<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 136 STAT. ?>
<?I98 136 STAT. ?>
<?I99 136 STAT. ?>
<?I50 PUBLIC LAW 117–260—DEC. 21, 2022?>
<?I51 PUBLIC LAW 117–260—DEC. 21, 2022?>
<?I52 PUBLIC LAW 117–260—DEC. 21, 2022?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 117–260: To encourage the migration of Federal Government information technology systems to quantum-resistant cryptography, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>260</docNumber>
<citableAs>Public Law 117–260</citableAs><citableAs>136 Stat. 2389</citableAs>
<approvedDate>2022-12-21</approvedDate>
<dc:date>2022-12-21</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-02</processedDate>
<congress>117</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><centerRunningHead>PUBLIC LAW 117–260—DEC. 21, 2022</centerRunningHead>
<page identifier="/us/stat/136/2389">136 STAT. 2389</page>
<dc:type>Public Law</dc:type><docNumber>117–260</docNumber>
<congress value="117">117th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To encourage the migration of Federal Government information technology systems to quantum-resistant cryptography, and for other purposes.<sidenote><p class="centered fontsize8" id="xb6102b5d-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076"><approvedDate date="2022-12-21">Dec. 21, 2022</approvedDate></p><p class="centered fontsize8" id="xb6102b5e-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076">[<ref href="/us/bill/117/hr/7535">H.R. 7535</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb6102b5f-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Quantum Computing Cybersecurity Preparedness Act.</p></sidenote>
<section id="d62938e88" identifier="/us/pl/117/260/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb6102b60-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s1500">6 USC 1500 note</ref>.</p></sidenote><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">Quantum Computing Cybersecurity Preparedness Act</shortTitle>”.</content></section>
<section id="d62938e103" identifier="/us/pl/117/260/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb6102b61-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s1526">6 USC 1526 note</ref>.</p></sidenote><heading>FINDINGS; SENSE OF CONGRESS.</heading><subsection class="firstIndent0 fontsize10" id="yb6107982-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s2/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Findings</inline>.—</heading><chapeau>Congress finds the following:</chapeau><paragraph class="fontsize10" id="yb6107983-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s2/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>Cryptography is essential for the national security of the United States and the functioning of the economy of the United States.</content></paragraph>
<paragraph class="fontsize10" id="yb6107984-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s2/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>The most widespread encryption protocols today rely on computational limits of classical computers to provide cybersecurity.</content></paragraph>
<paragraph class="fontsize10" id="yb6107985-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s2/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>Quantum computers might one day have the ability to push computational boundaries, allowing us to solve problems that have been intractable thus far, such as integer factorization, which is important for encryption.</content></paragraph>
<paragraph class="fontsize10" id="yb6107986-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s2/a/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>The rapid progress of quantum computing suggests the potential for adversaries of the United States to steal sensitive encrypted data today using classical computers, and wait until sufficiently powerful quantum systems are available to decrypt it.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yb6107987-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s2/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Sense of Congress</inline>.—</heading><chapeau>It is the sense of Congress that—</chapeau><paragraph class="fontsize10" id="yb6107988-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s2/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>a strategy for the migration of information technology of the Federal Government to post-quantum cryptography is needed; and</content></paragraph>
<paragraph class="fontsize10" id="yb6107989-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s2/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the governmentwide and industrywide approach to post-quantum cryptography should prioritize developing applications, hardware intellectual property, and software that can be easily updated to support cryptographic agility.</content></paragraph>
</subsection>
</section>
<section id="d62938e161" identifier="/us/pl/117/260/s3" style="-uslm-lc:I658141"><num class="fontsize12" value="3">SEC. 3. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb610a09a-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s1526">6 USC 1526 note</ref>.</p></sidenote><heading>DEFINITIONS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xb61115cb-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  In this Act:</chapeau><paragraph class="fontsize10" id="yb61115cc-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s3/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Agency </inline>.—</heading><chapeau>The term “<term>agency</term>”—</chapeau><subparagraph class="fontsize10" id="yb61115cd-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s3/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>means any executive department, military department, Government corporation, Government controlled corporation, or other establishment in the executive branch of the Government (including the Executive Office of the President), or any independent regulatory agency; and</content></subparagraph>
