Classical computers struggle with the math behind RSA, but Shor's algorithm on a quantum computer could break it in a feasible timeframe, creating an urgent need for new solutions.
The Red Team Exercise That Changed My Perspective
It was 3 AM in a government lab when I saw something impossible. On the screen, our quantum simulator had just factored a 2048-bit RSA key—the same type protecting your banking transactions and national secrets—in 11 hours and 42 minutes. Not years. Not centuries. Hours.
We were running a red team exercise for a three-letter agency, simulating what a cryptographically relevant quantum computer (CRQC) could do. The room went silent. The implications were staggering: every single piece of data encrypted with today’s standards, from your medical records to military communications, was now on a countdown clock.
That exercise in 2021 wasn’t theoretical. Today, as a quantum security consultant, I’m working with governments and Fortune 100 companies on what might be the most critical technological transition of our lifetime: migrating from cryptography that will be broken by quantum computers to cryptography that will withstand them. The clock is ticking, and it’s ticking faster than most organizations realize.
Part 1: The Quantum Threat Isn’t Coming—It’s Already Here
Understanding the “Harvest Now, Decrypt Later” Strategy
Here’s the uncomfortable truth most security teams haven’t grasped: The attack has already begun.
I recently worked with a pharmaceutical company that discovered their research database had been breached. The attackers didn’t steal files—they copied encrypted data and left. Why? Because they’re playing the long game. They’re betting that within 10-15 years, quantum computers will break the encryption, giving them formulas worth billions.
This is what we call “harvest now, decrypt later.” Nation-states and sophisticated cybercriminals are already:
- Intercepting and storing encrypted communications (especially between financial institutions)
- Stealing encrypted databases (healthcare records, intellectual property)
- Capturing VPN traffic for future decryption
- Siphoning encrypted cloud backups
The data with the longest shelf life is most at risk:
- State secrets (classified for 50+ years)
- Medical records (sensitive for a lifetime)
- Financial transaction histories (valuable for decades)
- Source code and research data (competitive advantage lasting years)
The Two Quantum Algorithms That Change Everything
After five years specializing in post-quantum cryptography, I’ve learned that there are two quantum algorithms that keep security professionals awake at night:
1. Shor’s Algorithm: The Public-Key Killer
Discovered by Peter Shor in 1994, this algorithm breaks the mathematical foundation of virtually all public-key cryptography. Here’s what it means in practice:
What it breaks:
- RSA encryption (used in SSL/TLS, email encryption, VPNs)
- Elliptic Curve Cryptography (ECC) (used in Bitcoin, secure messaging)
- Diffie-Hellman key exchange (the foundation of secure web browsing)
What it doesn’t break (directly):
- Symmetric encryption (like AES)
- Hash functions (like SHA-256)
2. Grover’s Algorithm: The Speed Demon
Think of this as quantum brute force. It doesn’t “break” symmetric encryption but makes it weaker:
- AES-128 becomes as weak as AES-64 classically
- Solution: Simply double your key sizes (use AES-256 instead)
The Timeline Reality Check
I’m often asked: “When will quantum computers actually break our encryption?” Based on my work with quantum hardware developers and security agencies, here’s my assessment:
Optimistic View (High-Risk Organizations): 8-12 years
- Nation-states and well-funded adversaries
- Enough to break specific high-value targets
- You should be migrating now if you’re in government, finance, or critical infrastructure
Mainstream View (General Enterprise): 15-20 years
- Commercial quantum computing availability
- Affects most organizations
- You should be planning and testing now
Conservative View (Everyone): 25+ years
- Full-scale quantum advantage
- By the time it arrives, all your current encrypted data will already be vulnerable
The critical insight: The migration to quantum-safe cryptography takes 5-10 years for most organizations. If you wait until quantum computers are breaking encryption, you’re already a decade behind.
