Quantum Ledger
The Migration·ML-KEM · ML-DSA · SLH-DSA·FIPS 203 / 204 / 205
NIST standards finalized 2024-08-13 · CNSA 2.0 deadlines 2027–2030
26 organizations tracked

The PQC Migration.

Who has shipped post-quantum cryptography, who has committed, who is silent.

The largest commercial impact of quantum, by an order of magnitude

Is not buying a quantum computer. It is replacing the cryptographic plumbing on every system that needs to survive past 2030.

NIST standardized ML-KEM, ML-DSA, and SLH-DSA in August 2024. Apple, Cloudflare, Google, Mozilla, and AWS have already migrated meaningful portions of TLS traffic to hybrid PQC. This page tracks who has actually shipped, who is hybrid-live, who has committed, and — the most interesting list — who is silent despite obvious exposure.

Shipped

13

Hybrid live

5

Announced

3

Committed

3

Silent

2

Total tracked

26

Status taxonomy

Five buckets, defined.

Shipped

Post-quantum cryptography live in production traffic or signed code, default-on.

Hybrid live

PQC running alongside classical, often as opt-in or in preview for specific workloads.

Announced

Public commitment with a specific date or regulatory deadline.

Committed

Public commitment without a specific date — often a published roadmap with TBD milestones.

Silent

No public PQC roadmap despite obvious exposure. The most interesting list.

Shipped · 13 entries

Live in production — what runs today.

Apple

iMessage (PQ3 protocol)

Shipped
Consumer messaging·2024-02-21

PQ3 launched in iOS 17.4. Post-quantum key establishment with continuous re-keying. Largest deployment of PQC to consumers globally — billions of iMessage handshakes daily.

Algorithm: ML-KEM (Kyber) + ECDH hybrid · ratcheted

source ↗

Signal

Signal Protocol PQXDH

Shipped
Consumer messaging·2023-09-19

First PQC-enabled key agreement in Signal — X25519 plus Kyber (now ML-KEM). All Signal handshakes now post-quantum.

Algorithm: PQXDH (ML-KEM + X25519 hybrid)

source ↗

Cloudflare

TLS 1.3 PQ key agreement

Shipped
CDN / edge·2024-09-10

PQC key agreement live across the Cloudflare edge. As of late 2025, ~52% of inbound TLS traffic to Cloudflare uses a post-quantum hybrid handshake — the highest organic PQC adoption rate on the public web.

Algorithm: X25519MLKEM768 (ML-KEM + X25519 hybrid)

source ↗

Google

Chrome (TLS 1.3 + Boring SSL)

Shipped
Browsers·2024-05-15

Chrome enabled ML-KEM hybrid TLS by default in Chrome 124. Together with Cloudflare deployment, established the de-facto industry default.

Algorithm: X25519MLKEM768 (hybrid)

source ↗

Mozilla

Firefox

Shipped
Browsers·2025-04-01

Firefox 132 enabled ML-KEM hybrid TLS by default. Brings open-source browser to parity with Chrome on PQC handshakes.

Algorithm: X25519MLKEM768

Akamai

Edge platform TLS

Shipped
CDN / edge·2025-Q1

PQC hybrid key agreement available on Akamai edge for customer configuration; default-on for traffic to PQC-capable origins.

Algorithm: X25519MLKEM768

AWS

KMS, Secrets Manager, ACM

Shipped
Cloud / TLS·2024-08-13

AWS KMS and several internal services migrated to post-quantum hybrid TLS. AWS published a multi-year migration plan covering S3, CloudFront, ACM.

Algorithm: ML-KEM + classical hybrid

source ↗

Apple

iOS / macOS Sequoia secure enclave

Shipped
Operating systems·2025-Q3

Apple signaling movement on PQC for Secure Enclave attestation and code signing chains. Full timeline not public.

Algorithm: ML-DSA for code signing (transitional)

OpenSSL

OpenSSL 3.5 + oqs-provider

Shipped
Crypto libraries·2025-04-08

OpenSSL 3.5 ships with ML-KEM, ML-DSA, and SLH-DSA in the default build. Foundational for downstream PQC deployment across server software.

Algorithm: ML-KEM, ML-DSA, SLH-DSA

BoringSSL (Google)

BoringSSL

Shipped
Crypto libraries·2024-05

ML-KEM support in BoringSSL underpins Chrome and Google service deployment.

Algorithm: ML-KEM

liboqs (Open Quantum Safe)

liboqs + oqs-provider

Shipped
Crypto libraries·Ongoing

Reference implementations of every NIST-standardized and candidate algorithm. The de facto research baseline for PQC integration testing.

Algorithm: All NIST PQC + alternates

HSBC

Trade finance PQC pilot

Shipped
Banking / finance·2025-03

HSBC ran the first publicly disclosed live PQ-secured trade-finance transaction between Hong Kong and London. Pilot, not production.

