Preparing for quantum computers and adopting PQC will be difficult and time-consuming. As this overhaul will impact numerous facets of a cryptosystem (i.e. the authentication of users, digital signatures), the process of fully migrating to PQC could take decades. Anything not updated to PQC may become vulnerable as soon as a quantum computer is available. In addition, bad actors could steal encrypted information now and hold onto it until they have the quantum computers to decrypt them, a strategy known as Harvest Now Decrypt Later. Whether it’s patient health record confidentiality, bank account integrity, or battlefield intelligence; bad actors and adversaries will be able to steal, change, or delete information. With so much at stake, organizations will need support to align their migration processes with NIST’s standards for systematically implementing robust PQC algorithms over time.
Anything not updated to PQC may become vulnerable as soon as a CRQC is available. Whether it’s social media accounts, patient health records, bank account passwords, or battlefield intelligence, bad actors and adversaries will be able to steal, change, or delete information. With so much at stake, organizations will need support to align their migration processes with NIST’s standards and systematically implement robust PQC algorithms over time.