TheMurrow

Your Encrypted Data Isn’t “Safe Until Quantum Arrives.” It’s Being Stolen *Because* Quantum Is Coming—And the 2026 Deadline Most Companies Miss Is the Inventory, Not the Math.

Attackers don’t need quantum computers yet—they just need your encrypted data to stay valuable long enough. The real bottleneck is discovering where RSA/ECC hide across apps, PKI, devices, and vendors before your ecosystem’s 2026–2028 clock forces change.

By TheMurrow Editorial
March 23, 2026
Your Encrypted Data Isn’t “Safe Until Quantum Arrives.” It’s Being Stolen *Because* Quantum Is Coming—And the 2026 Deadline Most Companies Miss Is the Inventory, Not the Math.

Key Points

  • 1Assume “harvest now, decrypt later” is already happening: encrypted traffic and databases can be stolen now and decrypted years later.
  • 2Prioritize crypto inventory over algorithm shopping: the toughest work is finding every RSA/ECC dependency across apps, PKI, hardware, and vendors.
  • 3Plan on a 2026–2028 ecosystem clock: vendor roadmaps, procurement pressure, and migration lead times make waiting for certainty expensive.

A decade from now, the most damaging breach your organization suffers may not look like a breach at all. It may look like a quiet copy—an archive of encrypted traffic or a stolen encrypted database—taken today, filed away, and opened later when the locks finally fail.

Security teams tend to picture “Q‑Day” as a single dramatic moment when quantum computers suddenly crack the internet. The more realistic—and more uncomfortable—story is slower. Adversaries don’t need a quantum machine in 2026 to profit from quantum risk in 2036. They only need your data to remain sensitive long enough.

That idea has a name: “harvest now, decrypt later” (HNDL). It’s not a slogan from vendor slide decks; it’s an explicit focus of government analysis. A U.S. Federal Reserve working paper, last updated January 30, 2026 (paper dated September 2025), describes HNDL as a “present and ongoing” threat to data protected by today’s public‑key cryptography, using distributed ledger networks as an illustrative case. Meanwhile, U.S. agencies—including CISA, NSA, and NIST—frame quantum readiness as immediate operational work: inventory your cryptography, pressure your vendors, and build a migration roadmap.

Confidentiality can fail retroactively.

— TheMurrow Editorial

The hard part isn’t choosing a new algorithm. The hard part is finding where the old one is hiding.

The threat that arrives before the quantum computer

The headline risk people remember is straightforward: a sufficiently powerful quantum computer can break widely used public‑key systems such as RSA and elliptic‑curve cryptography (ECC). The quieter risk is that attackers can exploit time itself.

“Harvest now, decrypt later” in plain language

HNDL means adversaries collect encrypted material now—network captures, encrypted backups, encrypted records taken in a breach—then store it until they can decrypt it. The Federal Reserve paper’s framing matters because it shifts the timeline from speculative to managerial: organizations are exposed today if their data will still matter when decryption becomes feasible.

Information with a long confidentiality lifespan

  • national security data
  • long‑lived intellectual property
  • health records and biometric identifiers
  • industrial control details and infrastructure information
  • certain financial records
  • sensitive legal communications

Not every breach is “because quantum is coming.” Many attacks are opportunistic and would happen regardless. HNDL is the incremental reason to steal encrypted data that is likely to remain valuable in 5–15+ years—the wedge that turns today’s “safe enough” encryption into tomorrow’s liability.

Why government guidance treats this as a current risk

CISA/NSA/NIST’s joint “Quantum‑Readiness” resource doesn’t begin with futuristic math. It begins with logistics: create a cryptographic inventory, engage suppliers, understand where quantum‑vulnerable cryptography sits in your stack, and build a roadmap. That sequence is telling. If the problem were purely academic, the first step would be “wait.”

Quantum readiness starts with a spreadsheet, not a breakthrough.

— TheMurrow Editorial

For editorial clarity, readers should separate two claims:

1. Quantum computers don’t have to exist at scale yet for HNDL to be rational.
2. HNDL doesn’t explain every breach—only the portion targeting long-lived secrets.

The result is a present-day prioritization problem: decide which data you can afford to be readable later.

