June 24, 2025
Post-quantum cryptography (PQC) isn’t just an emerging trend—it’s a growing concern for medical device manufacturers navigating long product lifecycles, evolving threats, and tightening regulatory expectations.
With quantum computing poised to break today’s cryptography, and the FDA requiring robust cryptographic protections throughout a device’s lifespan, the time to prepare is now.
The FDA’s 2023 Premarket Cybersecurity Guidance and Section 524B of the FD&C Act require medical device submissions to demonstrate "reasonable assurance" that cybersecurity protections - like encryption and authentication - will remain effective over time. This includes:
While post-quantum algorithms are not yet required, regulators expect manufacturers to plan for cryptographic evolution - especially for devices expected to remain in the field for 10+ years.
Failing to build in cryptographic flexibility today could result in future regulatory delays, costly redesigns, or postmarket vulnerability exposure.
Medical devices face unique risks when it comes to long-term cryptographic resilience:
If static algorithms like RSA or ECC are hardcoded today, your device could be functionally secure now - but obsolete later.
PQC refers to cryptographic algorithms designed to remain secure even against the power of a large-scale quantum computer. In July 2022, the National Institute of Standards and Technology (NIST) has already selected new standards:
These algorithms are being standardized now and will form the cryptographic foundation for the future - including in regulated industries like healthcare.
Implementing cryptographic agility and planning for PQC aligns with several key elements in the FDA’s 2023 Premarket Cybersecurity Guidance:
Security Risk Management
Threat modeling and cryptographic assessments should consider the long-term viability of algorithms in use - particularly for legacy crypto (RSA, ECC) that may be deprecated.
Security Architecture
Designs should enable modular cryptographic libraries and secure update pathways so future algorithms can be implemented without full system redesign.
Cybersecurity Testing
PQC algorithms can place greater demands on memory and compute resources. Testing must verify device performance, compatibility with third-party components, and usability under cryptographic load.
Documentation and Transparency
While not required, some manufacturers are adopting Cryptographic Bills of Materials (CBOMs) - a companion to the SBOM - to document:
CBOMs are not explicitly required by the FDA, but they are becoming a best practice to demonstrate cryptographic visibility and lifecycle planning.
Postmarket Surveillance
The FDA expects ongoing monitoring of cybersecurity threats - and cryptographic protections are no exception. Crypto-agility helps you respond to emerging risks without waiting for product recalls or field failures.
You don’t have to implement PQC tomorrow - but you do need to start building in flexibility. Here’s where to begin:
The shift to quantum-safe cryptography is underway - even if it’s not yet mandated. By starting now, manufacturers can future-proof their devices, minimize regulatory friction, and build trust in long-term product security.
Up Next: How Post-Quantum Readiness Aligns with FDA Expectations for Medical Devices
In our next post, we’ll break down what FDA reviewers actually look for, how post-quantum planning fits into a secure-by-design strategy, and how proactive cryptographic flexibility can streamline your submission.
June 20, 2025
June 12, 2025
June 10, 2025
Get the latest healthcare cybersecurity news right in your inbox.
We'll never spam you or sell your information