Posted:
18 March, 2026
Vaibhav Maniyar
Post-quantum cryptography (PQC) refers to encryption algorithms designed to run on standard computers but resist attacks from quantum computers. In August 2024, NIST published its first three finalised PQC standards: ML-KEM (FIPS 203), ML-DSA (FIPS 204), and SLH-DSA (FIPS 205).
The public-key algorithms protecting most biometric systems today - RSA and ECC - will be breakable by a sufficiently powerful quantum computer. Credible estimates place that threshold at 50% probability before 2035.
Unlike passwords, biometric identifiers cannot be changed if compromised. A fingerprint template stolen today and decrypted via a quantum computer in ten years remains permanently tied to its owner.
The "harvest now, decrypt later" threat means encrypted biometric data is at risk right now, not just when quantum hardware matures.
U.S. federal agencies must migrate high-risk systems to PQC by 2030 and complete full quantum-resistant security by 2035. Most biometric systems are not ready.
The global quantum cryptography market is projected to grow from USD 518 million in 2023 to USD 4.6 billion by 2030 at a 38.3% CAGR.
The answer to the question "is the world ready" is: not yet. But the tools exist, the standards are final, and the window to act responsibly is still open - for now.
Quantum computing has been described as a future threat for so long that it can start to feel abstract. It is not. The cryptographic infrastructure protecting the world's biometric databases, border control systems, national ID programs, and payment authentication networks is built on mathematics that quantum computers will be able to break - and that break is now being timed in years, not decades.
Post-quantum cryptography is the response to that problem. It describes a new generation of encryption algorithms that resist quantum attacks while running on ordinary hardware. The algorithms exist. The standards are published. But whether the world - and specifically the biometric industry - is ready to use them is a different question.
This article looks at what post-quantum cryptography means specifically for biometric systems, why the stakes are higher here than in almost any other domain, where the current state of readiness actually sits, and what needs to happen before Q-Day arrives.
Post-quantum cryptography (PQC) is a set of cryptographic algorithms designed to remain secure against both classical computers and quantum computers. The name can be confusing: PQC does not run on quantum hardware. It runs on the same servers, devices, and chips in use today. What changes is the underlying mathematics.
Current public-key systems - RSA, elliptic curve cryptography (ECC), and Diffie-Hellman key exchange - rely on mathematical problems that classical computers cannot solve in any practical timeframe: factoring very large numbers, or finding discrete logarithms on elliptic curves. A quantum computer running Shor's algorithm solves both of these efficiently. That makes the entire family of RSA and ECC-based encryption breakable once quantum hardware reaches sufficient scale.
Post-quantum cryptography replaces those foundations with different mathematical problems - lattice problems, hash functions, error-correcting codes, and others - that quantum computers are not known to solve efficiently. The goal is encryption that holds even after a cryptographically relevant quantum computer exists.
Key Definition
Post-quantum cryptography (PQC): Cryptographic algorithms that run on classical computers and are designed to resist attacks from both classical and quantum adversaries. PQC is distinct from quantum key distribution (QKD), which uses quantum hardware. NIST finalised its first three PQC standards in August 2024.
Most discussions of post-quantum cryptography focus on encrypted communications - protecting emails, financial transactions, and web traffic. Those are serious concerns. But biometric data carries a risk category that other encrypted data does not.
Biometric identifiers are permanent. A fingerprint, iris pattern, facial geometry, or palm vein map is fixed for life. If a database of hashed passwords is compromised, administrators reset every account. If a database of encrypted biometric templates is compromised and later decrypted - even years from now - every person whose data was in that database is permanently exposed. There is no way to issue a new fingerprint.
This permanence is what makes the "harvest now, decrypt later" (HNDL) threat so serious for biometric systems. Nation-state actors and sophisticated threat groups are already collecting and storing encrypted data with the explicit intention of decrypting it once quantum hardware matures. NIST's transition guidance specifically flags this attack pattern as a present-day risk, not a future one.
For a biometric record stored today, the exposure window is not just until Q-Day. It is the lifetime of every person in that database.
Password vs. Biometric: The Exposure Difference
Password compromised: Reset the password. Exposure ends.
