RSA & ECC approaching end of life: Your PQC roadmap | SITS
Blog

RSA & ECC nearing the finish line: Become crypto‑agile now

The BSI TR‑02102‑1 sets clear deadlines: why hybrid with PQC becomes mandatory from 2032 and how organizations can plan migration pragmatically.
3 Minutes

EOL: RSA & ECC

RSA and ECC have been the backbone of secure internet connections, data encryption, and electronic signatures for decades, but their time is running out. The reason is not a sudden bug or new mathematical methods that could break these algorithms, but physics: a sufficiently large quantum computer can use Shor’s algorithm to efficiently solve both the factoring problem (RSA) and discrete logarithms (ECC).

Therefore, anyone encrypting data today must assume that attackers may collect it now and decrypt it later (“harvest now, decrypt later”). The BSI is consequently introducing, for the first time, a concrete end‑of‑life date for the sole use of classical asymmetric methods. The details are provided as recommendations in the technical guideline TR-02102-1 from January 2026.

From 2031: PQC method...

In practical terms, this means that classic RSA or ECC procedures, such as those used today for the secure exchange of cryptographic keys in the context of HTTPS or secure e-mail are only recommended until the end of 2031. For applications with very high protection requirements, the changeover should take place by the end of 2030.

… in hybrid form …

From 2032 onward, classical RSA and ECC methods should be used only in hybrid form together with postquantum cryptography (PQC). “Hybrid” here means that two methods are applied in parallel. In addition to the classical RSA/ECC methods, modern PQC methods are to be combined.

The BSI explicitly recommends the hybrid approach because PQC methods, while necessary, have been investigated less than RSA and ECC with respect to implementation security and potential weaknesses to side‑channel attacks.

This is precisely where the organizational challenge lies: migration affects not just a single algorithm but protocols, libraries, certificate chains, device firmware, and often external partners as well. Especially in PKI environments, long migration timelines are realistic because new certificates, policies, HSM support, and rollout windows must align.

...and from 2035 also for electronic signatures

The BSI has set a later but also fixed horizon for signatures. According to the current state of knowledge, the sole use of classic RSA/ECC signature processes will probably only be recommended until the end of 2035. The switch to quantum-safe signatures should be completed by 2035 at the latest. Here, too, the preferred variant is hybrid, for example by combining a classic ECC / RSA with a PQC signature, which only counts as valid together.

With electronically signed documents, the real “crypto question” is not just the signing today, but above all the subsequent verifiability over many years, often far beyond the life cycle of IT systems. The BSI therefore advises planning future PQC conversions promptly in the event of long-term requirements and, if necessary, securing old documents again by means of re-signing with updated procedures. For this long-term preservation of evidentiary value, the BSI refers to TR-03125, which regulates the preservation of evidentiary value of cryptographically signed documents.

What does this mean for companies today?

The challenge lies not in the application of the new PQC procedures, but in the inventory of the affected applications and services and in the risk-based assessment of the respective protection requirements and migration complexity. A comprehensive migration project that includes the most important applications and services often takes several years due to dependencies and lifecycles and must therefore be planned at an early stage.

The procedure is called “cryptoagility”, which the BSI explicitly mentions in TR-02102-1. Cryptoagility describes the organizational, technical and procedural ability to flexibly replace or expand cryptographic mechanisms without having to make significant changes to the rest of the overall system. Based on this approach, organizations can meet these challenges formally, efficiently and in a targeted manner.

Implementing PQC migration pragmatically

With our proven, practice‑tested framework, you can get started quickly: inventory, pilot, hybrid rollout. Let’s discuss your roadmap for the PQC migration.
Newer
The Cyber Chronicle Newsroom
We provide you with the latest news, data and trending topics.
RSA & ECC nearing the finish line: Become crypto‑agile now
Learn more
NIS2
NIS2aaS - Comprehensive support for NIS2 implementation
Learn more
AI
Ransomware 2.0: How AI is rewriting the rules of Cyber Defence
Learn more
Cloud Platform Security
Governance & Oversharing: How Copilot becomes a Productivity Booster
Learn more
NIS2
NIS2, DORA & Co: Aren’t we all part of someone’s relevant supply chain?
Learn more
Security & IT Solutions
Digital Resilience starts with Security by Design - That's why Managed Services are strategically unavoidable
Learn more
Cloud Platform Security
Copilot Usecases: Transforming Business Workflows from Personal to Organizational Impact
Learn more
Cloud Platform Security
If Copilot still doesn't ignite … yet
Learn more
Cyber Resilient Workplace
How Resilient Is Your Workplace IT Really?
Learn more
SITS
From 1 April 2025: mandatory reporting of cyberattacks on critical infrastructure in Switzerland
Learn more
Cyber Defense
Managed SOC: advantages, costs & finding top providers (checklist)
Learn more
Cloud Platform Security
Secure Identities: Current trends
Learn more
Cloud Platform Security
Microsoft Entra: A portrait of a versatile product family
Learn more
Identity & Access Management
Identity meets Resilience
Learn more
NIS2
NIS2 & Penetration Tests: Getting Grip on NIS2-compliant Technology
Learn more
Identity & Access Management
Resilience by Identity
Learn more