Forrester Research Report Access: “The Architects’ Guide to Quantum Security, 2025

What the New U.S. Cyber Strategy Quietly Signals About Encryption Modernization

5 mins read

The White House released a new cybersecurity strategy this week. Like most national cyber strategies, it is intentionally high level. It does not prescribe detailed architectures, migration plans, or technology selections. But sometimes the most interesting signals come not from what a strategy mandates, but from how it frames the problem.

One of the subtle but important choices in this strategy is the way post-quantum cryptography (PQC) is positioned. Rather than treating PQC as a distant research topic or a niche cryptographic concern, the strategy places it alongside federal modernization priorities such as:

  • zero trust architecture
  • cloud transition
  • AI-enabled cybersecurity
  • critical infrastructure resilience

That positioning matters.

It suggests that encryption modernization is no longer being viewed purely as a cryptographic exercise. It is becoming part of the broader problem of operating secure digital infrastructure over long time horizons.

In other words, this is less about algorithms and more about systems.

The Quiet Shift: From Crypto Upgrade to Infrastructure Modernization

For years, discussions around quantum risk have tended to focus on a narrow question: Which algorithms should replace RSA and elliptic curve cryptography?

That question is important, but it is only one piece of a much larger challenge.

In practice, organizations do not operate a handful of cryptographic implementations. They operate millions of cryptographic dependencies embedded across:

  • Applications
  • APIs
  • Certificates and PKI systems
  • Firmware signing chains
  • Supply-chain components
  • Machine identities
  • Operational technology networks

Modern infrastructure is effectively a web of cryptographic trust relationships. Rotating algorithms inside that web is not a simple software update. Rather, it is a long-duration infrastructure transition.

Seen through that lens, it makes sense that the strategy groups PQC with modernization initiatives like zero trust and cloud transformation. They share a common operational reality: they require systemic change across large environments without breaking mission-critical systems.

Critical Infrastructure Makes This Even Harder

The strategy also emphasizes the importance of protecting critical infrastructure sectors such as:

  • Energy
  • Telecommunications
  • Financial systems
  • Healthcare
  • Data centers

These sectors operate systems with characteristics that complicate cryptographic modernization:

  • Long operational lifecycles
  • Legacy protocols
  • Constrained environments
  • Strict uptime requirements

Replacing cryptography in these environments cannot rely on simple “rip and replace” approaches.

Migration will need to be staged, hybridized, and carefully orchestrated over many years.

That reality raises a deeper question the strategy hints at but does not fully answer: What does encryption modernization actually look like operationally?

The Emerging Operational Problem

If post-quantum cryptography becomes part of infrastructure modernization, organizations will need to answer a new set of questions. Not theoretical questions about algorithms, but practical ones about operations.

For example:

  • Where does cryptography actually exist in our environment?
  • Which systems depend on quantum-vulnerable algorithms?
  • Which cryptographic dependencies are inherited through software supply chains?
  • Which systems protect long-life data that must remain confidential for decades?
  • Which environments can realistically migrate first?

These are not questions that can be answered with a spreadsheet or a one-time audit. They require continuous visibility into cryptographic posture.

AI May Become the Operational Control Layer

Another notable aspect of the strategy is its emphasis on AI-enabled cybersecurity capabilities. This intersects with encryption modernization in an interesting way.

Quantum computing introduces uncertainty into long-term cryptographic durability. At the same time, AI systems increasingly give organizations the ability to:

  • Scan infrastructure and codebases at scale
  • Analyze cryptographic dependencies
  • Identify deprecated primitives
  • Map trust chains across environments
  • Simulate the impact of architectural changes

In other words, while quantum introduces fragility into cryptographic assumptions, AI may provide the operational tools needed to manage that fragility.

Used carefully, AI could become the control system for cryptographic agility. Not replacing human governance, but augmenting it.

Supply-Chain Cryptography Risks in the Post-Quantum Transition

An additional dimension that emerges from the strategy is supply-chain security. Cryptography is not confined to applications built internally. It is embedded throughout technology ecosystems:

  • Third-party SDKs
  • Open source libraries
  • Hardware firmware
  • Vendor APIs
  • Network infrastructure

Organizations often inherit cryptographic dependencies without realizing it. This means encryption modernization will likely require greater visibility into supply-chain cryptography, not just internal systems.

A Possible Industry Response Framework

If the strategy signals anything, it is that encryption modernization will need to be approached as a lifecycle problem.

One possible response model might look something like this:

  1. Discover
    Continuously identify cryptographic implementations across applications, infrastructure, and supply chains.
  2. Prioritize
    Assess exposure based on algorithm strength, data longevity, operational importance, and migration complexity.
  3. Monitor
    Observe runtime cryptographic behavior to understand which algorithms are actively negotiated and where fallback or downgrade conditions exist.
  4. Govern
    Define algorithm lifecycle policies, sunset timelines, and acceptable deployment patterns.
  5. Migrate
    Introduce hybrid and staged cryptographic transitions in environments where replacement must occur gradually.

This is less about a single technology solution and more about building an operational capability for managing cryptographic change.

An Opportunity for Industry Collaboration

The strategy does not provide a detailed blueprint for post-quantum migration. However, it does something arguably more important. It places post-quantum cryptography inside the same conversation as:

  • Infrastructure modernization
  • AI-enabled cyber defense
  • Supply-chain security
  • Critical infrastructure resilience

That framing suggests the next phase of cybersecurity may not revolve around deciding whether encryption modernization matters.

Instead, it will revolve around how we operationalize cryptographic change at scale.

There are still many unanswered questions:

  • What does PQC modernization look like in operational technology environments?
  • How should organizations measure supply-chain cryptography exposure?
  • What operational evidence should regulators accept instead of checklist compliance?
  • How should AI be safely integrated into cryptographic lifecycle management?

These are not problems any single organization will solve alone.

They will likely require collaboration across industry, government, and the research community.

A Closing Thought

Quantum computing introduces uncertainty into the durability of our cryptographic assumptions.

AI introduces the ability to observe, analyze, and adapt at scale.

The future of digital trust may depend on combining those two forces carefully. Not dramatically, just systematically… and before the systems we rely on every day become harder to update than we expect.

New Market Opportunities in Emerging Technologies

Strategic Rationale: PQC opens doors in fast-growth tech sectors

Strategic Rationale: PQC opens doors in fast-growth tech sectors

Other Articles

Dive into our previous thought leadership content, packed with actionable insights and industry trends.

What the New U.S. Cyber Strategy Quietly Signals About Encryption Modernization

CEO, Co-Founder, Board Member

Loading…