5–15+ years
The typical value horizon that makes “harvest now, decrypt later” rational: steal encrypted data now, decrypt when it becomes feasible later.

What quantum breaks—and what it doesn’t

The public debate about post‑quantum cryptography often blurs different kinds of cryptography into one blob. That confusion leads to overreaction in some areas and complacency in others.

The concentrated risk: public-key cryptography

The UK’s National Cyber Security Centre (NCSC) stresses a key distinction: the existential quantum threat is concentrated in public‑key cryptography, which underpins:

- key exchange / key establishment (for example, RSA key transport, Diffie‑Hellman, ECDH)
- digital signatures (for example, RSA signatures, ECDSA, EdDSA)

These systems power the trust layer of modern computing: TLS handshakes, certificate chains, software updates, device identity, and authentication flows. If those mechanisms become forgeable or decryptable, “secure” channels and “trusted” software can degrade quickly.

Symmetric cryptography is different

By contrast, symmetric cryptography (think AES) is described in PQC preparation guidance as less impacted, with the practical implication that key sizes and parameters matter. That doesn’t mean symmetric crypto is immune to all cryptanalytic progress. It means the immediate “quantum breaks everything” narrative is misleading.

Pragmatically, most organizations will not “replace encryption.” They will replace the public‑key components embedded in protocols and PKI, while validating symmetric settings and operational practices.

The crisis isn’t ‘encryption is dead.’ The crisis is that the internet’s handshake and signature system has an expiration date.

— TheMurrow Editorial

A sober framing helps readers allocate budget. A panic framing helps no one.

The deadline most teams miss: finding your cryptography

Post‑quantum migration discussions often sound like a shopping exercise: pick an algorithm, update a library, ship a patch. Reality is messier. The bottleneck is discovery.

Cryptography is scattered across the enterprise

Most migration time isn’t spent choosing algorithms. It’s spent answering a deceptively simple question: where is cryptography used? The answer is usually “everywhere,” including places teams rarely map:

Where crypto hides

  • application code (custom implementations, libraries)
  • protocols (TLS, SSH, QUIC, VPNs)
  • identity and trust systems (PKI, certificate chains, code-signing)
  • hardware roots of trust (HSMs, TPMs, smartcards, embedded secure elements)
  • vendors and managed services (cloud KMS/HSM, SASE, CDNs, IoT platforms)

CISA/NSA/NIST explicitly emphasize cryptographic inventory and supply-chain engagement because most organizations can’t migrate what they can’t see. Teams also tend to discover “crypto surprises”: old services kept alive for one business partner, firmware that can’t be updated, appliances whose certificate stacks are frozen in time.

Crypto agility: the second-order problem

NIST sharpened the operational framing further in a December 19, 2025 publication on crypto agility: the goal isn’t merely swapping algorithms once. The goal is building systems that can swap again—because standards, guidance, and implementation best practices evolve, and because heterogeneous environments keep old components alive longer than anyone planned.

That insight is easy to underestimate. Organizations that “complete a migration” but hard-code assumptions may end up repeating today’s scramble in a few years, just with different acronyms.
Dec 19, 2025
NIST’s crypto-agility framing: build the ability to change cryptography repeatedly as standards and guidance evolve—not just swap once.

Why 2026 keeps showing up in roadmaps (without becoming a universal law)

No single global authority has set a “2026 inventory deadline” for every company. Pretending otherwise would be misleading. Yet readers keep hearing “2026” because several authoritative roadmaps converge on the mid‑2020s as the point when preparation must become concrete.

Europe: start transitioning by end of 2026

The European Commission’s communication on post‑quantum cryptography says Member States should start transitioning to PQC by the end of 2026. That isn’t a corporate mandate across the private sector, but it signals where public procurement, regulation, and national strategies are leaning. For vendors selling into Europe, those signals quickly become product requirements.

UK: discovery and assessment done by 2028—implying earlier starts

The UK NCSC offers a pragmatic timeline: by 2028, organizations should complete discovery and assessment and create an initial migration plan. It also estimates large organizations may need 2–3 years for discovery, assessment, and planning. Basic arithmetic turns 2028 into a start date that lands in the mid‑2020s.
2–3 years
UK NCSC’s estimate for large organizations to complete discovery, assessment, and planning—making mid‑2020s starts necessary for a 2028 horizon.

