Skip to content

Lab-00: The Quantum Threat

Key Message: Your data is already being recorded. The clock is ticking.

Classical PKI with ECDSA works. So why change?

A classical PKI is structurally correct — but cryptographically fragile in the long term.

Because quantum computers will break everything.


“Our sensitive data is encrypted. Why should I worry about quantum computers that don’t exist yet?”

Q-Day is the day quantum computers become powerful enough to break current cryptography (RSA, ECC, ECDSA, ECDH). Estimates range from 10-15 years, but the exact date is unknown — and irrelevant for data that must stay secret for decades.

Quantum computers will break both encryption and signatures:

Adversaries are recording your encrypted traffic today. When quantum computers arrive, they’ll decrypt it all. This is called Store Now, Decrypt Later (SNDL) — also known as Harvest Now, Decrypt Later (HNDL).

The attack does not require breaking encryption today — only recording traffic.

TODAY FUTURE (5-15 years?)
───── ────────────────────
You Adversary
│ │
│ Encrypted data ──────────────► │ Stored encrypted data
│ (ECDH key exchange) │
│ │
│ ▼
│ Quantum
│ Computer
│ │
│ ▼
│ Decrypted!
│ All your secrets

The exposure window:

TODAY Q-DAY +50 years
(2025) (~2035) (2075)
│ │ │
▼ ▼ ▼
┌────────────────────────────────────────────────────────────────┐
│ ░░░░░░░░░░░░░░░░│▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓│
│ CAPTURED │ EXPOSED │
└────────────────────────────────────────────────────────────────┘
│ │ │
│ │ └─ Data should stay secret until here
│ └─ Q-Day: Quantum decrypts everything
└─ Adversaries recording NOW
░░░ Encrypted but captured (false sense of security)
▓▓▓ EXPOSED for 40 years (until required confidentiality ends)

The harvest attack:

┌─────────────────────────────────────────────────────────────────┐
│ 1. Adversary taps network traffic (undersea cables, ISPs...) │
│ 2. Captures everything: diplomatic exchanges, medical records, │
│ financial transactions, trade secrets │
│ 3. Stores ALL encrypted data — cheap storage, patient waiting │
│ 4. Quantum computer arrives │
│ 5. Adversary decrypts entire archive at once │
│ 6. Medical records, state secrets, financial data — exposed │
└─────────────────────────────────────────────────────────────────┘
The attack requires NO action after quantum arrives.
Everything was already captured. Just decrypt and read.

Solution: ML-KEM (quantum-resistant key exchange)

Signatures you trust today can be forged once quantum computers arrive. This is called Trust Now, Forge Later (TNFL) — also known as Sign Today, Forge Tomorrow (STFT). A forged signature is instant and undetectable — malicious firmware signed with a forged key installs without question.

Forged signatures are indistinguishable from legitimate ones.

TODAY FUTURE (5-15 years?)
───── ────────────────────
Your PKI Attacker
│ │
│ Certificates signed ─────────► │ Captured certificates
│ with ECDSA │ and public keys
│ │
│ ▼
│ Quantum
│ Computer
│ │
│ ▼
│ Forged certificates!
│ Impersonation possible

The forgery attack:

┌─────────────────────────────────────────────────────────────────┐
│ 1. Attacker extracts your PUBLIC key (available in any cert) │
│ 2. Quantum computer derives your PRIVATE key │
│ 3. Attacker signs malware with YOUR key │
│ 4. Malware passes all signature verification ✓ │
│ 5. Systems auto-update with "trusted" malicious code │
└─────────────────────────────────────────────────────────────────┘
Unlike SNDL, forgery is INSTANT once quantum arrives.
No need to capture anything beforehand — just your public key.

Solution: ML-DSA (quantum-resistant signatures)


Data TypeSensitivity LifetimeSNDL Risk
TLS session keys*MinutesLow
Personal health recordsDecadesCritical
Government secrets25-50 yearsCritical
Financial records7-10 yearsHigh
Trade secretsVariableHigh
Military communications50+ yearsCritical

*But what about the content? User actions, exchanged data, and browsing patterns may remain sensitive long after the session ends.

If your data must remain secret for more than 10 years, you’re already late.

Legal, medical, and industrial records outlive the cryptographic algorithms that protect them.


