Quick Answer: Central banks and financial institutions worldwide are actively replacing RSA and elliptic-curve encryption with quantum-resistant algorithms because a sufficiently powerful quantum computer could break today's financial security in hours. This transition β still years from completion β affects everything from wire transfers to your savings account's authentication layer, and the migration is messier than any official announcement suggests.
The threat isn't theoretical anymore, and the financial industry knows it. What's less understood β even inside the institutions doing the work β is how extraordinarily difficult it is to replace cryptographic infrastructure that has been quietly accumulating for three decades inside systems that cannot simply be turned off.
This is not a story about quantum computers breaking banks tomorrow. It's a story about an industry trying to future-proof trillions of dollars in transactions against a threat that doesn't fully exist yet, while simultaneously running live payment rails that process millions of transactions per day, every day.
What Actually Breaks When Quantum Arrives
The current security architecture protecting interbank transfers, SWIFT messages, digital signatures on bond settlements, and your online banking login rests primarily on two mathematical assumptions: the difficulty of factoring large integers (RSA) and the hardness of elliptic curve discrete logarithm problems (ECDSA). These work because classical computers would take millions of years to brute-force them.
A sufficiently large quantum computer running Shor's algorithm collapses that timeline to hours, potentially minutes.
The practical implication is severe. Any encrypted financial communication intercepted and stored today could be decrypted retroactively once quantum capability arrives β a strategy researchers call "harvest now, decrypt later." Intelligence agencies are assumed to already be doing this. Nation-state actors with long-term geopolitical motivations have every incentive to archive encrypted financial traffic from SWIFT, Fedwire, or TARGET2 now, and wait.
This is the part that keeps some central bank cryptographers up at night: the attack surface already exists. The quantum computer just hasn't been built yet.
NIST's Standardization and the Implementation Gap
In July 2024, the U.S. National Institute of Standards and Technology (NIST) finalized its first set of post-quantum cryptographic standards: ML-KEM (formerly CRYSTALS-Kyber), ML-DSA (formerly CRYSTALS-Dilithium), and SLH-DSA (formerly SPHINCS+). These algorithms are based on problems β lattice problems, hash-based signatures β that quantum computers are not known to solve efficiently.
On paper, this looks like progress. And it is. But the gap between a published standard and actual deployment inside financial infrastructure is enormous and deeply underappreciated.
Consider what "replacing the cryptography" actually means inside a major central bank:
- Hardware Security Modules (HSMs) embedded in core payment systems may not support new algorithm families without firmware replacement or full hardware swap-outs.
- Legacy COBOL-based systems β and yes, some core banking systems still run on COBOL β interact with cryptographic libraries in ways that are poorly documented and sometimes not documented at all.
- Certificate chains across correspondent banking relationships span dozens of jurisdictions, each with their own regulatory timeline.
- Interoperability between institutions migrating at different speeds creates dangerous hybrid periods where a quantum-safe bank communicates with a non-quantum-safe counterparty, and the negotiated security level collapses to the weaker endpoint.
The Bank for International Settlements (BIS) published a working paper in 2023 explicitly flagging this interoperability problem as one of the central coordination failures likely to emerge during the transition. It wasn't widely covered.
The Central Bank Migration Reality
The European Central Bank, the Federal Reserve, and the Bank of England have all acknowledged the quantum threat in official communications, but the actual migration timelines they've released are vague in ways that border on deliberately non-committal.
The Fed's 2022 discussion paper on quantum risk mentioned "monitoring" and "engagement with NIST." The ECB's 2023 crypto-asset update referenced post-quantum preparedness in a single paragraph. These are not organizations that move quickly on infrastructure. They move carefully, which is correct β but carefully sometimes means slowly enough that the gap between risk acknowledgment and risk mitigation becomes its own risk.
Some central banks are further along. The Bundesbank has reportedly been running internal pilots on lattice-based key exchange for interbank settlement testing. The Monetary Authority of Singapore has been among the more proactive Asian institutions, publishing clearer migration guidance and running quantum-safe pilot corridors with selected financial institutions.
Commercial banks, meanwhile, are in an even more fragmented position. Large global institutions like JPMorgan Chase and HSBC have dedicated quantum security teams and have publicly disclosed exploratory work. Most mid-tier and regional banks have done almost nothing, operating on the implicit assumption that someone upstream β their core banking software vendor, their payment network operator β will handle it.