<subparagraph class="fontsize10" id="yb61115ce-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s3/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>does not include—<page identifier="/us/stat/136/2390">136 STAT. 2390</page></chapeau><clause class="fontsize10" id="yb61115cf-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s3/1/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>the Government Accountability Office; or</content></clause>
<clause class="fontsize10" id="yb61115d0-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s3/1/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>the governments of the District of Columbia and of the territories and possessions of the United States, and their various subdivisions.</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yb61115d1-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s3/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Classical computer</inline>.—</heading><content>The term “<term>classical computer</term>” means a device that accepts digital data and manipulates the information based on a program or sequence of instructions for how data is to be processed and encodes information in binary bits that can either be 0s or 1s.</content></paragraph>
<paragraph class="fontsize10" id="yb61115d2-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s3/3" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Director of cisa</inline>.—</heading><content>The term “<term>Director of CISA</term>” means the Director of the Cybersecurity and Infrastructure Security Agency.</content></paragraph>
<paragraph class="fontsize10" id="yb61115d3-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s3/4" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><heading class="fontsize10"><inline class="smallCaps">Director of nist</inline>.—</heading><content>The term “<term>Director of NIST</term>” means the Director of the National Institute of Standards and Technology.</content></paragraph>
<paragraph class="fontsize10" id="yb61115d4-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s3/5" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><heading class="fontsize10"><inline class="smallCaps">Director of omb</inline>.—</heading><content>The term “<term>Director of OMB</term>” means the Director of the Office of Management and Budget.</content></paragraph>
<paragraph class="fontsize10" id="yb61115d5-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s3/6" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><heading class="fontsize10"><inline class="smallCaps">Information technology</inline>.—</heading><content>The term “<term>information technology</term>” has the meaning given the term in <ref href="/us/usc/t44/s3502">section 3502 of title 44, United States Code</ref>.</content></paragraph>
<paragraph class="fontsize10" id="yb61115d6-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s3/7" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><heading class="fontsize10"><inline class="smallCaps">National security system</inline>.—</heading><content>The term “<term>national security system</term>” has the meaning given the term in <ref href="/us/usc/t44/s3552">section 3552 of title 44, United States Code</ref>.</content></paragraph>
<paragraph class="fontsize10" id="yb61115d7-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s3/8" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">(8) </num><heading class="fontsize10"><inline class="smallCaps">Post-quantum cryptography</inline>.—</heading><content>The term “<term>post-quantum cryptography</term>” means those cryptographic algorithms or methods that are assessed not to be specifically vulnerable to attack by either a quantum computer or classical computer.</content></paragraph>
<paragraph class="fontsize10" id="yb61115d8-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s3/9" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="9">(9) </num><heading class="fontsize10"><inline class="smallCaps">Quantum computer</inline>.—</heading><content>The term “<term>quantum computer</term>” means a computer that uses the collective properties of quantum states, such as superposition, interference, and entanglement, to perform calculations.</content></paragraph>
</section>
<section id="d62938e287" identifier="/us/pl/117/260/s4" style="-uslm-lc:I658141"><num class="fontsize12" value="4">SEC. 4. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb61115d9-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s1526">6 USC 1526</ref>.</p></sidenote><heading>INVENTORY OF CRYPTOGRAPHIC SYSTEMS; MIGRATION TO POST-QUANTUM CRYPTOGRAPHY.</heading><subsection class="firstIndent0 fontsize10" id="yb612003a-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Inventory</inline>.—</heading><paragraph class="fontsize10" id="yb612003b-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Establishment</inline>.<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb612003c-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="xb612003d-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Guidelines.</p></sidenote>—</heading><chapeau>Not later than 180 days after the date of enactment of this Act, the Director of OMB, in coordination with the National Cyber Director and in consultation with the Director of CISA, shall issue guidance on the migration of information technology to post-quantum cryptography, which shall include at a minimum—</chapeau><subparagraph class="fontsize10" id="yb612003e-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/a/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb612003f-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Requirement.</p></sidenote><content>a requirement for each agency to establish and maintain a current inventory of information technology in use by the agency that is vulnerable to decryption by quantum computers, prioritized using the criteria described in subparagraph (B);</content></subparagraph>
