April 10, 2025
As the medical device industry grapples with increasingly stringent cybersecurity regulations, a new and rapidly approaching risk has moved from theoretical to imminent: quantum computing. Recent milestones from tech giants and government agencies signal that now is the time for medical device manufacturers (MDMs) to begin the transition to post-quantum cryptography (PQC).
In August 2024, the National Institute of Standards and Technology (NIST) published three new cryptographic standards — FIPS 203 (CRYSTALS-Kyber), FIPS 204 (CRYSTALS-Dilithium), and FIPS 205 (SPHINCS+) that are considered resistant to quantum attacks. This historic announcement, part of the multi-year NIST Post-Quantum Cryptography project, sets the foundation for a secure future and sets the direction for industry which cryptographic algorithms to implement.
At the same time, companies like Google and Microsoft are demonstrating just how fast we are approaching a post-quantum world:
The future isn’t distant. It’s happening now.
Cryptography is foundational to medical device cybersecurity, ensuring the confidentiality, integrity, and authenticity of patient data and device communications as well as ensuring device availability and patient safety. But as regulators increase their scrutiny, the spotlight is shifting beyond simple algorithm selection.
Many MDMs are still falling into critical traps:
These issues have real consequences: we are aware of several recent FDA market submission rejections that were linked to cryptographic deficiencies — including use of outdated algorithms and lack of documentation around key management strategies and processes.
For context, NIST’s SP 800–57 and SP 800–175B provide critical guidance on cryptographic key management practices that are expected in secure systems — including medical devices.
Quantum computers leverage entirely new physics to solve problems that stump classical systems — most notably, they significantly reduced the time required for factoring of the elliptic curve discrete log calculations used by Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) encryption.
Once operational, quantum computers will be able to:
NIST’s selection of Kyber and Dilithum for standardization reflects their resistance to these quantum attacks and their suitability for embedded applications.
The FDA’s 2023 Premarket Cybersecurity Guidance requires MDMs to provide “reasonable assurance” that devices are protected throughout their lifecycle. This includes:
Additionally, under FD&C Act Section 524B, the FDA now has the legal authority to refuse device submissions that don’t meet cybersecurity expectations — especially if they contain deprecated cryptographic algorithms or lack evidence of forward-looking crypto planning.
With NIST committing to deprecate non-quantum-resistant cryptography by 2030, MDMs need to act now to avoid product delays, expensive redesigns, or long-term risk exposure.
While Software Bills of Materials (SBOMs) are now common in submissions, CBOMs are emerging as a best practice to document:
As NIST PQC standards become mandatory, including a CBOM can streamline FDA submission reviews, simplify third-party audits, and provide internal engineering with a clear cryptographic inventory.
Transitioning to PQC is essential — but challenging, especially in resource-constrained devices.
Key implementation challenges include:
To ensure regulatory success and patient safety in the quantum era, MDMs should:
The shift to post-quantum cryptography is no longer theoretical. Between NIST’s new standards, Google’s Chrome deployment, and Microsoft’s hardware breakthroughs, the countdown to quantum readiness has begun.
With the FDA enforcing cybersecurity requirements and NIST aiming to fully deprecate legacy algorithms by 2030, the time for proactive preparation is now.
MDMs that begin this transition today will not only ensure regulatory compliance, but also position themselves as leaders in protecting patient data and device integrity in the age of quantum computing.
Navigating the FDA submission process doesn’t have to be a daunting task. With Medcrypt’s experienced team by your side, you can streamline your submission preparation, prioritize cybersecurity remediation, and achieve program maturity. Our unique approach, coupled with a deep understanding of FDA expectations, ensures your medical devices are compliant and secure in an ever-evolving threat landscape. Trust Medcrypt to be your partner in achieving FDA cybersecurity readiness and ensuring the safety of your innovations.
Don’t know where to start? Start by taking our complimentary FDA Cybersecurity Filing Readiness Survey.
April 1, 2025
March 28, 2025
March 19, 2025
Get the latest healthcare cybersecurity news right in your inbox.
We'll never spam you or sell your information