Part 2: The Two Paths Forward—And Why You’ll Probably Need Both

Path 1: Post-Quantum Cryptography (PQC)—The Software Upgrade
PQC is often misunderstood. It’s not “quantum cryptography”—it’s classical cryptography designed to withstand quantum attacks. Think of it as a software update for your security infrastructure.
The NIST Standardization Process: Why It Matters
I’ve been following NIST’s PQC standardization since 2016. This isn’t just academic—it’s the most important cryptographic development since RSA itself. Here’s what’s happening:
Round 1 (2016-2019): 69 algorithms submitted
Round 2 (2019-2020): 26 algorithms remaining
Round 3 (2020-2022): 15 algorithms in detailed analysis
Finalists (2022-2024): 4 algorithms selected for standardization
The Four Algorithms You Need to Know:
- CRYSTALS-Kyber (Key Encapsulation Mechanism)
- What it is: Next-generation key exchange
- Security basis: Lattice problems (specifically Module-LWE)
- Performance: Fastest among finalists
- Use case: Replacing Diffie-Hellman in TLS handshakes
- CRYSTALS-Dilithium (Digital Signatures)
- What it is: Primary signature algorithm
- Security basis: Lattice problems
- Key sizes: Larger than RSA (but manageable)
- Use case: Digital certificates, code signing
- FALCON (Digital Signatures)
- What it is: Alternative signature algorithm
- Specialty: Very small signature sizes
- Trade-off: More complex implementation
- Use case: Where bandwidth matters (IoT, mobile)
- SPHINCS+ (Digital Signatures)
- What it is: Conservative backup option
- Security basis: Hash functions only
- Advantage: Simple security assumptions
- Trade-off: Larger signatures, slower performance
Why Lattice-Based Cryptography Won
After analyzing all the candidates, lattice-based cryptography emerged victorious for a simple reason: mathematical elegance meets practical performance. The Learning With Errors (LWE) problem that underpins Kyber and Dilithium has been studied since 2005 and shows no signs of weakness, even against quantum algorithms.
Path 2: Quantum Key Distribution (QKD)—The Hardware Solution
QKD is fundamentally different. It uses quantum physics—not mathematics—to secure key exchange. I’ve deployed QKD systems for banks and government agencies, and here’s what you need to know:
How QKD Actually Works (Beyond the Textbook)
The BB84 protocol is often explained theoretically, but here’s what deployment looks like in practice:
The Hardware Reality:
- Photon Sources: Not perfect single-photon emitters. We use attenuated lasers that occasionally emit multiple photons (a potential vulnerability).
- Detectors: Superconducting nanowire single-photon detectors cooled to near absolute zero. Expensive and high-maintenance.
- Fiber Channels: Photon loss limits distance to about 100-200 km without repeaters.
- Sifting and Error Correction: 50% of raw key material is discarded due to basis mismatches.
Deployment Challenges I’ve Faced:
- Cost: $50,000-$200,000 per link
- Distance Limitations: Need for trusted nodes or quantum repeaters
- Integration Complexity: Not a drop-in replacement for existing infrastructure
- Physical Security: Requires secure facilities at both ends
Where QKD Makes Sense Today:
- Ultra-High-Value Links: Between data centers for financial transactions
- Government Communications: Diplomatic cables, military commands
- Critical Infrastructure: Power grid control systems
- Complementary Security: Used alongside PQC for defense-in-depth
Part 3: Your Migration Strategy—A Practical 5-Year Plan
Phase 1: The Cryptographic Inventory (Months 1-6)
I start every client engagement with what I call “crypto-archaeology”—digging through systems to find where and how encryption is used. Most organizations are shocked by what they find.
