Back to Blog
Cybersecurity

Post-Quantum Isn’t a Future Problem — ‘Harvest Now, Decrypt Later’ Attacks Are Already Happening

Harvest now decrypt later makes current data vulnerable today. NIST standards finalized. 5-15 year quantum timeline overlaps 5-10 year migration. Only 23% have begun readiness. NSA mandates 2030 transition. Discovery takes 6-12 months. Hybrid approaches bridge the gap. Crypto-agility is the enduring strategy.

Cybersecurity
Thought Leadership
10 min read
43 views

Post-quantum cryptography is not a future problem because harvest now decrypt later attacks are already underway. Nation-state adversaries collect encrypted data today to decrypt once quantum computers become capable. NIST finalized its first post-quantum cryptographic standards in August 2024 including ML-KEM, ML-DSA, and SLH-DSA algorithms. Furthermore, experts estimate cryptographically relevant quantum computers could arrive within 5-15 years. Migration to quantum-resistant encryption takes most organizations 5-10 years to complete. The migration timeline means organizations starting now may finish just in time. However, only 23% of enterprises have begun post-quantum readiness assessments according to industry surveys. Meanwhile, the NSA has mandated that national security systems begin transitioning to quantum-resistant algorithms by 2030. In this guide, we break down why post-quantum cryptography demands immediate action and how to begin migration before the quantum threat materializes.

5-15yr
Estimated Timeline to Quantum Threat
23%
Have Begun Post-Quantum Readiness
5-10yr
Typical Encryption Migration Timeline

Why Post-Quantum Cryptography Demands Action Now

Post-quantum cryptography demands action now because the harvest now decrypt later threat makes current encryption vulnerable today, not when quantum computers arrive. Adversaries intercepting encrypted communications store them for future decryption. Consequently, sensitive data transmitted today using RSA or elliptic curve cryptography will be readable once quantum computing matures, regardless of when that maturity occurs.

Furthermore, the migration timeline creates urgency that most organizations underestimate. Cryptographic migration touches every system, protocol, certificate, and key management process across the enterprise. Therefore, organizations that wait for quantum computers to arrive before starting migration will spend years exposed to quantum decryption of data they should have protected earlier.

In addition, NIST standardization removes the wait-and-see justification. Finalized algorithms provide the foundation for migration planning. Organizations no longer need to guess which algorithms will be approved. As a result, the planning phase can begin immediately using standardized algorithms representing global cryptographic consensus. Standardization transforms migration from speculation into a concrete engineering project with defined algorithms and growing vendor support. The uncertainty that justified delay has been resolved. Organizations that waited for standardization no longer have justification for further delay. Standards exist. The only remaining variable is organizational willingness to begin.

The Harvest Now Decrypt Later Threat

Nation-state adversaries intercept and store encrypted data knowing future quantum computers will break current encryption. Data with long confidentiality requirements including trade secrets, classified information, health records, and strategic communications is already at risk. The value of this harvested data does not diminish with time because the secrets it contains remain relevant for years or decades after initial encryption. Every day of delay extends the window during which adversaries can collect data that quantum decryption will eventually expose.

Understanding the Post-Quantum Cryptography Standards

The NIST post-quantum cryptography standards provide the algorithmic foundation for migration planning. Understanding these standards helps organizations design their transition architecture and evaluate vendor compliance. However, standards alone do not guarantee successful migration. Organizations must translate algorithmic specifications into practical implementation plans addressing their specific technology landscapes. Specifically, the standards define what to implement while the migration plan defines how, where, and when to deploy quantum-resistant encryption across systems that differ dramatically in complexity, criticality, and vendor dependency.

ML-KEM (Key Encapsulation)
Previously known as CRYSTALS-Kyber, ML-KEM provides quantum-resistant key exchange for establishing encrypted sessions. It replaces the key exchange mechanisms in TLS and other protocols. Consequently, ML-KEM is the highest-priority standard because key exchange protects data in transit across every network communication.
ML-DSA (Digital Signatures)
Previously CRYSTALS-Dilithium, ML-DSA provides quantum-resistant digital signatures for authentication and integrity verification. It protects software updates, document signing, and identity verification. Furthermore, digital signature migration affects every system that validates authenticity from code signing to certificate authorities.
SLH-DSA (Hash-Based Signatures)
Previously SPHINCS+, SLH-DSA provides an alternative digital signature approach based on hash functions rather than lattice mathematics. It offers mathematical diversity as a backup. Therefore, organizations can implement SLH-DSA alongside ML-DSA for defense-in-depth against potential lattice algorithm vulnerabilities discovered in the future.
Hybrid Approaches
Combining classical and post-quantum algorithms during transition ensures protection against both current and quantum threats. Hybrid implementations maintain backward compatibility while adding quantum resistance. As a result, migration can proceed incrementally without requiring simultaneous updates across all systems and partners.

“Organizations starting migration now may finish just in time.”

— NIST Post-Quantum Migration Guidance

The Post-Quantum Cryptography Migration Challenge

The migration challenge reveals why post-quantum cryptography transitions require years rather than months and why early planning dramatically reduces risk and cost.

Migration PhaseTimelineKey Activities
Discovery6-12 months✓ Inventory all cryptographic assets and dependencies
Assessment3-6 months✓ Prioritize systems by data sensitivity and exposure
Planning6-12 months◐ Design migration architecture with hybrid approach
Implementation2-5 years✓ Deploy quantum-resistant algorithms across systems
ValidationOngoing✓ Test, monitor, and update as standards evolve

Notably, the discovery phase alone takes 6-12 months because most organizations do not know where all their cryptographic dependencies exist. Furthermore, cryptography is embedded in hardware, firmware, protocols, libraries, certificates, and custom code across hundreds of systems. However, organizations that complete discovery first can prioritize migration by data sensitivity, focusing on the highest-value targets that harvest now decrypt later attacks threaten most directly. Specifically, data with long confidentiality requirements should migrate first because it faces the greatest exposure window between current vulnerability and eventual quantum decryption capability.

The Vendor Dependency Challenge

Most organizations rely on vendors for cryptographic implementations in operating systems, databases, networking equipment, and cloud platforms. Migration requires vendor support for post-quantum algorithms in every product across the technology stack. However, vendor timelines vary significantly and unpredictably. Some cloud providers already offer post-quantum TLS options while many enterprise software vendors have not announced migration plans. Organizations must assess vendor readiness and pressure lagging vendors to provide migration timelines.

Procurement decisions should incorporate quantum readiness requirements immediately. Every new technology purchase should support migration rather than extending the legacy encryption footprint.

The cost of quantum-ready procurement is marginal at purchase time. Retrofitting legacy systems after deployment is substantial and grows with every year of legacy accumulation.

Building a Post-Quantum Cryptography Migration Plan

Building the migration plan requires a structured approach balancing urgency with practical reality. Migrating cryptographic infrastructure across the entire technology estate without disrupting operations demands careful sequencing and executive sponsorship. The migration affects every system, partner integration, and customer-facing service that uses encryption. Furthermore, budget allocation must span multiple fiscal years because no organization completes cryptographic migration in a single budget cycle regardless of urgency or resource availability. However, perfection should not delay progress. Starting with high-priority systems while planning broader migration beats comprehensive planning that delays all action. Moreover, the migration plan must account for cryptographic dependencies between systems. Changing encryption on one system may break integrations with systems that expect classical algorithms. Therefore, dependency mapping is essential before any migration begins to prevent cascading failures that undermine operational stability during the transition period.

Migration Best Practices
Starting cryptographic asset discovery immediately
Prioritizing migration by data sensitivity and confidentiality duration
Implementing hybrid classical-quantum approaches during transition
Assessing vendor readiness across the entire technology stack
Migration Anti-Patterns
Waiting for quantum computers to arrive before starting migration
Attempting big-bang migration rather than incremental transition
Ignoring harvest now decrypt later risk for data in transit
Assuming vendor products will migrate automatically without planning

Five Post-Quantum Cryptography Priorities for 2026

Based on the migration landscape, here are five priorities:

  1. Begin cryptographic asset discovery across all systems immediately: Because discovery takes 6-12 months alone, start inventorying where cryptography exists across hardware, software, protocols, and custom code. Consequently, you build the foundation for prioritized migration planning.
  2. Prioritize data with long confidentiality requirements first: Since harvest now decrypt later targets the most durable secrets, identify data that remains sensitive for decades and migrate its protection first. Furthermore, early migration of high-value data reduces the exposure window that adversaries exploit.
  3. Implement hybrid cryptographic approaches during transition: With migration taking years, deploy hybrid classical-quantum encryption that protects against both current and future threats simultaneously. As a result, systems gain quantum resistance before full migration completes.
  4. Assess vendor readiness and demand migration timelines: Because vendor products embed cryptography throughout the stack, evaluate which vendors support post-quantum algorithms and pressure lagging vendors for commitments. Therefore, procurement decisions incorporate quantum readiness requirements.
  5. Build internal cryptographic expertise for the migration: Since post-quantum migration demands specialized knowledge most teams lack, develop or hire cryptographic engineering capability to guide the multi-year transition. In addition, internal expertise ensures migration quality rather than depending entirely on vendor implementations.
Key Takeaway

Post-quantum cryptography migration must start now. Harvest now decrypt later makes current data vulnerable today. NIST standards are finalized. 5-15 year quantum timeline overlaps 5-10 year migration timeline. Only 23% have begun readiness. NSA mandates transition by 2030. Discovery takes 6-12 months. Hybrid approaches bridge the transition. Vendor readiness varies significantly. Data with long confidentiality requirements migrates first.


Looking Ahead: Crypto-Agility as the Enduring Strategy

Post-quantum cryptography migration will reveal a deeper strategic need for crypto-agility: the ability to swap cryptographic algorithms rapidly as threats evolve and new standards emerge. Furthermore, the lesson of the quantum transition is that cryptographic assumptions change and organizations must build infrastructure capable of adapting without multi-year migration projects each time standards evolve.

However, organizations delaying migration will face compressed timelines as quantum advances accelerate.

Compressed timelines force rushed implementations introducing vulnerabilities that planned migration avoids. In contrast, those starting now build crypto-agile infrastructure handling both the quantum transition and future evolutions.

Crypto-agility ensures the organization never faces another decade-long migration. Infrastructure supports algorithm changes as configuration updates rather than multi-year structural overhauls.

This capability transforms future transitions from routine maintenance handled by security teams without executive escalation or emergency budgets. The crypto-agile organization treats algorithm evolution as expected updates rather than generational disruptions.

This foresight eliminates emergency migration projects consuming executive attention when threats materialize faster than predicted. For security leaders, post-quantum cryptography determines whether encryption protects data through the quantum era. The adversaries collecting encrypted data today are patient because quantum computing advancement is certain even if the exact timeline remains uncertain. Every year of delayed migration extends the harvest window that no future encryption can close retroactively. The data is already captured and stored awaiting decryption. The organizations beginning migration now demonstrate the security leadership that protects stakeholder data through the quantum transition. Those delaying will explain to boards and regulators why compromised data was not protected when standards were available years before the quantum threat materialized.

The accountability will trace back to decisions made during the current planning window. Migration was possible but deprioritized in favor of seemingly urgent initiatives.

Related GuideOur Cybersecurity Services: Post-Quantum Migration Strategy


Frequently Asked Questions

Frequently Asked Questions
What is harvest now decrypt later?
Adversaries intercept and store encrypted data today knowing quantum computers will break current encryption in the future. Data with long confidentiality requirements is already at risk because its value persists beyond the expected quantum timeline.
When will quantum computers break encryption?
Experts estimate 5-15 years for cryptographically relevant quantum computers. Migration takes 5-10 years. The timelines overlap, meaning organizations starting now may finish just in time. Waiting guarantees a period of vulnerability.
What are the NIST post-quantum standards?
ML-KEM for key encapsulation replacing current key exchange. ML-DSA for digital signatures replacing RSA and ECDSA. SLH-DSA as a hash-based signature alternative. Finalized August 2024 after years of evaluation by the global cryptographic community.
What is a hybrid cryptographic approach?
Combining classical and post-quantum algorithms during the transition period. Both algorithm types must be broken for the communication to be compromised. Hybrid approaches provide quantum resistance while maintaining backward compatibility during multi-year migration.
Where should organizations start with migration?
Start with cryptographic asset discovery across all systems. Then prioritize by data sensitivity and confidentiality duration. Implement hybrid approaches for highest-priority systems first. Assess vendor readiness across the technology stack. Build or hire cryptographic expertise.

References

  1. NIST Standards, ML-KEM, ML-DSA, SLH-DSA: NIST — Post-Quantum Cryptography Standardization
  2. NSA 2030 Mandate, Migration Timeline, National Security: NSA — CNSA 2.0 Algorithm Guidance
  3. 23% Readiness, Migration Challenges, Enterprise Survey: McKinsey — Is Your Organization Ready for Quantum
Weekly Briefing
Security insights, delivered Tuesdays.

Join 1 million+ security professionals. Practical, vendor-neutral analysis of threats, tools, and architecture decisions.