In an upcoming Executive Brief to be published by Datos Insights, cybersecurity expert Jane Ginn outlines critical developments in post-quantum cryptography that FIs should be monitoring closely. The brief, titled NIST’s PQC Standardization: Implications for Financial Services, highlights how quantum computing advancements are creating both challenges and strategic opportunities for the financial sector.
Historical Context Meets Modern Challenge
Drawing a fascinating parallel to cryptographic history, the Executive Brief references the Enigma machine—the encryption device used by German forces during World War II. This first large-scale implementation of algorithmic encryption established the strategic importance of robust cryptography and the devastating consequences of cryptographic failure when Allied forces at Bletchley Park eventually broke the code.

Today’s FIs face a similar watershed moment. As quantum computing capabilities advance, currently deployed public-key cryptography based on RSA and elliptic curve mathematics are increasingly vulnerable to being compromised—a scenario described as “harvest now, decrypt later” attacks, wherein encrypted financial data collected today could be decrypted by quantum computers in the future.
NIST’s Strategic Response
The National Institute of Standards and Technology (NIST) has been proactively addressing this threat through its Post-Quantum Cryptography (PQC) Standardization Process. In a significant development, NIST recently selected Hamming Quasi-Cyclic (HQC) as a backup for post-quantum key encapsulation, complementing its previously standardized primary algorithm based on module lattice (ML-KEM) mathematics.
This dual-algorithm approach represents a deliberate strategy for cryptographic diversity and resilience—ensuring that if vulnerabilities emerge in one mathematical approach, alternative secure algorithms remain available.
Strategic Implications for FIs
The brief identifies several strategic considerations for financial organizations:
- Cryptographic agility planning: Developing frameworks for implementing multiple post-quantum algorithms concurrently
- Risk-based implementation timeline: Considering phased deployment approaches spanning near term (one to two years), medium term (three to four years), and long term (more than four years)
- API deployment coordination: Aligning cryptographic transitions with API upgrades, particularly in response to evolving regulations like the Consumer Financial Protection Bureau’s Section 1033
- Vendor evaluation: Prioritizing security vendors with clear PQC implementation roadmaps and support for both standardized algorithms
FIs that develop comprehensive migration strategies will be better positioned to navigate the complex transition to quantum-resistant infrastructure while addressing API-related regulatory requirements.
Looking Forward
For forward-thinking FIs, this transition represents an opportunity to fundamentally strengthen security posture while demonstrating regulatory diligence. By treating post-quantum computing readiness as an integral component of broader cybersecurity and risk management frameworks, organizations can effectively address the technical, operational, and compliance dimensions of this critical security transformation.
To learn more about the specific algorithms, implementation strategies, and regulatory implications, please see our forthcoming Executive Brief: NIST’s PQC Standardization: Implications for Financial Services.