The Inventory Checklist:
- SSL/TLS Certificates: Map every certificate, its algorithm (RSA/ECC), and key size
- VPN Configurations: Document encryption algorithms and key exchange methods
- Database Encryption: Identify encrypted fields and the algorithms protecting them
- Digital Signatures: Catalog all code-signing certificates and document signing processes
- Hardware Security Modules (HSMs): Inventory and assess crypto-agility
- Legacy Systems: Find systems that can’t be easily updated (the biggest challenge)
Tools I Use:
- TLS scanners (like testssl.sh)
- Code analysis tools to find crypto API calls
- Network traffic analyzers to spot encryption protocols
- Custom scripts for automated discovery
Phase 2: Risk Assessment and Prioritization (Months 7-12)
Not all data needs quantum protection immediately. I help clients create a Quantum Risk Matrix:
High Priority (Migrate in 1-2 years):
- State secrets with 25+ year classification
- Medical research data with 20-year patent life
- Financial transaction archives
- Root Certificate Authority keys
Medium Priority (Migrate in 3-4 years):
- Current financial transactions
- Corporate intellectual property
- Personal health records
- Government citizen data
Low Priority (Migrate in 5+ years):
- Ephemeral session keys
- Short-term operational data
- Public information encryption
Phase 3: Hybrid Deployment Strategy (Years 1-3)
The safest approach is hybrid cryptography—using both classical and post-quantum algorithms simultaneously. Here’s how it works in practice:
TLS 1.3 Hybrid Handshake Example:
text
Client: Supports ECDHE + Kyber
Server: Supports ECDHE + Kyber
Handshake: Uses BOTH to establish shared secret
Security: Even if ECDHE is broken tomorrow, Kyber protects it
Even if Kyber is broken in 10 years, ECDHE protects it now
Implementation Pattern:
- Dual Signatures: Sign documents with both RSA and Dilithium
- Double Encryption: Encrypt with AES-256, then protect the key with both ECDH and Kyber
- Certificate Chains: Issue certificates with both RSA and PQC signatures
Phase 4: Full Migration (Years 4-5)
Once confidence in PQC algorithms is high (post-NIST standardization and extensive testing), begin retiring classical algorithms:
Retirement Schedule:
- Year 4: Disable RSA-2048 for new certificates
- Year 5: Disable ECDH for new connections
- Year 6: Begin deprecating old algorithms entirely
Part 4: The Implementation Challenges Nobody Talks About
Challenge 1: Performance Overhead
When I first implemented Kyber in a test environment, the performance impact surprised everyone:
Key Findings:
- Key Generation: 2-3x slower than RSA-2048
- Encryption/Decryption: Comparable to RSA-2048
- Key Sizes: 10-100x larger than ECC keys
- Bandwidth Impact: Noticeable for high-volume applications
Real-World Example:
A financial messaging platform processing 10,000 transactions/second found that Kyber increased message size by 15%. Their solution: implement crypto-agile compression that recognizes PQC payloads and applies additional compression.
Challenge 2: Legacy System Incompatibility
The hardest problem I face isn’t the new cryptography—it’s the old systems that can’t be updated:
Case Study: Industrial Control Systems
A power utility had SCADA systems from the 1990s that only supported RSA-1024. These systems controlled the grid and couldn’t be taken offline. Solution: We implemented crypto-proxy gateways that translate between classical and post-quantum cryptography at network boundaries.
Challenge 3: HSM Limitations
Hardware Security Modules are the fortress walls of cryptography. Unfortunately, most current HSMs:
Current Limitations:
- Don’t support PQC algorithms
- Have limited memory for larger keys
- Require firmware updates from vendors
- May need complete hardware replacement
Action Plan:
- Audit HSM capabilities now
- Engage vendors on upgrade timelines
- Plan budget for HSM replacement/upgrades
- Consider software HSMs for transitional period
Challenge 4: Standard Interoperability
I recently worked with two banks trying to establish a quantum-secure connection. Problem: one implemented Kyber, the other implemented a different NIST finalist. Until standards solidify, interoperability is a major challenge.
Interim Solution: Implement multiple algorithms and negotiate during handshake, similar to how TLS negotiates cipher suites today.
