPS 140-3 CMVP certificate listing PQC algorithms. Verified April 2026

VendorPQC StatusFIPS 140-3 PQC?
AWS CloudHSM / KMSML-KEM in TLSNo
Google Cloud KMSML-KEM, ML-DSA, SLH-DSANo
Thales LunaPQC outside FIPS boundaryNo
Entrust nShieldPQC outside FIPS boundaryNo

First certificates expected late 2026 to early 2027. Waiting compresses your implementation timeline into the same window as everyone else.

PQC intelligence flows through institutional networks

Organizations outside these networks are making PQC decisions without the most current intelligence.

BIS Leap Network
European Finance

Connects 5 of 14 cases. BdF carries knowledge in, SWIFT carries findings to 11,000+ institutions.

BdFBISSWIFTMastercardCryptoNext
GSMA Taskforce
Global Telecom

50+ companies, 20+ operators. 7 published documents. Liaison to 3GPP, IETF, ETSI, ITU.

VodafoneIBMSamsungTelefonica
NIST NCCoE
US Government

Top-down: federal law to CNSA 2.0 milestones to Pentagon CIO memo. 47+ collaborators.

QuSecureAWSIBMCisco
EU Horizon Europe
EU Research-to-Production

Vertically integrated supply chain. Infineon: R&D (PQC4MED) to production (TEGRION EAL6).

InfineonCryptoNextThalesG+D

Why the threat is already active

Harvest Now, Decrypt Later (HNDL) is not a theoretical concern. It is an economic decision.

Attacker economics

A state-level adversary captures encrypted traffic now, stores it cheaply, and waits. Cloud storage costs continue to drop. The cost of harvesting is negligible compared to the value of the data. Financial transactions, healthcare records, M&A communications, classified government data, and long-lived authentication credentials are all targets.

The adversary does not need a quantum computer today. They need a storage budget and patience. The decryption payoff is measured in billions. The harvest cost is measured in terabytes.

Data at risk by type
InfiniteBlockchain data (public, permanent)
30+ yearsHealthcare records (HIPAA/GDPR)
25+ yearsMilitary/intelligence comms
10-20 yearsFinancial transaction records
5-10 yearsCorporate IP, M&A communications

The threat is not "quantum computers will break our crypto someday." The threat is "our data is being harvested today and we cannot detect it."

When will quantum computers threaten your cryptographic systems?

Scenario analysis grounded in published hardware benchmarks and resource estimates. Not a prediction. A decision-support tool.

Every CISO planning a PQC migration needs to estimate Z in Mosca's inequality: when will a cryptographically relevant quantum computer arrive? This tool puts the published data in one place so you can see what the researchers and hardware vendors actually report.

Based on published data as of April 2026 Complementary to GRI expert surveys No account required
!
Data transmitted today is already at risk

Harvest Now, Decrypt Later (HNDL): adversaries capture encrypted traffic today and store it for decryption when quantum capability arrives. The scenario ranges below tell you when the decryption becomes possible.

Schneier, Applied Cryptography. NSA CNSA 2.0 advisory. GRI 2025 survey.

Select your cryptographic systems

Which algorithms does your organization use? Select all that apply. Three common defaults are pre-selected.

Vulnerable to Shor's algorithm (asymmetric cryptography)
RSA-2048
Most TLS certificates, email encryption, VPNs, code signing
RSA-3072
Higher-security TLS, government systems, long-lived certificates
RSA-4096
PGP keys, root CAs, long-term document signing
ECDSA P-256
TLS 1.3, Apple/Google certificates, FIDO2/WebAuthn, IoT
ECDSA P-384
Government high-assurance, CNSA Suite, some financial systems
ECDSA secp256k1
Bitcoin, Ethereum, most blockchain networks
Ed25519
SSH keys, Signal protocol, WireGuard, modern TLS
Affected by Grover's algorithm (symmetric cryptography)
AES-128
Reduced to 64-bit equivalent. Low practical risk at scale. Many legacy systems.
AES-256
128-bit equivalent post-Grover. Quantum-safe. Standard recommendation.
SHA-256
Grover gives quadratic speedup on preimage. Minimal practical impact.
3 systems selected

