The clock is ticking on encryption that has protected data for decades. Quantum computing will break it.
NIST 800-53 now calls for controls that address this threat. Quantum-safe cryptography is shifting from theory to urgent requirement. The framework’s latest revisions include specific expectations for cryptographic modules, key management, and algorithm selection that withstand attacks from quantum-scale adversaries.
Quantum-safe cryptography replaces vulnerable public key algorithms with methods immune to Shor’s algorithm. Lattice-based schemes, hash-based signatures, and code-based systems are prime candidates. NIST’s Post-Quantum Cryptography Standardization project is rapidly narrowing the list. Compliance with NIST 800-53 means planning the migration now, not waiting for a formal mandate.
Control families such as System and Communications Protection (SC), Access Control (AC), and Configuration Management (CM) intersect with quantum-safe requirements. SC-13, SC-17, and SC-28 emphasize the need for robust encryption at rest and in transit. For quantum safety, keys must be generated and stored with algorithms that resist both classical and quantum cryptanalysis.