U.S. national-security gravity pulls the market

The U.S. NSA’s CNSA 2.0 timelines (referenced through NSA’s post‑quantum cybersecurity resources) exert pressure through acquisition and vendor ecosystems. Even organizations outside government feel it when their suppliers, cloud providers, and device manufacturers adjust roadmaps to meet federal expectations, with milestones clustered around 2026–2027.

The key takeaway for executives is not “your company is legally required to finish by 2026.” It’s “your ecosystem is likely to change on a 2026–2028 clock.” Waiting for perfect certainty is a strategy—and a costly one.

Key takeaway for executives

Not “finish by 2026.” Instead: expect your vendors, procurement constraints, and ecosystem requirements to shift on a 2026–2028 clock.

Case studies in slow-moving risk: ledgers, PKI, and long-lived systems

Quantum preparedness is often discussed as an IT modernization project. In practice, it behaves more like infrastructure renewal: the parts that break are the ones designed to last.

Distributed ledgers as a stress test

The Federal Reserve paper uses distributed ledger networks (with Bitcoin as an illustrative case) to analyze HNDL and post‑quantum risk. The point isn’t that every ledger is about to fail; it’s that the cryptography embedded in long‑lived, widely replicated systems is difficult to change quickly.

Ledgers highlight a broader enterprise truth: systems built for persistence tend to accumulate dependencies. When a signature scheme or key establishment mechanism sits at the base layer, migration becomes governance, coordination, and rollout discipline—not just a technical patch.

PKI and code-signing: the quiet single points of failure

Many organizations focus on TLS certificates and forget the other trust anchors: code-signing, device identity, internal certificate authorities, and update mechanisms. A compromised signing system can turn a routine software update into a delivery channel for malware. A device identity system stuck on legacy crypto can trap fleets of hardware in “secure but un-upgradable” stasis.

These are also the systems least likely to be owned by one team. Security may run policy, IT may run certificates, engineering may run build pipelines, and vendors may run firmware signing. Quantum readiness exposes organizational seams.

A practical plan: what to do in the next 90 days

Readers don’t need another abstract warning. They need a sequence that respects constraints: limited staff, vendor lock-in, and the reality that “crypto” often belongs to nobody.

Start with an inventory you can actually finish

CISA/NSA/NIST put cryptographic inventory first for a reason. Aim for a living artifact, not a one-time audit. A workable first pass answers four questions:

Four questions for a first-pass crypto inventory

  • Where do we use RSA/ECC for key exchange and signatures?
  • Which systems protect data with long confidentiality lifetimes?
  • Which dependencies are vendor-controlled (cloud services, appliances, embedded devices)?
  • Which components are hardest to change (hardware roots of trust, legacy platforms)?

Treat “unknown” as a category worth tracking. Unknown is where risk hides.

Engage vendors early—and in writing

Supply-chain reliance on quantum-vulnerable cryptography is a recurring theme in government guidance. The practical implication: start asking vendors for post‑quantum roadmaps, timelines, and upgrade paths.

Useful vendor questions include:

Vendor questions to ask now

  • Which PQC approaches are planned, and on what timeline?
  • Will updates require hardware replacement (TPMs, secure elements, smartcards)?
  • How will certificate chains and signing infrastructure transition?
  • What is the rollback plan if guidance changes (crypto agility)?

Vendor answers need to be captured and revisited. A migration plan built on hand-waving collapses under procurement scrutiny later.

Build crypto agility into procurement and architecture

NIST’s framing—prepare to swap, then swap again—belongs in both design reviews and contracts. Teams can translate “crypto agility” into concrete requirements: modular crypto libraries, configurable cipher suites, avoidance of hard-coded algorithm assumptions, and clear upgrade mechanisms for devices in the field.

The best time to bake agility in is when systems are being built or bought. Retrofitting it later is where budgets go to die.

Editor's Note

Treat “inventory” as a living artifact: revisit it as vendors update roadmaps, devices age out, and standards guidance changes.

The balanced view: skepticism, realism, and what not to claim

Quantum risk attracts two kinds of bad arguments: the apocalyptic and the dismissive. Both are intellectually lazy.