Biometric template compromised: No reset possible. Exposure is permanent. If the encrypted template is decrypted years later via a quantum computer, the damage cannot be undone.
| Metric | Figure | Source |
|---|---|---|
| Quantum cryptography market (2023) | USD 518.3 million | Grand View Research |
| Quantum cryptography market forecast (2030) | USD 4.6 billion | Grand View Research |
| Market CAGR 2024-2030 | 38.3% | Grand View Research |
| Probability of cryptographically relevant quantum computer by 2030 | 39% | Kalshi / Citi Institute, 2026 |
| Probability by 2035 | 50% | Kalshi / Citi Institute, 2026 |
| Time for classical computer to break RSA-2048 | ~13.7 billion years | ScienceDirect, 2025 |
| Time for a 10 MHz quantum computer to break RSA-2048 via Shor's | ~42 minutes | ScienceDirect, 2025 |
| Cloudflare traffic protected by PQC (mid-2024) | Over 16% | Cloudflare blog |
| U.S. federal deadline: migrate high-risk systems to PQC | 2030 | NIST IR 8547 / White House EO |
| U.S. federal deadline: full quantum-resistant security | 2035 | NIST IR 8547 |
| Qualified quantum security professionals vs open roles | 1 candidate per 3 roles | Industry analysts, 2024 |
| New quantum professionals needed globally by 2030 | Over 250,000 | McKinsey (cited via SpinQ) |
Two numbers from this table deserve particular attention. The 42-minute figure for RSA-2048 cracking is not a projection - it is a published calculation of what Shor's algorithm would require on a sufficiently scaled machine. And the 16% of Cloudflare traffic figure shows that PQC deployment is already happening at internet scale, right now, in production. The technology is not waiting on the industry.
Biometric systems touch cryptography at multiple points in their architecture. Understanding where is necessary to understand where the quantum risk sits.
NIST ran an eight-year international competition beginning in 2016, evaluating 82 candidate algorithms from cryptographers worldwide. After four rounds of cryptanalysis and evaluation, the first three finalised post-quantum cryptography standards were published on 13 August 2024.
Migration Timeline: What the Rules Say
NIST IR 8547 (November 2024) sets the following U.S. federal deprecation schedule: (1) After 2030 - no new systems may use 112-bit security schemes such as RSA-2048 or ECC-224. (2) After 2035 - existing systems must have discontinued all use of these algorithms. The White House Executive Order (January 2025) requires U.S. federal agencies to migrate high-risk systems to PQC by 2030. The European Commission published a Coordinated PQC Implementation Roadmap in June 2025. These timelines are regulatory baselines, not targets to plan toward - migration takes years, and starting in 2028 to meet a 2030 deadline is not a plan.
Every certificate in a biometric system's PKI - device certificates, CA certificates, TLS server certificates, OCSP responder certificates - will need to be re-issued using PQC signature algorithms. ML-DSA is the primary replacement for RSA and ECDSA in certificate signing. This is not a one-step change: certificate chains have trust hierarchies, and migrating them requires coordinated updates across devices, servers, and root certificate stores. For systems like e-passports and national ID cards that embed certificates in physical documents with multi-year validity, the migration timeline is especially long.
Cancelable biometrics - where an irreversible transformation is applied to a template before storage, so that the stored value cannot be reversed to the original biometric - currently rely on cryptographic primitives for key management and template binding. Those key management operations need PQC replacements. Fuzzy extractors, which derive consistent keys from noisy biometric input using error-correcting codes, are being actively researched with PQC-compatible underlying schemes. A 2025 study published in Frontiers in Artificial Intelligence demonstrated a multimodal biometric key generation system using face and finger vein data with an integrated code-based (McEliece) cryptosystem for quantum resistance.
When a biometric system produces a signed output - a match score, a consent record, an authentication assertion - that signature is what another system relies on to trust the result. Currently almost all such signatures use RSA or ECDSA. Switching to ML-DSA for these outputs is a protocol-level change that must be coordinated between the biometric engine, the relying party application, and any intermediary services. For systems like digital identity wallets and biometric payment authentication, this involves working with external standards bodies including FIDO Alliance, which is actively developing PQC-resilient passkey specifications.
