September 10, 2025
Quantum computing may not be widely deployed yet - but the security risks it introduces are already influencing cryptographic planning. With NIST‘s release of the first set of FIPS-approved Post Quantum Cryptography (PQC) algorithms in August 2024, medical device manufacturers (MDMs) can no longer afford to wait.
For manufacturers building connected devices with long lifespans, cryptographic agility must be a design priority. Devices entering the market today could still be in the field when post-quantum requirements take full effect. In fact, NIST has outlined a phased transition plan for the deprecation of legacy cryptographic algorithms - such as RSA and ECC - beginning by 2030, with full disallowance expected by 2035. These timelines make it imperative for manufacturers to start planning now, regardless of how soon large-scale quantum computers become practical.
Importantly, regulators are following suit: the FDA’s guidance states that cryptographic algorithms used in medical devices should be “consistent with standards and norms set by recognized standards organizations such as NIST.” Translation? If it’s not NIST-approved, it won’t meet regulatory expectations in the future.
Threat Spotlight: Capture Now, Decrypt Later
Nation-states and other sophisticated adversaries are already intercepting encrypted data with the intent to decrypt it in the future. This is not just theoretical: healthcare-specific intelligence sources report that cybercriminals are already executing 'harvest now, decrypt later' (HNDL) strategies - anticipating the day quantum computing will make decryption feasible.
Healthcare Spotlight: According to Medical Economics, bad actors are targeting encrypted healthcare data today - mining it from apps, collaboration tools, and other systems - with plans to decrypt it in the quantum future. This makes medical device ecosystems a prime target for long-term exploitation. This is not just theoretical: healthcare-specific threat intelligence reports, including those from the HHS Health Sector Cybersecurity Coordination Center (HC3), have warned that data exfiltration from hospitals and device ecosystems could be stockpiled by nation-state actors for future decryption when quantum capabilities emerge.
This strategy, known as “capture now, decrypt later”, turns today’s encrypted patient data, intellectual property, and communication logs into tomorrow’s breach headlines. For manufacturers of long-lived connected devices, this means:
Future-proofing starts with crypto agility.
The most important step manufacturers can take is to design for cryptographic flexibility - ensuring devices can adapt as cryptography standards evolve. Instead of locking into a single algorithm or key type, systems should be built to support multiple algorithms, including post-quantum and hybrid models.
This is where Medcrypt’s Guardian platform delivers value: by abstracting cryptographic operations and tracking algorithm usage across devices, Guardian enables manufacturers to transition from RSA or ECC to PQC - without needing to re-architect every component.
Six Key Considerations for PQC Readiness
NIST has finalized three PQC algorithms as FIPS standards:
Most medical device applications will start with ML-KEM and ML-DSA, as they cover the most critical use cases for encrypted communications and code signing.
Because these algorithms are still relatively new and unproven at scale, hybrid cryptography - combining post quantum schemes with ECC - is the most pragmatic approach. This ensures you’re protected if one algorithm is broken while maintaining compatibility with existing systems.
Guardian helps manufacturers track where ECC, hybrid, or PQC only schemes are used across devices, ensuring compliance while maintaining cryptographic agility.
PQC algorithms are generally more resource-intensive than their classical counterparts, requiring thoughtful hardware planning - especially for power- or space-constrained devices.
To reduce software disruption, many manufacturers are now exploring PQC acceleration in hardware - through dedicated cryptographic co-processors, secure elements, or TPMs. These allow post-quantum functions to run more efficiently and with minimal change to application-layer code.
Guardian helps MDMs identify which devices are PQC-ready - or can be upgraded with minimal friction - by abstracting cryptographic functions and enabling crypto agility across the device fleet.
PQC isn’t a plug-and-play swap. You’ll need to:
That’s why building on a crypto-agile foundation is essential. If you’ve already abstracted your crypto architecture, these changes become significantly easier to implement.
Guardian helps operationalize crypto agility by tracking what algorithms are used across devices, identifying components eligible for upgrade, and reducing the burden of system-wide cryptographic transitions.
Devices that last 10+ years will need cryptography that can evolve. Planning for PQC means making investment decisions today that will support secure operation long into the future:
Guardian provides visibility across the entire device lifecycle, from design and provisioning to field upgrades and decommissioning. Making it easier to prioritize which devices are ready for PQC, which ones need investment, and how to justify those decisions internally.
The first wave of PQC algorithms now carry FIPS 203/204/205 designations - meaning MDMs can begin demonstrating cryptographic compliance under these new standards.
Medcrypt’s approach ensures that:
Guardian surfaces the cryptography state of every device, enabling regulatory teams to easily demonstrate readiness during FDA reviews. Today, these FDA-ready reports can be delivered through Medcrypt’s Helm SBOM and Vulnerability Management tool - and Guardian’s security documentation aligns with the FDA Cybersecurity Guidance.
The shift to PQC can feel overwhelming, especially for customers and regulators who may not be deeply technical. That’s why clear, confident communication is critical to building trust and demonstrating leadership:
This level of transparency not only builds confidence - it prepares your organization to respond effectively to audits, customer security reviews, and emerging regulatory requirements
While Guardian provides the tooling and infrastructure visibility to manage post-quantum readiness, effective execution also depends on organizational maturity, cross-functional alignment, and the ability to measure progress across security programs. That’s where Medcrypt’ Product Security Intelligence Platform (PSIP) comes in.
PSIP helps MDMs:
In short, PQC isn’t just a cryptographic decision - it’s a product strategy division. And PSIP ensures you can treat security not as a sunk cost, but as a growth lever.
PQC isn’t just about preparing for future threats - it’s about building resilience into your products and infrastructure today. For connected medical devices, the risk window is already open, and the consequences of cryptographic failure - whether during device operation or in the manufacturing supply chain - are increasingly severe.
That’s why crypto agility and strong cryptographic hygiene must extend beyond the device itself. Medcrypt’s Guardian not only helps manage cryptographic posture in deployed products, but also supports the security of the manufacturing infrastructure that surrounds them. From symmetric secure boot keys to provisioning and certificate management, Guardian helps manufacturers reduce the risk of key leakage, avoid costly recalls, and build secure systems from the ground up.
Companies that start now will be best positioned to meet NIST’s PQC implementation timelines and lead the path forward in device security - earning trust with regulators, customers, and patients.
Guardian is purpose-built to support this transition - not as a static dashboard, but as an evolving platform that helps you track, manage, and upgrade cryptographic protections across your entire device lifecycle and development ecosystem.
Have questions about where to start? Let’s talk.
September 17, 2025
August 28, 2025
August 18, 2025
Get the latest healthcare cybersecurity news right in your inbox.
We'll never spam you or sell your information