Algorithm: ML-KEM hybrid

NIST

FIPS 203 / 204 / 205

Shipped
Government·2024-08-13

NIST formally standardized ML-KEM (Kyber), ML-DSA (Dilithium), and SLH-DSA (SPHINCS+). The reference for every other PQC migration.

Algorithm: ML-KEM, ML-DSA, SLH-DSA

source ↗

Hybrid live · 5 entries

Hybrid deployments — PQC alongside classical.

Fastly

Edge TLS

Hybrid live
CDN / edge·2025-Q2

PQC TLS available as an opt-in for customers; not default-on across the platform.

Algorithm: X25519MLKEM768

Microsoft Azure

Azure Confidential Computing + Key Vault

Hybrid live
Cloud / TLS·2025-Q1

Azure Key Vault offers PQC algorithms in preview. SymCrypt library updated to support ML-KEM and ML-DSA. Production rollout staged through 2026.

Algorithm: ML-KEM, ML-DSA

source ↗

Google Cloud

Cloud KMS + ALTS

Hybrid live
Cloud / TLS·2024-12-01

Cloud KMS supports ML-DSA signing in preview. Internal ALTS service-to-service authentication uses hybrid key agreement.

Algorithm: ML-KEM hybrid

Microsoft Windows

Windows 11 + SymCrypt

Hybrid live
Operating systems·2025-Q2

Windows 11 24H2 introduced PQC algorithm support in SymCrypt. Developer APIs available; default in TLS not yet enabled.

Algorithm: ML-KEM, ML-DSA, SLH-DSA

source ↗

OpenVPN

OpenVPN 3 CloudConnexa

Hybrid live
VPN·2025-Q2

OpenVPN CloudConnexa enables PQC via underlying TLS stack when OpenSSL 3.5 or equivalent is used.

Algorithm: ML-KEM hybrid via TLS layer

Announced · 3 entries

Committed with a deadline.

U.S. NSA

CNSA 2.0 mandate

Announced
Government·Effective 2027 onward

CNSA 2.0 mandates PQC for U.S. National Security Systems. Software signing PQC-only by 2027; networking PQC-only by 2030; HSMs PQC-only by 2030.

Algorithm: ML-KEM-1024, ML-DSA-87, SHA-384, AES-256

source ↗

UK NCSC

PQC guidance + Government Crypto Modernisation

Announced
Government·Multi-year through 2035

NCSC published PQC migration roadmap targeting all UK government systems by 2035. Aligned with NIST standards.

Algorithm: NIST PQC suite

EU ENISA

Post-Quantum Cryptography Coordinated Implementation Roadmap

Announced
Government·2025

ENISA published a coordinated PQC implementation roadmap for EU member states. Aligned with EuroQCI quantum-network deployment.

Algorithm: NIST PQC suite

Committed · 3 entries

Committed without a date.

JPMorgan Chase

Internal crypto modernization

Committed
Banking / finance·2025-09

JPMorgan publicly committed to post-quantum migration across internal systems; timeline disclosed as multi-year with no public completion date.

Algorithm: NIST PQC suite

BNY Mellon

Internal PQC roadmap

Committed
Banking / finance·2024-Q4

Public commitment to PQC migration as part of broader cryptographic modernization.

Algorithm: NIST PQC

WireGuard

Reference VPN protocol

Committed
VPN·2026 roadmap

WireGuard maintainers have signaled PQC integration is on the roadmap but not shipped at protocol level. Forks (e.g., Mullvad) experiment with PQC layers.

Algorithm: TBD (PQC hybrid)

Silent · 2 entries

Silent despite obvious exposure.

Meta (Facebook / Instagram / WhatsApp)

Consumer messaging + auth

Silent
Consumer messaging

No public PQC roadmap as of May 2026 despite billions of daily handshakes. WhatsApp is widely expected to follow Signal's PQXDH design since Signal Protocol underpins WhatsApp encryption.

Algorithm:

X (Twitter)

TLS, DMs

Silent
Consumer messaging

No public PQC commitment.

Algorithm:

Why this tracker matters

The PQC market is real today.

The largest commercial impact of quantum computing, by an order of magnitude, is not the new compute paradigm but the cryptographic transition forced by Shor's algorithm. Every TLS connection, every signed firmware blob, every long-lived signed document is potentially exposed to a future cryptographically-relevant quantum computer (CRQC). Harvest-now-decrypt-later attacks make the calendar urgent even though a CRQC does not yet exist.

The PQC market is forecast at $50B+ cumulative through 2035 (McKinsey, BCG mid-cases). Most of that spend is software services and HSM replacement, not new product sales. The names with shipping PQC products today — Cloudflare, Apple, Google, NIST-aligned vendors — capture the first wave; the names silent at scale (notably Meta, X) are accumulating risk that auditors will start to price.

See /glossary for ML-KEM, ML-DSA, SLH-DSA, HNDL, Q-Day, CNSA 2.0 definitions. See /learn/bb84 for the QKD alternative architecture and the NSA's reasoning for preferring PQC over QKD.