White House Sets 2025 Deadline for Post-Quantum Crypto Readiness

New White House Executive Order Mandates Key Post-Quantum Cryptography (PQC) Actions by December 2025

INFORMATIONAL
December 8, 2025
5m read
Policy and ComplianceRegulatoryThreat Intelligence

Related Entities

Products & Tech

Post-Quantum Cryptography (PQC)Transport Layer Security (TLS)

Other

Secure Software Development Framework (SSDF)

Full Report

Executive Summary

The White House has issued a new Executive Order (E.O.) designed to sustain and accelerate the U.S. government's transition to quantum-resistant cryptography. The E.O. amends previous directives and establishes a firm deadline of December 1, 2025, for federal agencies to complete several foundational steps in their migration to Post-Quantum Cryptography (PQC). Key mandates include the creation of a list of PQC-ready products by CISA and the NSA, new requirements for TLS 1.3 adoption, and an update to the NIST Secure Software Development Framework (SSDF). This order signals a clear and urgent push to protect federal systems and data from the future threat of decryption by quantum computers.


Regulatory Details

The new Executive Order, "Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity," amends E.O. 13694 and E.O. 14144. It focuses on operationalizing the transition to PQC, moving from policy to concrete action with a clear timeline.

Key Mandates for December 1, 2025:

  1. PQC Product List: The Secretary of Homeland Security, through the Director of CISA, and in consultation with the Director of the NSA, must release and maintain a publicly available list of product categories for which PQC-supporting products are available. This list will serve as a guide for federal agencies when making procurement decisions, ensuring they invest in quantum-resistant technology.
  2. TLS 1.3 Requirement: The NSA and the Office of Management and Budget (OMB) are directed to issue new requirements for federal agencies to support Transport Layer Security (TLS) protocol version 1.3 or its successor. TLS 1.3's architecture is more amenable to integrating the new PQC algorithms than older versions, making this a critical prerequisite.
  3. Secure Software Development Framework (SSDF) Update: The National Institute of Standards and Technology (NIST) is required to publish a preliminary update to its SSDF (NIST SP 800-218). This update will incorporate new practices and controls for developing software that is secure in a post-quantum environment, addressing how to securely implement and manage PQC algorithms.

Affected Organizations

This Executive Order directly affects all U.S. Federal Civilian Executive Branch (FCEB) agencies. However, its influence will extend much further:

  • Technology Vendors: Companies that sell hardware and software to the U.S. government will be under pressure to integrate NIST-approved PQC algorithms into their products to be included on the CISA/NSA approved product list.
  • Critical Infrastructure: While not directly mandated, critical infrastructure sectors will likely follow the government's lead, adopting these standards to protect their own systems.
  • Private Sector: The standards and best practices developed for the federal government will serve as a blueprint for the entire private sector to follow in their own PQC transitions.

Impact Assessment

The issuance of this E.O. has several significant impacts:

  • Accelerates Adoption: By setting a firm deadline and mandating a list of approved products, the order creates market pressure and a clear timeline for both government agencies and vendors, accelerating the entire ecosystem's transition.
  • Reduces Ambiguity: It provides clear direction for agencies on what to prioritize: inventorying cryptographic systems, preparing for TLS 1.3, and planning for the procurement of PQC-ready products.
  • Addresses the 'Harvest Now, Decrypt Later' Threat: The primary driver for PQC is to protect today's encrypted data from being stolen now and decrypted later by a future quantum computer. This E.O. treats this as an urgent, present-day threat, not a distant future problem.

Compliance Guidance

Federal agencies must take immediate steps to prepare for the December 1, 2025 deadline:

  1. Cryptographic Inventory: Agencies must have a complete and accurate inventory of all cryptographic systems, as mandated by previous directives. This is the foundational step to understanding their PQC transition scope.
  2. TLS 1.3 Migration Plan: Agencies should immediately begin planning and executing the migration of all web services and applications to support TLS 1.3. This may involve upgrading legacy servers, load balancers, and software.
  3. Procurement Strategy: Future procurement actions for IT products and services must include requirements for PQC support, referencing the forthcoming CISA/NSA list.
  4. Engage with Vendors: Agencies should begin conversations with their key technology vendors about their roadmaps for PQC compliance.
  5. Monitor NIST: Stay closely attuned to NIST's finalization of PQC standards and the subsequent update to the SSDF to inform internal development practices.

Timeline of Events

1
December 1, 2025
Deadline for CISA/NSA to release PQC product lists, for NSA/OMB to issue TLS 1.3 requirements, and for NIST to update the SSDF.
2
December 7, 2025
The White House issues the new Executive Order on sustaining cybersecurity efforts.
3
December 8, 2025
This article was published

MITRE ATT&CK Mitigations

The entire PQC transition is a strategic mitigation to ensure that encrypted information remains confidential against future quantum threats.

Mapped D3FEND Techniques:

Mandating TLS 1.3 is a specific software configuration mitigation to strengthen cryptographic protocols in preparation for PQC.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The core challenge of the PQC transition is replacing deeply embedded cryptographic algorithms. Organizations should adopt the principle of 'crypto-agility' in their software development and infrastructure management. This means designing systems where cryptographic algorithms can be swapped out easily through configuration changes, rather than requiring a full code rewrite and recompilation. For new projects, use libraries that abstract the cryptography and support algorithm negotiation. For legacy systems, identify those with hardcoded algorithms (e.g., an old application using a specific RSA library) and prioritize them for modernization or replacement. This approach ensures that as NIST finalizes PQC standards and potentially introduces new ones in the future, your organization can adapt quickly without massive engineering efforts, making the transition manageable and sustainable.

In response to this Executive Order, federal agencies and proactive private sector organizations must begin a phased migration. The first step, mandated by the EO, is migrating to TLS 1.3. This protocol removes static RSA key exchange, a major vulnerability to quantum attacks. Your migration plan should inventory all public and internal-facing servers, identify those running TLS 1.2 or older, and create a project plan to upgrade their configurations or underlying software. Use tools like SSL Labs to test public servers and internal scanners to audit the internal network. This migration not only improves current security but is a critical enabling step for the future integration of hybrid PQC schemes (e.g., combining a classical algorithm with a quantum-resistant one) within the TLS handshake.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PQCPost-Quantum CryptographyWhite HouseExecutive OrderNISTCISANSATLS 1.3Policy

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading