The Quantum Threat Landscape
Quantum computing will break the encryption that protects virtually all digital infrastructure. The question is not if — it is when, and whether affected data will still be exposed when it happens.
Shor's Algorithm Breaks RSA and ECC
The Mathematical Foundation of the Threat
Shor's Algorithm, when run on a sufficiently powerful quantum computer, can factor large integers and compute discrete logarithms in polynomial time. This directly breaks the two pillars of modern public-key cryptography:
- RSA — relies on the difficulty of factoring the product of two large primes. Quantum computers reduce this from exponential to polynomial time.
- Elliptic Curve Cryptography (ECC) — relies on the discrete logarithm problem over elliptic curves. Equally vulnerable to Shor's Algorithm.
- Diffie-Hellman Key Exchange — the foundation of secure key negotiation, broken by the same quantum attack vector.
Current estimates suggest a cryptographically relevant quantum computer (CRQC) could emerge within the next 10–15 years. Some intelligence agencies believe the timeline is shorter.
Harvest Now, Decrypt Later
Encrypted Data is Being Collected Today
Nation-state actors and sophisticated threat groups are actively intercepting and storing encrypted network traffic. The strategy is simple and devastating:
- Capture — intercept encrypted data in transit across fiber optic taps, compromised routers, and cloud provider access points.
- Store — warehouse petabytes of encrypted traffic at near-zero marginal cost, indexed by origin and target.
- Wait — hold the data until quantum computing matures enough to break the encryption protecting it.
- Decrypt — retroactively access years of sensitive communications, financial data, intellectual property, and state secrets.
This is not speculative. The NSA, GCHQ, and other agencies have publicly acknowledged the "harvest now, decrypt later" threat model. Data encrypted with RSA-2048 today could be fully readable within the decade.
Long-Lived Data Risk
Data That Outlives Its Encryption
Not all data is created equal. Some categories of data maintain their sensitivity for decades — far beyond the expected lifespan of current cryptographic protections:
- Backups and Archives — disaster recovery snapshots, cold storage archives, and compliance-mandated retention data. Often encrypted once and never re-encrypted.
- System Logs — audit trails, access logs, and operational telemetry contain patterns that reveal infrastructure topology, user behavior, and security posture.
- AI Training Data — model training sets, fine-tuning data, and RLHF feedback loops contain proprietary knowledge, user interactions, and strategic intelligence.
- Context Memory — AI systems with persistent memory accumulate sensitive data over time. This memory becomes a high-value target as it concentrates years of interactions.
Organizations that fail to plan for cryptographic migration will find their most sensitive historical data exposed when quantum decryption becomes feasible.
Key Exposure Amplification
One Compromised Key Unlocks Everything
The quantum threat is not limited to breaking individual ciphertexts. When a private key is compromised, the blast radius extends across every message, session, and transaction that key ever protected:
- TLS Session Keys — without Perfect Forward Secrecy, breaking a server's private key decrypts all past and future sessions.
- Code Signing Keys — a compromised signing key allows forged software updates, supply chain attacks, and trusted-code injection.
- Identity Keys — authentication keys for APIs, service accounts, and machine identities grant lateral movement across entire infrastructures.
- Root Certificate Authorities — compromising a root CA key undermines the entire chain of trust, enabling man-in-the-middle attacks at scale.
This amplification effect means that quantum attacks on key infrastructure have cascading, systemic consequences far beyond any single data breach.
The Threat is Real. The Timeline is Now.
Quantum-resilient architecture needs to be embedded into every layer of modern infrastructure — so data remains secure regardless of when quantum computing arrives.