Quantum Security & PQC News

Pentagon CIO memo puts post-quantum crypto on a procurement leash

22 Nov 2025 – A memo from The Pentagon CIO dated Nov. 18, 2025 (cleared for open publication Nov. 20) forces a shift from ad‑hoc PQC pilots to a controlled, enterprise migration program. It orders an all-systems cryptography inventory, requires Components to name PQC migration leads, makes PQC testing and acquisition subject to CIO intake/deployment approvals, and draws bright lines – most notably, it bars quantum key distribution (QKD) for confidentiality, authenticity, or integrity and sets Dec. 31, 2030 as the key retire-by date for PSK-based and symmetric “quantum resistance” approaches.

What happened and why the timing matters

The memo is published via the DoD Chief Information Officer public document library and signed by Katherine Arrington in a “performing the duties” CIO role. The document’s letterhead uses “Department of War” and the abbreviation “DoW,” but it is positioned as Pentagon-wide guidance. 

The timing is not accidental. OMB’s memo M‑23‑02 (Nov. 2022) pushed federal agencies to inventory cryptography (for civilian, non‑NSS systems) and estimate the funding needed for PQC migration.  Meanwhile NIST has published core PQC standards – FIPS 203/204/205 (Aug. 2024): ML‑KEM for key establishment and ML‑DSA/SLH‑DSA for digital signatures. 

Against that backdrop, this memo reads like an attempt to stop “quantum-safe sprawl”: vendor-led crypto choices and incompatible deployments that turn into long-lived technical and contracting debt.

What the memo orders

The first move is visibility. Components must “identify and inventory any type of cryptography used” across virtually all system categories – explicitly including NSS and non‑NSS, business and weapons systems, cloud, mobile, physical access control, IoT, unmanned systems, and operational technology – “regardless of classification, location, connection, type, purpose, or use.”

The second move is ownership and coordination. Each Component must submit a roster of PQC migration leads (down to subordinate organizations) within 20 days of the memo date, then refresh the roster annually by Sept. 30. The memo designates Britta Hale as the department lead/point of contact for PQC and notes coordination across NSA, DoW PKI, and Defense Information Systems Agency.

The memo doesn’t label “migration phases,” but its implied sequence is clear: assign leads, inventory cryptography, run pilots only with intake approval, then deploy with deployment approval and burn down nonconforming approaches by 2030/2031.

The third move is control. Components must submit PQC-related artifacts (test plans/results, acquisition artifacts, risk mitigations, and related materials) immediately. The CIO office reviews them for security risk and interoperability constraints; issues must be addressed before acquisition or broader “engagement.” If the PQC Directorate identifies security issues, Components must stop tests or pilots and coordinate remediation; if issues cannot be mitigated, systems can be removed from PQC engagement. The attachment also says updated PQC requirements and approval processes will be maintained in a single CIO-hosted location.

The attachment formalizes two gates: (1) cryptographic intake approval before testing/piloting/using/acquiring PQC-related technology and (2) cryptographic deployment approval before deployment, informed by Intelligence Community, NIST, and National Security Agency certification outcomes.

What it does not specify is also important. The memo does not name specific PQC algorithms (it only says “NIST‑approved” and “CNSA 2.0‑listed” for NSS), it does not identify which protocol profiles (TLS, IPsec, S/MIME, SATCOM links, etc.) will be prioritized first, and it does not allocate new funding (only noting a desire to optimize fiscal investments).

The technical red lines and deadlines

The memo draws three unusually sharp boundaries.

It blocks QKD and related “quantum keying/confidentiality” technologies for confidentiality, authenticity, or integrity on Department networks – explicitly including QKD, QKD hybrids, quantum networking used for keying, non-local quantum randomness generation, and non‑FIPS random number generation – unless an exception is granted.