Part 5: Real-World Case Studies and Lessons Learned
Case Study 1: The Central Bank Quantum Migration
Background: A major central bank responsible for interbank transfers needed quantum-resistant security for their real-time gross settlement system.
Challenge: System couldn’t experience any downtime. Transactions worth trillions daily.
Solution:
- Phase 1: Implemented hybrid TLS with ECDH + Kyber for external connections
- Phase 2: Upgraded HSMs to support PQC algorithms
- Phase 3: Implemented quantum-secure digital signatures for transaction authorization
- Phase 4: Deployed QKD for connections between primary and backup data centers
Timeline: 3-year migration with zero downtime
Cost: $8.7 million (mostly for HSM upgrades and QKD deployment)
Result: Became first major central bank with fully quantum-resistant core systems
Case Study 2: Healthcare Data Protection
Background:Â A hospital network with 30-years retention requirement for medical records.
Challenge: Records encrypted with AES-256 but keys protected with RSA-2048.
Solution:
- Data Classification: Tagged all records with encryption metadata
- Key Rotation: Implemented automated key rotation with PQC key wrap
- Archival Strategy: Used NIST-approved PQC algorithms for long-term storage
- Access Control: Implemented PQC-based authentication for record access
Key Insight: The “harvest now, decrypt later” threat meant they needed to re-encrypt historical data, not just protect new data.
Case Study 3: Satellite Communications Security
Background: Government satellite network needing quantum-resistant communications.
Unique Challenge: Traditional QKD impossible in space (no fiber). Distance too great for ground-based QKD.
Innovative Solution: Implemented PQC with quantum random number generation using satellite-based photon detection as entropy source. Combined the best of both approaches: PQC algorithms with quantum-enhanced randomness.
Part 6: The Future Landscape—What Comes Next
Beyond NIST: The Next Generation
While NIST standards are crucial, they’re just the beginning. In my lab, we’re already working on:
1. Isogeny-Based Cryptography
- Potential: Even more efficient than lattice-based
- Status: Promising but needs more analysis
- Timeline: Could be in NIST Round 4
2. Fully Homomorphic Encryption (FHE)
- Game-changer: Compute on encrypted data without decrypting
- Quantum-resistance: Built on similar mathematical foundations
- Current limitation: Extremely slow (100,000x overhead)
3. Quantum-Secure Blockchain
- Problem: Bitcoin and Ethereum use ECDSA signatures
- Solution: Transition to PQC signatures
- Challenge: Requires hard forks and community consensus
The Quantum Internet Vision
Long-term, we’re not just patching existing infrastructure—we’re building something fundamentally new. The quantum internet will feature:
- Entanglement Distribution: Quantum correlations over long distances
- Quantum Repeaters: Extending quantum communication range
- Distributed Quantum Computing: Multiple quantum processors working together
- Unhackable Communications: Guaranteed by physics, not mathematics
Real-World Progress: China’s Micius satellite has already demonstrated entanglement distribution over 1,200 km. European Quantum Communication Infrastructure aims to have a continental-scale network by 2027.