What PQC Migration Actually Costs

Five data points exist globally. All publicly funded. Zero private-sector disclosures. Verified April 2026

OrganizationAmountScopeCost/scope
US Air Force $3.9M PQC encryption on B-52 fleet Single platform overlay
PQ-NEXT EU EUR 6.0M 19-partner, 4-sector PQC pilots ~EUR 316K/partner
Hydro-Quebec CAD ~2M PQC for smart grid OT/SCADA Two-phase R&D
Ethereum $2.0M PQC research prizes Research incentive only
PQC4MED EUR 690K Medical device PQC R&D (36 months) ~EUR 19K/month

For full enterprise migration: USD 300-500M over 10+ years for one large telco. Discovery alone: $2-5M involving 120,000+ discrete tasks (PostQuantum.com, based on 10 years of engagements). US federal estimate: $7.1B for civilian agencies, 2025-2035 (OMB/ONCD). None of the five project costs above represent a complete enterprise-wide migration.

Deadlines Already Set

Assumed threat horizon: ~12 years (mid-range GRI estimate). If your migration takes 5+ years, the 2030 deadlines are already tight. Last verified April 2026

2025 (now in force)

EU NIS2 — Essential entities must manage cryptographic risk. PQC is an implied obligation.

EU DORA — Financial entities must address ICT risk including cryptographic resilience.

2027

SWIFT SwiftNet 8.0 — PQC-enabled. 11,000+ institutions across 200+ countries must be ready.

2030

NSA CNSA 2.0 — All software/firmware in National Security Systems must use PQC.

BSI + 20 EU states — Critical infrastructure PQC implementation deadline.

2035

NIST IR 8547 — RSA and ECC deprecated for US federal systems (de facto global standard for organizations following NIST guidance).

Failure Modes

28 documented failure modes across 14 publicly documented cases. Click to expand.

14/14
Vendor dependency
Systemic
+

Every case depends on vendors shipping PQC-ready products. No organization controls its vendor's PQC roadmap. In telecom (Vodafone), Ericsson/Nokia/Huawei must ship firmware. In payments (Mastercard), HSM vendors must achieve FIPS certification. In energy (Hydro-Quebec), SCADA vendors must add PQC to protocols that lack native encryption.

Affects: all 14 cases. Root cause: cryptographic operations embedded in third-party hardware and software.
11/14
EU-US regulatory divergence
Compliance
+

Hybrid (EU: BSI + ANSSI + 20 states) vs pure PQ (US: CNSA 2.0). Multinational organizations cannot satisfy both with one deployment. Must run different configurations by jurisdiction or accept regulatory friction.

Affects: all multinational cases. Root cause: divergent cryptographic policy between EU and US regulatory bodies.
8/14
Performance overhead
Architecture
+

BIS Project Leap: ML-DSA verification 7.5x slower (209.9ms vs 28.1ms RSA). Signatures 13x larger (3,293 vs 256 bytes). Cloudflare: split ClientHello caused 0.34% origin failures. Ethereum: ML-DSA 2,420-4,627 bytes vs ECDSA 65 bytes increases gas costs.

Affects: BIS Leap, Mastercard, Cloudflare, Ethereum, SWIFT, Vodafone, Hydro-Quebec, PQ-NEXT.
6/14
FIPS HSM certification gap
Blocker
+

Zero FIPS 140-3 PQC HSMs certified as of April 2026. Blocks production deployment for finance, government, and any regulated organization requiring certified hardware crypto. Expected: late 2026 to early 2027.

Affects: Mastercard, SWIFT, BIS Leap, USAF, Germany ID, Hydro-Quebec.
5/14
Legacy protocol gaps
Technical
+

Protocols designed without PQC cannot be patched: IEC 60870-5-104 (SCADA), ISO 8583 (payments), SS7/Diameter (telecom), hybrid S/MIME (email). Requires protocol redesign or overlay encryption.