It targets “quantum resistance” built on pre‑shared keys (PSKs): if PSKs are not provisioned through NSA Key Management Infrastructure (KMI) for Type 1 devices, those solutions must be replaced with NIST‑approved (or CNSA 2.0‑listed for NSS) asymmetric PQC key-establishment algorithms by Dec. 31, 2030. New commercial PSK-based “quantum resistance” pilots/acquisitions are banned immediately.

It sunsets symmetric key establishment/agreement/distribution protocols used for “quantum resistance” by Dec. 31, 2030 – extended to Dec. 31, 2031 for solutions registered with NSA’s Commercial Solutions for Classified (CSfC) program – with an exemption for symmetric key distribution protocols used prior to 2010.

Memo requirements versus NIST’s standards baseline

NIST supplies the cryptographic primitives; the Pentagon memo supplies an enterprise governance wrapper around adopting them. For National Security Systems, the memo’s “CNSA 2.0‑listed” language aligns with NSA-led policy and certification pathways tied to the National Manager role.  

TopicPentagon memo requirementNIST baseline / recommendation context
PQC algorithmsRequires “NIST‑approved” (and CNSA 2.0-listed for NSS); no namesFIPS 203/204/205 standardized ML‑KEM, ML‑DSA, SLH‑DSA; HQC selected as a backup KEM candidate
InventoriesInventory all cryptography across NSS, weapons, OT, cloud, mobileNIST doesn’t mandate inventories; OMB mandates prioritized inventories for civilian non‑NSS systems
Governance and gatesPQC leads in 20 days; intake + deployment approval requiredNIST does not prescribe governance; civilian timelines are driven by OMB and agencies
Deprecation deadlines12/31/2030 (and 12/31/2031 for CSfC-registered symmetric solutions)NIST standards don’t set deadlines; deadlines are set by implementers and NSS policy frameworks

Why it matters and what I think happens next

The inventory requirement is the real forcing function. PQC migrations fail when organizations do not know where cryptography actually lives – especially in identity/PKI, embedded systems, weapons subsystems, and vendor-managed services. This memo makes that ignorance an unacceptable state across both enterprise IT and the long tail of mission and platform systems.

I read the approval model as an attempt to prevent “cryptographic debt”: quantum-safe point solutions that can’t interoperate, can’t be certified, or can’t be upgraded at scale. The bans – particularly on QKD-for-security and on PSK/symmetric quantum-resistance workarounds – signal a push toward standardized, certifiable public-key PQC. For vendors, the practical implication is that PQC claims will be treated like a safety case: show the artifacts, the interoperability story, and the certification path.

The risk is throughput. Central gates only work if the PQC Directorate has engineering capacity – test harnesses, interoperability profiles, reference architectures, and procurement language – to clear decisions quickly. Otherwise, Components will either wait or route around governance in ways that recreate fragmentation.

Quantum Upside & Quantum Risk - Handled

My company - Applied Quantum - helps governments, enterprises, and investors prepare for both the upside and the risk of quantum technologies. We deliver concise board and investor briefings; demystify quantum computing, sensing, and communications; craft national and corporate strategies to capture advantage; and turn plans into delivery. We help you mitigate the quantum risk by executing crypto‑inventory, crypto‑agility implementation, PQC migration, and broader defenses against the quantum threat. We run vendor due diligence, proof‑of‑value pilots, standards and policy alignment, workforce training, and procurement support, then oversee implementation across your organization. Contact me if you want help.

Talk to me Contact Applied Quantum

Marin

I am the Founder of Applied Quantum (AppliedQuantum.com), a research-driven consulting firm empowering organizations to seize quantum opportunities and proactively defend against quantum threats. A former quantum entrepreneur, I’ve previously served as a Fortune Global 500 CISO, CTO, Big 4 partner, and leader at Accenture and IBM. Throughout my career, I’ve specialized in managing emerging tech risks, building and leading innovation labs focused on quantum security, AI security, and cyber-kinetic risks for global corporations, governments, and defense agencies. I regularly share insights on quantum technologies and emerging-tech cybersecurity at PostQuantum.com.
Share via
Copy link
Powered by Social Snap