Fingerprint scanners, iris cameras, and biometric smart cards are often resource-constrained. PQC algorithms - particularly ML-DSA and SLH-DSA - produce larger key material and signatures than current schemes. A typical RSA-2048 signature is 256 bytes. An ML-DSA signature (Dilithium3) is approximately 3,293 bytes. For a smart card with 72KB of EEPROM, this matters. The path forward involves hardware refresh planning, chip-level PQC acceleration (now appearing in newer secure elements), and potentially using FN-DSA (FALCON) for its smaller signature size in constrained environments.
Hybrid cryptography means running both a classical algorithm and a PQC algorithm in parallel for the same operation. If either holds, security holds. NIST explicitly permits hybrid key exchange - ML-KEM combined with X25519 - for TLS. For biometric systems beginning PQC migration, hybrid deployment lets new data flows be protected by PQC while backward compatibility is maintained with systems not yet migrated. It is the recommended first step for most enterprise and government biometric deployments, and it can begin now with available tools.
| Sector | PQC Readiness | Risk Level | Primary Vulnerability | Key Pressure Points |
|---|---|---|---|---|
| Government / Border Control | Low to moderate | Critical | AFIS databases, e-passports, border infrastructure | Long device cycles; passports embed certificates for 10 years |
| Banking / FinTech Biometrics | Moderate | High | Biometric payment auth, KYC templates | Regulatory timelines; HNDL risk on KYC records |
| Consumer Mobile (Face / Touch ID) | Moderate | Medium | Device-level attestation keys | Platform vendors (Apple, Google) moving faster than enterprise |
| Healthcare Biometrics | Very low | Critical | Patient identity, EHR access, long retention | Records retained for decades; HNDL exposure is extreme |
| IoT / Edge Biometric Devices | Very low | Critical | Constrained hardware cannot run most PQC algorithms | No hardware upgrade path without device replacement |
| National ID / Civil Registration | Low | Critical | Permanent biometric traits in long-lived records | Multi-decade data retention; no revocation mechanism |
The sectors with the lowest readiness - healthcare, IoT/edge devices, and national ID - are also the sectors with the longest data retention periods and the least ability to revoke and reissue credentials. That combination makes them the highest-priority targets for both migration planning and HNDL threat monitoring.
| # | Action | Why It Matters |
|---|---|---|
| 1 | Run a full cryptographic inventory | Identify every system, protocol, and device using RSA, ECC, or Diffie-Hellman. You cannot migrate what you have not mapped. |
| 2 | Classify data by retention period and sensitivity | Long-retained biometric data is the highest HNDL risk. Prioritise those systems first. |
| 3 | Assess hardware constraints on edge devices | Determine which devices can run ML-KEM / ML-DSA and which require hardware replacement or alternative algorithms. |
| 4 | Start hybrid PQC deployment on new data flows | Protect new traffic with ML-KEM + X25519 hybrid key exchange while legacy systems catch up. |
| 5 | Plan PKI certificate migration to ML-DSA | Map out the certificate chain for every biometric subsystem and build a re-issuance schedule. |
| 6 | Build crypto-agility into new systems | New architecture should allow cryptographic primitives to be swapped without full rewrites. Hardcoding RSA now is building in technical debt. |
| 7 | Review biometric template protection schemes | Confirm that cancelable biometrics and fuzzy extractor implementations are compatible with PQC key management. |
| 8 | Monitor NIST, ISO/IEC, and FIDO standards updates | FIPS 206 and 207 are in progress. ISO/IEC biometric standards have not yet been updated for PQC. Track changes. |
| 9 | Train internal security teams on PQC | Most engineers have never implemented a lattice-based algorithm. Upskilling needs to start now. |
| 10 | Set a documented migration deadline tied to regulatory timelines | Map your plan to the 2030 and 2035 NIST milestones. If you have EU obligations, include the European Commission's 2025 roadmap. |
| Mistake | The Problem | The Fix |
|---|---|---|
| Treating Q-Day as the start date for migration | Migration takes years. Waiting until a quantum computer exists means the breach window has already opened. | Start the cryptographic inventory and hybrid deployment planning now. |
| Ignoring the HNDL threat | Assuming encrypted data is safe until Q-Day misses the point: attackers are already harvesting it. | Prioritise long-retained biometric databases immediately, regardless of migration completion date. |
| Assuming AES-encrypted templates are fully protected | AES is more resilient but not immune. AES-128 should be upgraded. The PKI layer above the templates is the more urgent risk. | Move to AES-256 for template encryption and prioritise the certificate chain migration. |
| Overlooking edge device hardware constraints | Planning a PQC rollout without auditing device compute and memory capacity leads to failed deployments. | Audit every edge device in the biometric pipeline for PQC feasibility before setting migration dates. |
| Hardcoding a single PQC algorithm | The standards landscape is still developing. A system locked to one algorithm today may need to be rebuilt if that algorithm is later found to be weak. | Build crypto-agility in from the start. Modular cryptographic layers are far cheaper to update than monolithic ones. |
The honest answer to the question this article is built around - is the world ready for post-quantum cryptography in biometrics - is no. Not yet. Most biometric systems in production today are running on cryptographic foundations that a future quantum computer will break. The devices, protocols, certificate authorities, and template protection schemes protecting fingerprint, iris, and facial recognition data were not designed for a post-quantum world.
But the tools exist. NIST's standards are published, free, and ready to implement. Early adopters like Cloudflare, DBS Bank, and major cloud providers are already running PQC in production at scale. The path is clear. What is missing, in most sectors, is urgency.
For biometric operators, that urgency needs to be higher than for almost any other category of encrypted data - because when biometric data is compromised, there is no recovery. The migration is not a future compliance project. It is a present-day risk management decision.
The organisations that run their cryptographic inventory this year, begin hybrid PQC deployment on new data flows, and plan their hardware refresh cycles around post-quantum requirements will be the ones whose users are protected when Q-Day eventually arrives. The ones that wait will be reading breach notifications instead.
Post-quantum cryptography (PQC) refers to cryptographic algorithms that run on standard classical computers but are designed to resist attacks from both classical and quantum computers. NIST published its first three finalised PQC standards in August 2024: ML-KEM (FIPS 203) for key encapsulation, ML-DSA (FIPS 204) for digital signatures, and SLH-DSA (FIPS 205) for hash-based signatures.
Biometric systems rely on RSA and ECC-based cryptography for certificate chains, device authentication, and signed match outputs. Shor's algorithm on a quantum computer can break both RSA and ECC efficiently. Additionally, biometric identifiers cannot be changed if compromised, making the exposure from a future quantum breach permanent.
Harvest now, decrypt later (HNDL) is a threat strategy where attackers collect encrypted data today and store it, planning to decrypt it when a quantum computer becomes available. For biometrics, the risk is especially high because templates are tied to permanent physical characteristics - a biometric database decrypted in ten years results in lifelong exposure for every person in it.
NIST published three PQC standards on 13 August 2024: FIPS 203 (ML-KEM, for key encapsulation), FIPS 204 (ML-DSA, for digital signatures), and FIPS 205 (SLH-DSA, a hash-based signature standard). FIPS 206 (FN-DSA) and FIPS 207 (HQC) are also in development as additional options.
AES is more resilient than RSA or ECC. AES-256 retains approximately 128-bit security against a quantum attacker using Grover's algorithm, which NIST considers acceptable. AES-128 should be upgraded. The higher-priority risk for biometric systems is the RSA and ECC used in certificate chains and signed outputs, not AES-encrypted template storage.
Prediction market data cited by Citi Institute in 2026 places the probability at 39% before 2030 and 50% before 2035. NIST has set 2030 as the deadline for U.S. federal agencies to begin migrating high-risk systems away from vulnerable algorithms.
No. The quantum threat targets the cryptographic layer protecting biometric data in transit and at rest - not the matching algorithms themselves. Fingerprint minutiae matching, iris pattern comparison, and face recognition algorithms are not based on the same mathematics as RSA or ECC. The risk is in how the data is encrypted, transmitted, and authenticated - not in how biometric features are compared.
We use essential and functional cookies on our website to provide you a more customized digital experience. To learn more about how we use cookies and how you can change your cookie settings, kindly refer to our Privacy Statement. If you are fine to resume in light of the above, please click on 'I Accept'.
Comments