Skip to content
arrow_back
search
ISM-1917 policy ASD Information Security Manual (ISM)

Support Post-Quantum Cryptographic Algorithms by 2030

New cryptographic tools must support specific secure algorithms by 2030 to be ready for future quantum computing.

record_voice_over

Plain language

This control is all about getting ready for the future when computers get super powerful. By 2030, new systems need to be built so they can handle a new kind of security that will work even against these future computers. If we don't prepare, these powerful computers could break our current security, leading to data breaches or even financial loss.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

The development and procurement of new cryptographic equipment, applications and libraries ensures support for the use of ML-DSA-87, ML-KEM-1024, SHA-384, SHA-512 and AES-256 by no later than 2030.
policy ASD Information Security Manual (ISM) ISM-1917
priority_high

Why it matters

Without PQC-ready crypto (ML-DSA-87/ML-KEM-1024, SHA-384/512, AES-256) by 2030, data may be broken later via quantum attacks.

settings

Operational notes

For all new procurements, verify libraries/equipment support ML-DSA-87, ML-KEM-1024, SHA-384/512 and AES-256, and record compliance to meet the 2030 deadline.

Mapping detail

Mapping

Direction

Controls