<subparagraph class="fontsize10" id="yb6120040-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/a/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb6120041-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Criteria.</p></sidenote><content>criteria to allow agencies to prioritize their inventory efforts; and</content></subparagraph>
<subparagraph class="fontsize10" id="yb6120042-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/a/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>a description of the information required to be reported pursuant to subsection (b).</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yb6120043-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Additional content in guidance</inline>.—</heading><chapeau>In the guidance established by paragraph (1), the Director of OMB shall include, in addition to the requirements described in that paragraph—</chapeau><subparagraph class="fontsize10" id="yb6120044-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/a/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>a description of information technology to be prioritized for migration to post-quantum cryptography; and<page identifier="/us/stat/136/2391">136 STAT. 2391</page></content></subparagraph>
<subparagraph class="fontsize10" id="yb6120045-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/a/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>a process for evaluating progress on migrating information technology to post-quantum cryptography, which shall be automated to the greatest extent practicable.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yb6120046-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Periodic updates</inline>.—</heading><content>The Director of OMB shall update the guidance required under paragraph (1) as the Director of OMB determines necessary, in coordination with the National Cyber Director and in consultation with the Director of CISA.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yb6120047-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Agency Reports</inline>.—</heading><chapeau>Not later than 1 year after the date of enactment of this Act, and on an ongoing basis thereafter, the head of each agency shall provide to the Director of OMB, the Director of CISA, and the National Cyber Director—</chapeau><paragraph class="fontsize10" id="yb6120048-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the inventory described in subsection (a)(1); and</content></paragraph>
<paragraph class="fontsize10" id="yb6120049-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>any other information required to be reported under subsection (a)(1)(C).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yb612004a-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Migration and Assessment</inline>.<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb612004b-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="xb612004c-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Guidelines.</p></sidenote>—</heading><chapeau>Not later than 1 year after the date on which the Director of NIST has issued post-quantum cryptography standards, the Director of OMB shall issue guidance requiring each agency to—</chapeau><paragraph class="fontsize10" id="yb612004d-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>prioritize information technology described under subsection (a)(2)(A) for migration to post-quantum cryptography; and</content></paragraph>
<paragraph class="fontsize10" id="yb612004e-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb612004f-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Plan.</p></sidenote><content>develop a plan to migrate information technology of the agency to post-quantum cryptography consistent with the prioritization under paragraph (1).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yb6120050-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Interoperability</inline>.<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb6120051-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Assessment.</p><p class="leftAlign firstIndent0 fontsize8" id="xb6120052-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Coordination.</p></sidenote>—</heading><content>The Director of OMB shall ensure that the prioritizations made under subsection (c)(1) are assessed and coordinated to ensure interoperability.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yb6120053-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/e" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">(e) </num><heading class="fontsize10"><inline class="smallCaps">Office of Management and Budget Reports</inline>.—</heading><paragraph class="fontsize10" id="yb6120054-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/e/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Report on post-quantum cryptography</inline>.