Pillar D: Quantum Technologies & CybersecurityD3

Quantum Threats to Existing Systems

Harvest Now Decrypt Later, PKI impact, protocol vulnerabilities, critical infrastructure risk.

Part of Pillar D: Quantum Technologies & Cybersecurity · Quantum Technologies & Cybersecurity groups the disciplines that share methods, tools, and threat models with Quantum Threats to Existing Systems.

What is Quantum Threats to Existing Systems?

The quantum threat to existing systems is not a future problem — it is an active concern today. The 'Harvest Now, Decrypt Later' (HNDL) strategy means that nation-state adversaries and sophisticated attackers are already intercepting and storing encrypted communications with the expectation of decrypting them once a cryptographically relevant quantum computer (CRQC) becomes available. Any data with a secrecy requirement lasting beyond the expected arrival of a CRQC is at risk right now.

Public Key Infrastructure (PKI) is particularly vulnerable because it underpins certificate chains, code signing, secure boot, TLS connections, and identity verification. A quantum computer capable of running Shor's algorithm would compromise the trust anchors of the entire internet. Protocol vulnerabilities extend beyond just the cryptographic primitives — key exchange mechanisms in TLS, IPsec, SSH, and S/MIME all rely on algorithms that Shor's algorithm can break.

Critical infrastructure sectors — energy, financial services, healthcare, defense, and telecommunications — face the highest risk because their systems have long operational lifetimes, handle data with decades-long sensitivity, and are difficult to upgrade. The intersection of legacy systems, supply chain complexity, and the quantum timeline creates a challenge that requires strategic planning starting now, not when quantum computers arrive.

Why it matters

Harvest Now, Decrypt Later means quantum risk is a present-day data protection problem, not a future one. Organizations with long-lived sensitive data — government, healthcare, finance, defense — must treat this as an active threat.

Understanding quantum threats to existing systems is the motivational bridge between quantum computing theory and practical action. It answers the question every CISO asks: 'Why should I care about quantum computing today?'

Standards and frameworks

Curated resources

Authoritative sources we ground Quantum Threats to Existing Systems questions in — frameworks, research, guides, and tools.

Unknownresearch

Shor, P. — "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer" (1994)

The paper that started it all. Shor's algorithm breaks RSA, DSA, ECDSA, and Diffie-Hellman. Essential for questions on which classical cryptographic assumptions quantum computing breaks.

University of Waterlooresearch

Mosca, M. — "Cybersecurity in an Era with Quantum Computers" (IEEE Security & Privacy, 2018)

Mosca's theorem: if the time to migrate (x) + shelf life of data (y) > time to quantum computer (z), then start migration now. The canonical framework for "harvest now, decrypt later" risk assessment.

CISAframework

CISA — "Post-Quantum Cryptography Initiative"

Federal guidance on preparing for quantum threats. Cryptographic inventory requirements, risk assessment methodology, and migration prioritization. Practical governance questions.

NISTframework

NIST SP 800-227 — Recommendations for Transition to PQC (Draft)

Migration guidance and timelines. Deprecation schedule for current algorithms. Hybrid approaches. The roadmap document for PQC transition questions.

Unknownresearch

Grover, L. — "A Fast Quantum Mechanical Algorithm for Database Search" (1996)

Quadratic speedup for unstructured search. Halves the effective key length of symmetric algorithms (AES-128 → 64-bit equivalent). Questions on what Grover's algorithm does and doesn't break.

NSAguide

NSA Quantum Computing and Cryptography FAQ

NSA's guidance on quantum threats to cryptography. Explains which algorithms are vulnerable and timelines for transition.

Global Risk Instituteresearch

Quantum Threat Timeline Report (Global Risk Institute)

Expert survey on when quantum computers will break RSA-2048. Tracks annual probability estimates from leading researchers.

Certifications that signal this domain

Credentials whose blueprint meaningfully covers this domain. Core means centrally covered; also touched means present in the blueprint but not the primary focus.

Core coverage

NIST PQC migration trainingProfessional·NIST / vendorsOfficial page →

NIST / vendor PQC migration training (emerging credentials)

Crypto inventory, algorithm selection (ML-KEM/ML-DSA/SLH-DSA), migration planning.

Browse all certifications → — pick a cert on the interactive map to highlight every domain it covers.

Education and certifications

More in Quantum Technologies & Cybersecurity

Drill Quantum Threats to Existing Systems with adaptive difficulty

44 questions available. Skip what you know, focus where you're weak, and watch your rating move.