Logo

Quantum-Safe Roadmap

India's Post-Quantum Cryptography Roadmap: Is Your Organization Ready?

India has set binding PQC migration deadlines. Building a quantum-safe India starts with knowing what cryptography you have.

2027

CII Foundations

  • Defence
  • Power
  • Telecom
2028

Enterprise Foundations

  • BFSI
  • Healthcare
  • Govt
2033

Full Enterprise Adoption

  • All sectors quantum-safe

India DST Task Force Report and What It Says

In February 2026, India's Department of Science and Technology published the Implementation of Quantum Safe Ecosystem in India; Report of the Task Force.

The report is a phased, time-bound migration roadmap with explicit deadlines for Critical Information Infrastructure, government bodies, and private enterprises. India joins a small group of nations that have published specific, enforceable PQC timelines. For organizations navigating post-quantum regulation in India, the report sets as a clear compliance framework aligning closely with NIST PQC standards and establishing a national certification path.

Two sub-groups drive the programme. The Telecommunication Engineering Centre (TEC) leads testing, standards, and a national certification framework. The Data Security Council of India (DSCI) leads crypto-agility strategy, migration planning, and enterprise guidance.

Executive Briefing

A summary of the Quantum-Safe Roadmap (DST Task Force report) and what it requires, who it applies to, and what your organization needs to do first.

  • Understand the quantum-safe roadmap
  • Get familiar with critical migration deadlines

Critical Information Infrastructure

  • Defence
  • Power
  • Telecom
  • ISRO
  • DRDO
  • ONGC
2027
Build Foundations

Quantum risk governance, cryptographic asset inventory, PQC pilots, CBOM mandates in procurement.

2028
Migrate High-Priority Systems

No new classical-only deployments. Upgrade PKI, HSMs, and key management infrastructure.

2029
Full PQC Adoption

Enterprise-wide PQC and hybrid adoption. PQC-only trust chains operational.

Government and Private Enterprises

  • Banking
  • Healthcare
  • Education
  • General IT
2028
Build Foundations

Quantum risk governance, cryptographic asset inventory, PQC pilots, CBOM requirements begin.

2030
Migrate High-Priority Systems

No new classical-only deployments. Mandate PQC digital signatures. Enforce supplier accountability.

2033
Full PQC Adoption

All signatures quantum-safe. Continuous algorithm lifecycle governance institutionalized.

Migration to post-quantum cryptography begins with knowing what you have

Every migration milestone in the DST roadmap — governance, prioritisation, CBOMs, vendor accountability, PQC deployment — depends on one foundational capability: a complete, accurate inventory of your cryptographic assets.

You cannot prioritize what you have not found. You cannot produce a CBOM for assets you do not know exist. You cannot migrate cryptography that has not been mapped. Cryptographic discovery is not a precursor to the program. It is the first and most critical step.

CBOM mandate from FY 2027-28

The Task Force requires organizations to issue Cryptographic Bill of Materials requests to key vendors and embed CBOM requirements in new procurement. Organizations that have not completed their own internal discovery cannot meet this requirement.

Activate Sensors

Lightweight agents and agentless sensors deployed across on-premises, cloud, and hybrid environments.

Scan and Detect

Automated scanning maps every cryptographic asset: algorithms, keys, certificates, libraries, and third-party binaries.

Build Your Inventory

Every asset catalogued into a structured, searchable inventory. Your foundation for CBOMs and migration planning.

Q2 2026

Assess and Prioritize

Findings ranked by technical severity and policy impact so teams know exactly what to address first.

Q2 2026

Resolve and Harden

Remediation guidance and integrations with enterprise tools so teams can act without workflow disruption.

Q3 2026

Continuous Posture Management

Ongoing scanning keeps your inventory current as assets change, dependencies shift, and new exposures emerge.

Always on

Why start now?

PQC migration is not a simple upgrade. It is a multi-year program, possibly the largest migration in history and the deadlines are already counting down.

01

Migration takes years, not months

A full cryptographic migration — discovery, inventory, prioritization, testing, deployment, and validation — routinely takes five to ten years across complex enterprise environments. For CII organizations, the 2027 foundation deadline is effectively now.

02

Cryptography is embedded everywhere

Keys, certificates, libraries, and protocols are embedded across on-premises systems, cloud platforms, applications, and vendor-supplied software. Locating all of it before you can begin migrating any of it is a substantial program in itself.

03

Adversaries are harvesting now

Harvest Now, Decrypt Later is not a theoretical risk. Nation-state actors are actively capturing encrypted data today with the intent to decrypt it once quantum capability matures. Long-lifetime data — financial records, health data, government communications — is already at risk.

04

CBOMs are a procurement requirement from 2027

The Task Force mandates Cryptographic Bills of Materials in procurement from FY 2027-28. Organisations that have not completed a cryptographic inventory cannot produce one and cannot comply. The inventory work must start immediately.

05

Vendor and supply chain timelines add delay

Your migration timeline is not just yours. It depends on your vendors, cloud providers, hardware suppliers, and software partners being PQC-ready. Communicating requirements to them now gives them time to prepare and gives you time to find alternatives if they cannot.

06

Q-Day estimates are moving closer

A cryptographically relevant quantum computer could arrive within three years. Google noted in December 2025 that quantum computing is now at the same inflection point AI was five years ago. The window is narrowing faster than expected.

See your cryptographic exposure

Book a demo and see how QuantumGate maps your cryptographic asset inventory, identifies PQC compliance gaps against India's quantum-safe security mandate, and gives your team a clear migration starting point.

A complete quantum-safe and enterprise cybersecurity portfolio

qsphere

QSphere

Quantum-resilient VPN built on post-quantum key exchange protocols. Protect your network communications against both current and future threats without changing your existing infrastructure.

Salina

Salina

Secure password management without storing passwords by leveraging advanced confidential computing protocols. It integrates seamlessly with enterprise identity and corporate services, enabling a password-less experience.

VMI

Secure VMI

A fully isolated virtual enterprise workspace on personal or corporate mobile devices. Applications run in a secure cloud or on-premises environment, ensuring no sensitive data is stored locally.