If you’re keeping up with post-quantum cryptography (PQC), here’s some big news: The U.S. National Institute of Standards and Technology (NIST) has released a fresh initial public draft of a Cybersecurity Whitepaper titled Considerations for Achieving Crypto-Agility. This whitepaper tackles the real-world challenges and trade-offs involved in cryptographic transitions and discusses key strategies for achieving crypto-agility—critical for PQC readiness.
The paper is meant to serve as pre-reading material for an upcoming NIST virtual workshop, where the cryptographic community will discuss crypto-agility considerations and shape the final version.
So, who should care about this? Pretty much anyone involved in cybersecurity—product and protocol designers, standards creators, software and hardware developers, security practitioners, IT admins, and policymakers. With NIST previously announcing aggressive timelines for PQC readiness, crypto-agility is a must, and this is your playbook to get to it.
The whitepaper breaks down crypto-agility in a way that’s easier to understand and implement. If you are short on time, here are the key highlights from the report that you need to know:
Jump right to the section that matters most to you:
1. First, what exactly is crypto-agility?
2. Why do these cryptographic transitions take so long?
3. Making security protocols crypto-agile
4. Building crypto-agility for applications
4. Key trade-offs and areas for improvement
NIST defines cryptographic agility (crypto-agility) as the “capabilities needed to replace and adapt cryptographic algorithms in protocols, applications, software, hardware, and infrastructures without interrupting the flow of a running system in order to achieve resiliency.”
Earlier, NIST saw crypto-agility mainly as the ability to select or add new encryption algorithms (in their earlier definitions). But now, they take a broader and more nuanced view. Crypto-agility isn’t just about swapping out old encryption algorithms for something new. It’s about doing it seamlessly without breaking systems or losing compatibility. It involves having systems, protocols, software, and hardware that support multiple cryptographic algorithms and adapt flexibly to new ones as needed. And, because every implementation environment has its own unique considerations, crypto-agility must be adaptable enough to fit each one.
Cryptographic transitions are a necessary part of maintaining security, but they’re rarely smooth or quick. Every shift comes with its own set of challenges, and history proves just how complex these transitions can be.
NIST cites the example of moving from DES to AES to understand the full scope of complexity involved in cryptographic transitions. While AES was officially standardized in 2001, Triple DES wasn’t fully phased out until 2024—that’s over two decades! This highlights a critical reality: cryptographic transitions take time, often much longer than expected. We’ve witnessed the same with the transitions from SHA-1 to SHA-2 and TLS 1.1 to TLS 1.2 to TLS 1.3.
Here are some challenges that NIST identifies as major roadblocks in cryptography migrations:
According to NIST, crypto-agility is achieved when a security protocol can smoothly transition from one cipher suite to another as needed. To make this possible, NIST suggests that security protocol implementations should be modular, allowing new algorithms to be easily integrated. There should also be a way to track when systems have moved from outdated algorithms to newer ones. With cryptographic standards constantly evolving, protocols must be built for flexibility—ensuring long-term security and interoperability.
NIST takes a hard look at current cryptographic practices and offers key recommendations to enhance crypto-agility in protocols:
Crypto APIs help separate cryptographic algorithms from application logic, allowing applications to focus on their core features while cryptographic libraries handle encryption, signatures, hashing, and key establishment.
Crypto APIs simplify transitions between algorithms by letting applications make the same crypto API calls to either of the algorithms. To enable crypto-agility, NIST urges system designers to build flexible mechanisms that make replacing algorithms in software, hardware, and infrastructures easier. However, these mechanisms must be easy to use, well-documented, and backed by clear guidance to avoid complexity and implementation errors.
NIST also explores in detail a few use cases for using crypto APIs, such as:
NIST views achieving crypto-agility as a collaborative effort among cryptographers, developers, implementers, and practitioners. For crypto-agility to be effective, security requirements must be specific for each implementation and application environment. NIST explores this by examining key trade-offs and identifying critical areas for future development. A few highlighted areas include:
Crypto-agility is challenging due to resource constraints. Protocol designers must plan for future transitions with resource capacity in mind, hardware implementers must optimize with accelerators, and cryptographers must design algorithms that share subroutines. A fresh approach is needed to balance agility and efficiency.
Crypto APIs make it easy to swap out vulnerable algorithms, but kernel-locked cryptographic functions make updates harder. NIST recommends enhancing API support within kernels and designing adaptable UIs, APIs, and system configurations that can improve crypto-agility.
NIST highlights the need for a crypto-agility maturity model that can help organizations assess their readiness for cryptographic transitions. A concrete maturity model could drive adoption and improve resilience against evolving cryptographic threats.
To help organizations continuously update their cryptographic systems to address emerging threats, technological shifts, and regulatory changes, NIST proposes a crypto-agility strategic plan. This plan involves:
Through an in-depth exploration of the challenges within existing systems and the various new strategies organizations can adopt, NIST has established a solid roadmap for achieving crypto-agility. One thing is clear – the future of security depends on crypto-agility. The smartest move now is to take action, prepare for PQC migration, and future-proof your systems for the quantum era.
Is your PKI and certificate infrastructure ready for the shift? AppViewX AVX ONE CLM simplifies crypto-agility with end-to-end certificate lifecycle management, giving you comprehensive visibility, closed-loop automation, and complete policy control—all in one powerful solution.
Explore AVX ONE CLM or talk to one of our experts today to get started!
*** This is a Security Bloggers Network syndicated blog from AppViewX authored by Krupa Patil. Read the original post at: https://www.appviewx.com/blogs/nist-releases-new-report-on-crypto-agility-what-you-need-to-know-now/