Affects: Hydro-Quebec, Mastercard, Vodafone, BdF+MAS, BIS Leap.
3/14
Side-channel attacks on PQC
Security
+

PQC4MED (DFKI): power analysis/EM attacks on embedded secure elements. Cloudflare (KyberSlash): timing side-channel in CIRCL library (patched). PQC implementations have had less scrutiny than classical algorithms.

Affects: PQC4MED, Cloudflare, Germany ID Card.

Which of these failure modes affect your organization? The PQC assessment evaluates your exposure across all six dimensions, including ecosystem dependencies and technical readiness.

Assess your exposure (5 min)
The hard truth about 2026

Most organizations will not complete PQC migration this year. That is not the goal. The realistic target for 2026 is: inventory + assessment + vendor engagement. Of 14 documented cases, only Signal and Cloudflare achieved full deployment, and both control the entire stack. The other 12 are still working through discovery, testing, and certification. Start with what is achievable: know what you have, know where you stand, and know who you depend on.

Where do I start?

1
Take the PQC assessment (5 minutes)

24 questions across 6 dimensions. Includes an interactive Mosca calculator, sector benchmarks, and a 30/60/90-day roadmap. No account needed for the quick score. Start now →

2
Run a cryptographic inventory

Discover which systems use which algorithms, which certificates expire when, which data has long shelf life. Discovery costs $2-5M for large enterprises (PostQuantum.com estimate). Without it, every subsequent decision is a guess.

3
Check your vendor roadmaps

Vendor dependency is the #1 failure mode (14/14 cases). Ask your HSM vendor, cloud provider, and infrastructure vendors for their PQC timeline and FIPS certification status.

4
Build crypto-agility, not a one-time swap

Start with ML-KEM (FIPS 203) + ML-DSA (FIPS 204). Plan for SLH-DSA and HQC. PQC4MED's crypto-agile approach proved correct when algorithms changed.

If you only do one thing: take the PQC assessment. It takes 5 minutes, produces an immediate score, and tells you where your gaps are. You can forward the results to your board.

What this page does not tell you

You still need to know
  • Your cryptographic inventory. We know what 14 organizations use. We don't know what you use. The assessment helps here.
  • Your vendor's actual roadmap. We track which vendors appear in cases. We don't have your vendor's internal timeline.
  • Your data classification. Mosca X depends on your data's shelf life, which only you know.
  • Your budget constraints. Five cost data points exist. None map to your organization size or sector mix.
Limitations of this database
  • 14 cases, not 14,000. These are publicly documented projects. Many organizations are migrating privately and haven't disclosed.
  • Public-sector bias. All cost data comes from publicly funded projects. Private-sector economics may differ.
  • Point-in-time data. This database reflects April 2026. HSM certifications, regulatory changes, and vendor roadmaps will evolve.
  • No China/Russia cases. PQC migration in these countries is documented in Chinese/Russian sources not covered here.

Methodology

Sources

115+ verified entries across 14 publicly documented cases. Primary sources: BIS reports, NIST publications, CORDIS EU database, official press releases, SEC filings, SBIR contracts. Secondary: industry analysis, academic papers (Takagi et al. 2026, Springer). Every claim has a named source with URL and date.

Confidence levels

Verified: Multiple independent sources confirm. Reported: A named organization said it publicly. Estimated: Derived from available data with stated assumptions. "Unknown" means nobody knows, not that we didn't look.

Not the CISO?

If you're a security engineer, architect, or risk manager, forward this page to whoever needs to start the PQC conversation at your organization. The URL is shareable.

Ready to measure your PQC readiness?

The assessment uses the same 6 dimensions as these case studies. Quick score in 3 minutes. Full assessment in 15. Sector benchmarks and a 30/60/90 roadmap included.

PQC Migration Intelligence Database v1.0 — April 2026. Built by DeployQuantum. Vendor-neutral. Every claim sourced. 14 publicly documented cases.