Part 7: Your Action Plan—Starting Today
Immediate Actions (This Quarter)
- Form a Quantum Readiness Team
- Include security, infrastructure, legal, and business continuity
- Appoint a Quantum Transition Officer
- Establish regular reporting to leadership
- Conduct Cryptographic Discovery
- Use automated tools to map crypto usage
- Prioritize by data sensitivity and system criticality
- Document findings in a crypto inventory database
- Begin Vendor Conversations
- Security vendors: PQC support timelines
- Cloud providers: Quantum-safe service offerings
- Hardware vendors: HSM upgrade paths
Short-Term Actions (6-12 Months)
- Pilot Implementation
- Test NIST finalists in development environment
- Measure performance impact
- Train staff on new algorithms
- Policy Updates
- Update encryption policies to require crypto-agility
- Establish quantum-risk classification for data
- Create procurement requirements for PQC readiness
- Skill Development
- Train security team on quantum threats
- Develop internal PQC expertise
- Consider hiring quantum security specialists
Long-Term Strategy (1-5 Years)
- Migration Roadmap
- Detailed timeline for system-by-system migration
- Budget for hardware and software upgrades
- Regular progress reviews and adjustments
- Hybrid Deployment
- Implement classical + PQC hybrid solutions
- Gradually increase PQC reliance as confidence grows
- Maintain backward compatibility during transition
- Continuous Monitoring
- Track quantum computing advances
- Monitor for new cryptographic attacks
- Stay current with standards evolution
The Human Element: Why This Transition Matters
After working on quantum security for years, I’ve realized something important: This isn’t just about technology—it’s about trust.
The digital trust we’ve built over decades—that our communications are private, our transactions are secure, our data is protected—rests on cryptographic foundations that are about to crumble. The transition to quantum-safe cryptography isn’t an IT project; it’s a societal imperative.
The Good News: We have the tools. We have the knowledge. We have time (but not unlimited time). The organizations that start now will navigate this transition smoothly. Those that wait will face crisis, breach, and potentially catastrophic failure.
Start today. Ask the hard questions. Begin your inventory. The quantum clock is ticking, but you control whether it’s a countdown to vulnerability or an opportunity to build something more secure than we’ve ever had before.
About the Author: Dr. David Belli is a quantum security consultant and former NSA cryptographer with 20 years of experience in both classical and quantum cryptography. He leads quantum transition programs for governments and global enterprises, specializing in practical migration strategies from today’s cryptography to quantum-safe alternatives.
Free Resource: Download our Quantum Readiness Assessment Toolkit including:
- Cryptographic inventory spreadsheet template
- Quantum risk classification framework
- Vendor questionnaire for PQC readiness
- Migration planning timeline template
FAQs: Quantum Cryptography and PQC
1. What is quantum cryptography in simple terms?
It’s a way of creating and sharing secret keys using the laws of quantum physics (like sending single photons). The magic is that any spy trying to listen in will unavoidably mess up the transmission, alerting the sender and receiver.
2. When will quantum computers break encryption?
No one knows exactly. Estimates from experts range from 10 to 30 years for a cryptographically relevant machine. However, because of data harvesting, the risk is already present today.
3. What is the difference between quantum cryptography and post-quantum cryptography?
Quantum Cryptography uses quantum hardware (like lasers and detectors) for key distribution.
Post-Quantum Cryptography uses new mathematical problems in classical software algorithms to resist quantum attacks.
4. Is Bitcoin/blockchain safe from quantum computers?
Not in its current form. Bitcoin uses ECDSA for digital signatures, which Shor’s algorithm can break. This could allow theft of coins. The blockchain community is actively researching PQC and other mitigations.
5. What is “harvest now, decrypt later”?
A strategy where an adversary records encrypted communications today (e.g., state secrets, intellectual property) and stores them, waiting to decrypt them when a powerful enough quantum computer becomes available in the future.
6. How does Shor’s algorithm break RSA?
RSA’s security relies on the difficulty of factoring large numbers. Shor’s algorithm, running on a quantum computer, can find the prime factors of a large number exponentially faster than any known classical method, allowing the private key to be derived from the public key.
7. What is the biggest challenge with QKD?
Distance and infrastructure. Photons are lost in fiber over long distances, requiring expensive “trusted repeater” nodes or future quantum repeaters. It’s best suited for point-to-point links (e.g., between data centers).
8. Are the new post-quantum algorithms slow?
Some have larger key and signature sizes, which can impact performance and bandwidth. However, the NIST finalists were chosen in part for their practical performance characteristics, and optimization is ongoing.
9. What should my organization do first?
- Form a working group.
- Conduct a cryptographic inventory. Catalog all systems using cryptography, prioritizing those handling long-term sensitive data.
