July 21, 2025
In earlier posts, we explored what post-quantum cryptography (PQC) is and how preparing for it aligns with FDA cybersecurity expectations. Today, we’ll address a common misconception: that cryptographic updates are a simple matter of issuing a software update.
Unfortunately, in the world of medical devices, cryptographic agility is far more complex - and it is critical to plan for it in advance.
Why Crypto Agility Is a System Design Challenge
Most medical devices weren’t built with cryptographic agility in mind. In many cases, algorithms, certificates, and key exchange mechanisms are tightly coupled with hardware, firmware, or third-party modules. As a result, retrofitting or upgrading cryptographic functionality isn’t just a matter of swapping in new code - it often demands hardware redesigns, extensive re-validation, updated key-management processes, and coordination with external suppliers, making the whole effort a deeply complex, resource-intensive - and therefore high-risk-undertaking.
Even if a new algorithm (such as a post-quantum alternative) becomes available, you can only swap it if:
To plan any update you first must know what you’re protecting and where it lives. Build two tied together inventories:
Why it matters: PQC standards are final. NIST has selected an initial set of candidate algorithms, and timelines are set.
Note: Documenting every algorithm, key and certificate chain isn’t just about FDA VI.A - it’s what lets you automate updates, prove coverage for every device model, and track your progress when PCQ deadlines arrive. Further, although FDA does not specifically call out PQC, the agency does point to currently NIST-approved algorithms (with its 2030 / 2035 PQC deadline).
If your crypto lives in monolithic or locked down hardware, you’ll encounter serious road blocks when PQC algorithms arrive. Instead, build:
Why it matters: FDA is already expecting crypt-update plans. Their premarket guidance and Section 524B “reasonable assurance” that your security can evolve.
3. Architect for long-term evolution
Many medical devices stay in the field for 10 - 15 years (or longer), so you must plan for changing standards and threats over their entire lifespan. This is critical for:
Why it matters: Long-lived devices mean you can’t afford manual patches. Every firmware swap triggers re-validation-without agility, you’ll face mounting costs and delays.
Agility enables long-term protection without a full product replacement or redesign.
The urgency isn’t just technical - it’s regulatory.
Preparing for cryptographic change isn’t a future issue - being PQC-ready is a current compliance and design priority.
In our final blog of the series, we’ll introduce how Medcrypt’s Guardian platform helps medical device manufacturers stay ahead of evolving threats by managing cryptography in a secure, structured, and future-ready way.
Up Next: How Guardian Helps Medical Device Manufacturers Prepare for the Post-Quantum Future
July 21, 2025
July 17, 2025
July 16, 2025
Get the latest healthcare cybersecurity news right in your inbox.
We'll never spam you or sell your information