—</heading><chapeau>Not later than 15 months after the date of enactment of this Act, the Director of OMB, in coordination with the National Cyber Director and in consultation with the Director of CISA, shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Oversight and Reform of the House of Representatives a report on the following:</chapeau><subparagraph class="fontsize10" id="yb6120055-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/e/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb6120056-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Strategy.</p></sidenote><content>A strategy to address the risk posed by the vulnerabilities of information technology of agencies to weakened encryption due to the potential and possible capability of a quantum computer to breach that encryption.</content></subparagraph>
<subparagraph class="fontsize10" id="yb6120057-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/e/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb6120058-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Estimate.</p></sidenote><content>An estimate of the amount of funding needed by agencies to secure the information technology described in subsection (a)(1)(A) from the risk posed by an adversary of the United States using a quantum computer to breach the encryption of the information technology.</content></subparagraph>
<subparagraph class="fontsize10" id="yb6120059-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/e/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb612005a-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Timelines.</p><p class="leftAlign firstIndent0 fontsize8" id="xb612266b-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Standards.</p></sidenote><content>A description of Federal civilian executive branch coordination efforts led by the National Institute of Standards and Technology, including timelines, to develop standards for post-quantum cryptography, including any Federal Information Processing Standards developed under <ref href="/us/usc/t44/ch35">chapter 35 of title 44, United States Code</ref>, as well as standards developed through voluntary, consensus standards bodies such as the International Organization for Standardization.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yb612266c-e817-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/260/s4/e/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Report on migration to post-quantum cryptography in information technology</inline>.—</heading><content>Not later than 1 year after the date on which the Director of OMB issues guidance under <page identifier="/us/stat/136/2392">136 STAT. 2392</page>
subsection (c)(2), and thereafter until the date that is 5 years after the date on which post-quantum cryptographic standards are issued, the Director of OMB, in coordination with the National Cyber Director and in consultation with the Director of CISA, shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Oversight and Reform of the House of Representatives, with the report submitted pursuant to <ref href="/us/usc/t44/s3553/c">section 3553(c) of title 44, United States Code</ref>, a report on the progress of agencies in adopting post-quantum cryptography standards.</content></paragraph>
</subsection>
</section>
<section id="d62938e498" identifier="/us/pl/117/260/s5" style="-uslm-lc:I658141"><num class="fontsize12" value="5">SEC. 5. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xb612266d-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s1526">6 USC 1526 note</ref>.</p></sidenote><heading>EXEMPTION OF NATIONAL SECURITY SYSTEMS.</heading><content style="-uslm-lc:I658120">  This Act shall not apply to any national security system.</content></section>
<section id="d62938e510" identifier="/us/pl/117/260/s6" style="-uslm-lc:I658141"><num class="fontsize12" value="6">SEC. 6. </num><heading>DETERMINATION OF BUDGETARY EFFECTS.</heading><content style="-uslm-lc:I658120">  The budgetary effects of this Act, for the purpose of complying with the Statutory Pay-As-You-Go Act of 2010, shall be determined by reference to the latest statement titled “Budgetary Effects of PAYGO Legislation” for this Act, submitted for printing in the Congressional Record by the Chairman of the House Budget Committee, provided that such statement has been submitted prior to the vote on passage.</content></section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2022-12-21">December 21, 2022</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/117/hr/7535">H.R. 7535</ref> (<ref href="/us/bill/117/s/4592">S. 4592</ref>):</heading>
<note>
<headingText style="-uslm-lc:I658032">SENATE REPORTS:</headingText> ┐No. <ref href="/us/srpt/117/251">117–251</ref> (<committee>Comm. on Homeland Security and                             Governmental Affairs</committee>) accompanying <ref href="/us/bill/117/s/4592">S. 4592</ref>.
</note>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD, Vol. 168 (2022):</heading>
<p class="indentUp4 firstIndent-1" id="xb612266e-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">July 12, considered and passed House.</p><p class="indentUp4 firstIndent-1" id="xb612266f-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">Dec. 8, considered and passed Senate, amended.</p><p class="indentUp4 firstIndent-1" id="xb6122670-e817-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">Dec. 12, 13, House considered and concurred in Senate amendment.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>