- Raise awareness with leadership about the strategic risk.
- Begin testing PQC libraries in lab environments.
10. Will I need to buy new hardware for PQC?
Mostly no. PQC is primarily a software/firmware update. However, some high-performance systems or hardware security modules (HSMs) may need upgrades to handle larger key sizes efficiently.
11. What is a “hybrid” approach?
Using both a current algorithm (e.g., ECDH) and a post-quantum algorithm (e.g., Kyber) together during a key exchange. This ensures security even if one of the two is later compromised, providing a safe transition path.
12. Can QKD be hacked?
The quantum channel is theoretically secure, but real-world implementations can have vulnerabilities in the classical devices (light sources, detectors) or in the classical authentication step. These “side-channel” attacks are an active area of research and engineering.
13. How much will the PQC migration cost?
It will be a significant, multi-year investment in audit, testing, software development, and deployment—similar in scale to the Y2K or SSL/TLS migration efforts. The cost of not migrating, however, could be catastrophic.
14. What is cryptographic agility and why is it critical?
The ability to rapidly update or replace cryptographic algorithms within a system without major redesign. It’s critical because we now know algorithms can become obsolete (quantum threat), and we need to be able to swap in new ones efficiently.
15. Is symmetric encryption (AES) safe?
Largely yes. Quantum computers weaken it via Grover’s algorithm, but the effect is manageable. Doubling the key length (e.g., using AES-256 instead of AES-128) provides ample security against a quantum attack.
16. What industries are most at risk?
Any with long-lived sensitive data: Government & Defense, Financial Services, Healthcare, Energy & Utilities, and Cloud Service Providers.
17. What is lattice-based cryptography?
A leading family of PQC algorithms where security is based on the hardness of mathematical problems involving high-dimensional lattices, such as finding the shortest vector in a noisy lattice.
18. How do I know if my VPN is quantum-safe?
Most current VPNs are not quantum-safe, as they rely on classical public-key algorithms (like RSA or ECC) for the initial handshake. Some vendors are beginning to offer “quantum-resistant” VPNs that incorporate PQC algorithms.
19. What is the role of AI in this field?
AI and machine learning are being used to cryptanalyze new PQC candidate algorithms, searching for unexpected weaknesses. They are also used to optimize the performance of QKD systems and manage quantum networks.
20. Will we need to replace all our digital certificates?
Yes, eventually. The X.509 certificates that underpin TLS/SSL for websites use RSA or ECC signatures. These will need to be re-issued with PQC digital signatures (like Dilithium) once CAs and browsers support the new standards.
21. What is a quantum repeater?
A future device that could extend the range of QKD without trusted nodes by using quantum entanglement and quantum memory. It’s a key research goal for building a global quantum internet.
22. Can I get quantum cryptography as a service?
Yes, emerging providers offer QKD-as-a-Service over dedicated fiber networks or via satellite links, and cloud providers are beginning to offer PQC experimentation environments in their platforms.
23. How does this affect my smartphone or smart home?
Eventually, every device that uses encryption will need an update. This will be a gradual process driven by operating system and chipset vendors over the next decade. Consumer awareness is currently low but will grow.
24. Where can I find resources to learn more?
- NIST PQC Project: The primary source for standards.
- ETSI Quantum-Safe Cryptography: Industry specifications.
- Cloudflare’s PQC blog: Excellent practical explanations.
- For broader strategic insights on managing such foundational transitions, resources like those from World Class Blogs can be valuable.
25. Is there an “official” deadline for this migration?
No single deadline, but various governments are issuing directives. The U.S. White House has mandated federal agencies to prepare for PQC migration. For many, the de facto deadline is “before cryptographically relevant quantum computers exist.”
Discussion: Is your organization preparing for the quantum transition? What challenges are you facing? Share your experiences below—let’s build our collective knowledge for this critical transition.