The skeptical case: “quantum is too far away”

Skeptics note, correctly, that a cryptanalytically relevant quantum computer is not sitting in a criminal gang’s basement. They also note that many breaches involve plain-old credential theft, poor segmentation, and unpatched systems. Quantum doesn’t fix basic cyber hygiene.

Those points matter. Over-indexing on PQC while ignoring present vulnerabilities is how organizations lose twice: now to conventional threats, and later to retroactive exposure.

The realist case: time-to-migrate is the real enemy

The counterargument is operational, not speculative. Migration is slow because:

- cryptography is embedded in long-lived systems
- dependencies are distributed across vendors and business units
- trust systems (PKI, code-signing) require careful coordination
- guidance and standards evolve, creating the need for agility

Government bodies are signaling the same conclusion in different accents. The Federal Reserve paper frames HNDL as ongoing. CISA/NSA/NIST emphasize inventory and roadmaps. NIST emphasizes agility. The UK NCSC sets a discovery-and-assessment horizon of 2028 and estimates 2–3 years for large organizations to complete that early phase. The EU message pushes Member States to begin transitioning by end of 2026.

A reasonable editorial stance follows: the prudent response is not panic, but timelines. Organizations should behave as if the work will take longer than expected—because it usually does.
Jan 30, 2026
A U.S. Federal Reserve working paper update date describing HNDL as a “present and ongoing” threat—shifting the timeline from speculative to managerial.

Conclusion: the story isn’t Q‑Day—it’s the years before it

The most consequential quantum-related decision many organizations will make this year won’t involve quantum at all. It will involve classification: which data must remain confidential long enough that retroactive decryption would be catastrophic?

Once that’s answered, the rest is discipline. Build a cryptographic inventory. Identify the public‑key choke points. Pressure vendors for roadmaps. Design for crypto agility so you can adjust as standards and guidance evolve.

The mistake isn’t failing to predict when quantum computers arrive. The mistake is assuming your encrypted data is safe simply because it is encrypted today.
T
About the Author
TheMurrow Editorial is a writer for TheMurrow covering technology.

Frequently Asked Questions

What does “harvest now, decrypt later” actually mean?

Adversaries can copy encrypted network traffic or steal encrypted datasets now, then store them until decryption becomes feasible later—potentially using quantum computing against today’s public‑key cryptography (RSA/ECC). The risk is retroactive: data that seems protected today may be readable in the future if it remains valuable long enough.

Is this just a problem for governments and intelligence agencies?

No, but the strongest incentive applies to data with long confidentiality lifetimes: health records, biometrics, long-lived IP, sensitive legal communications, industrial control details, and certain financial records. Government guidance matters because it influences vendors and procurement ecosystems that commercial organizations depend on.

What cryptography is most threatened by quantum computers?

The main concern is public‑key cryptography used for key exchange (RSA, Diffie‑Hellman/ECDH) and digital signatures (RSA signatures, ECDSA/EdDSA). The UK NCSC and other guidance emphasize that symmetric cryptography (like AES) is affected differently and is not the core “break everything” story.

Why do agencies keep telling organizations to build a cryptographic inventory?

Because migration fails when organizations don’t know where cryptography is used. CISA/NSA/NIST quantum-readiness guidance highlights inventory, vendor engagement, and supply-chain assessment as immediate steps. Teams typically find cryptography embedded in apps, protocols, PKI, hardware roots of trust, and third-party services.

Is there a real 2026 deadline for companies?

There’s no universal global deadline that applies to every company. But multiple roadmaps create pressure in the mid‑2020s: the EU has urged Member States to start transitioning by the end of 2026, and the UK NCSC timeline expects discovery and assessment completed by 2028, estimating large organizations may need 2–3 years for that early phase—implying work should start well before 2028.

What is “crypto agility,” and why does it matter for PQC?

NIST’s December 19, 2025 guidance frames crypto agility as the ability to change cryptographic algorithms and parameters without rebuilding entire systems. It matters because standards and implementation guidance evolve, and most organizations run long-lived, heterogeneous systems. Agility helps avoid turning each cryptographic transition into a crisis.

More in Technology

You Might Also Like