Data Sensitivity LifetimeAction Required
< 5 yearsMonitor, plan migration
5-10 yearsBegin hybrid deployment
10-25 yearsUrgent: Deploy PQC now
> 25 yearsCritical: Should already have PQC

Michele Mosca formalized the urgency of migration:

┌─────────────────────────────────────────────────────────────────┐
│ │
│ If X + Y > Z → ACT NOW │
│ │
│ X = Security shelf-life (how long your data must stay secret) │
│ Y = Time to migrate your systems to post-quantum │
│ Z = Time until quantum computers break current crypto │
│ │
└─────────────────────────────────────────────────────────────────┘

The intuition: If the time your data needs protection (X) plus the time to migrate (Y) exceeds the time until quantum arrives (Z), you’re already late.

X = 50 years (patient records must stay confidential)
Y = 5 years (infrastructure migration time)
Z = 10 years (quantum computer estimate)
X + Y = 55 years
Z = 10 years
55 > 10 → ACT NOW
You need 55 years of protection, but quantum arrives in 10.

Terminal window
./demo.sh

The demo is an interactive Mosca calculator that helps you assess your PQC migration urgency based on your data’s sensitivity lifetime.


NIST finalized 3 post-quantum algorithms (August 2024).

You don’t need to memorize these numbers. The important takeaway is the order of magnitude and the trade-off: larger keys and signatures in exchange for quantum resistance.

AlgorithmStandardFamilyPurposeReplacesProtects Against
ML-KEMFIPS 203Module LatticeKey exchangeECDH, RSA-KEMSNDL
ML-DSAFIPS 204Module LatticeSignaturesECDSA, RSATNFL
SLH-DSAFIPS 205Stateless HashSignatures (conservative)TNFL

Before diving into variants, here’s what changes:

Signatures (protects against TNFL)

ECDSA P-384ML-DSA-65Change
Public Key97 B1,952 B20x larger
Signature96 B3,309 B34x larger
Signing0.9 ms0.7 ms~20% faster
Verification0.3 ms0.15 ms2x faster

Key Exchange (protects against SNDL)

X25519ML-KEM-768Change
Public Key32 B1,184 B37x larger
Ciphertext32 B1,088 B34x larger
Speed~0.05 ms~0.1 ms~2x slower (still sub-ms)

Bottom line: Larger sizes, but signing/verification is faster. The trade-off is worth it for quantum resistance.

For detailed sizes, variants, and benchmarks, see Algorithm Reference.


Major security agencies have published concrete migration timelines:

EU Regulatory Timeline (NIS Cooperation Group)

Section titled “EU Regulatory Timeline (NIS Cooperation Group)”

The European Union has established a coordinated roadmap for PQC adoption:

DeadlineRequirement
End of 2026Complete cryptographic inventory and risk assessment. Begin pilot projects.
End of 2030Migrate all high-risk systems to PQC.
End of 2035Achieve full PQC coverage across all use cases.

What This Means:

  1. Now: Map all cryptographic assets and identify long-term data
  2. 2025-2026: Run hybrid pilots, test compatibility
  3. 2027-2030: Prioritize migration of sensitive systems
  4. Post-2030: Complete transition, phase out classical-only systems

The timeline is aggressive but achievable. Starting your inventory today is the first step.

Use CaseDeadlineAlgorithms
Software/firmware signing2025ML-DSA
Web servers, cloud services2025ML-KEM + ML-DSA
VPNs, network equipment2026ML-KEM
Legacy systems2030Full migration
National security systems2035Complete transition
  • Hybrid mandatory for high-security systems (classical + PQC)
  • ML-KEM and ML-DSA approved for use
  • Transition planning required now
  • PQC readiness assessment required for critical infrastructure
  • Hybrid approach recommended during transition
  • Migration plans must be in place

The message is unanimous: Start now. The transition takes years, and the threat is real.


  1. SNDL is real: Adversaries record encrypted traffic today → ML-KEM protects
  2. TNFL is real: Signatures trusted today can be forged tomorrow → ML-DSA protects
  3. Timing matters: Your data’s sensitivity lifetime determines urgency
  4. NIST standards are ready: ML-KEM (FIPS 203) and ML-DSA (FIPS 204) are finalized


Quick Start | QLAB Home | Next: Full Chain →