Cryptography | Quantum Security
Post-Quantum Cryptography:
Preparing for the
Quantum Threat.
Quantum computers will break RSA and ECC - the question is not if, but when. NIST has published three final standards. Attackers are already stockpiling encrypted data today (Harvest Now, Decrypt Later).
Last updated: March 2026 - References: NIST FIPS 203/204/205, BSI TR-02102
- RSA-2048 breakable by quantum computers
- 2.030-2035
- NIST PQC standards published as final
- Aug. 2024
- BSI migration target for KRITIS systems
- By 2027
- FIPS 203, FIPS 204, FIPS 205
- 3 New Standards
Fundamentals
What is Post-Quantum Cryptography?
Post-Quantum Cryptography (PQC) refers to cryptographic algorithms that are resistant to attacks by quantum computers. Concretely: algorithms that remain secure even when a powerful quantum computer uses Shor's algorithm.
Shor's algorithm can solve the mathematical problems underlying RSA and ECC (integer factorisation, discrete logarithm) in polynomial time - something classical computers cannot do. A quantum computer with sufficient stable qubits would break RSA-2048 within hours or a few days.
The good news: symmetric schemes like AES-256 and SHA-256 are barely threatened. Grover's algorithm effectively halves key length - AES-256 remains sufficiently strong with 128-bit security. The urgent migration concerns only asymmetric cryptography: RSA, ECDSA, ECDH, Diffie-Hellman.
Post-Quantum Cryptography at a Glance
- NIST Standards
- FIPS 203, FIPS 204, FIPS 205 (Aug. 2024 final)
- Threatened
- RSA, ECC, ECDH, DH (all asymmetric)
- Remains Secure
- AES-256, SHA-256+ (symmetric)
- BSI Target (DE)
- KRITIS migration by 2027 (TR-02102)
- EU Recommendation
- Migration by 2030 (EU PQC Recommendation)
- Quantum Computer
- RSA-2048 breakable: 2030-2035 (expert consensus)
The threat is already real
"Harvest Now, Decrypt Later": state actors are already collecting encrypted data today. Anyone working with data that requires protection for 10+ years is affected now - not just in 2030.
Current Threat
Harvest Now, Decrypt Later: The Threat of Today
State intelligence services and sophisticated cybercriminals are already massively collecting encrypted data - in anticipation of decrypting it in a few years with quantum computers. Migration must begin before quantum computers become available.
Data Protection Requirements by Sector
Critical - Quantum risk exists today
Critical - Immediate action required
High - Migration planning urgent
High - Note DORA quantum risk
Medium - Medium-term planning sufficient
Who is Already Collecting Data?
- State intelligence agencies (NSA, GCHQ, FSB, MSS)
- State-sponsored APT groups (Lazarus, APT28, APT41)
- Industrial espionage actors (particularly targeting European industry)
- Organised crime with long-term horizons
Which Data is Already at Risk?
- Long-term diplomatic and military communications
- Patents, R&D data, and trade secrets
- Electronic health records and patient data
- Encrypted financial transactions and contract data
NIST FIPS 203/204/205
The New NIST Post-Quantum Standards
Following a 7-year public standardisation process with hundreds of participating cryptographers worldwide, NIST published three final post-quantum standards in August 2024. These are the algorithms your systems need to migrate to.
ML-KEM
Module-Lattice-Based Key-Encapsulation MechanismThe primary standard for quantum-safe key exchange. ML-KEM replaces RSA and Elliptic Curve Diffie-Hellman (ECDH) for encrypting communication channels. Used in TLS 1.3, SSH, and VPN protocols. Hybrid mode (ML-KEM + ECDH) recommended for the transition period.
Cryptography Analysis in PentestingML-DSA
Module-Lattice-Based Digital Signature AlgorithmThe primary standard for quantum-safe digital signatures. ML-DSA replaces ECDSA and RSA-PSS for code signing, certificates (X.509), and authentication. Particularly relevant for PKI infrastructures, software supply chains, and email signing (S/MIME). Smaller than SPHINCS+ and faster than FALCON.
ISMS ConsultingSLH-DSA
Stateless Hash-Based Digital Signature AlgorithmThe conservative backup option for digital signatures. Hash-based schemes are mathematically independent from lattice-based algorithms - if ML-DSA were ever compromised, SLH-DSA provides an independent alternative. Larger signatures than ML-DSA, but maximum security guarantees. Recommended for particularly long-lived signatures.
BSI & ENISA Recommendation: For the transition period, hybrid cryptography is recommended: classical algorithm (e.g. ECDH) combined with PQC algorithm (e.g. ML-KEM). This way, the connection is protected against both classical AND quantum attacks, without relying exclusively on still-young PQC implementations.
Impact
Which Sectors Must Migrate First?
The urgency of PQC migration depends on data protection requirements and regulatory obligations. Critical infrastructure operators, the financial sector, and government agencies face the earliest requirements.
Critical Infrastructure (KRITIS)
Energy, water, transport, healthcare
BSI TR-02102 binding. Long-lived systems and data with 10-20 year protection requirements.
Financial Sector
Banks, exchanges, insurance, payment providers
DORA "Quantum Risks" in guidance documents. Transaction data, long-term financial contracts.
Defence & Government
Military, intelligence agencies, public authorities
BSI mandate. State secrets with protection requirements spanning decades.
Healthcare
Hospitals, electronic health records, pharma
Patient data has 30+ year protection requirements. EHR encryption must be migrated.
Automotive & IoT
Connected cars, OTA updates, vehicle certificates
Vehicles with 15-20 year lifespans need quantum-safe cryptography built in today.
Telecommunications
5G infrastructure, 3GPP standards, backbone
5G protocols use ECC. 3GPP is developing PQC profiles for future standards.
Implementation
PQC Migration Roadmap for Organisations
Full PQC migration takes 3 to 7 years. Those who start today have sufficient time for an orderly transition. Those who wait risk regulatory pressure and short-notice, expensive emergency migrations.
- 1 Phase 1 - Now - 2026
Cryptography Inventory & Risk Analysis
- Complete cryptography inventory: where is RSA, ECC, DH in use?
- Identification of "Harvest Now, Decrypt Later" risks (data protection requirement > 10 years)
- Assessment of data lifetime vs. expected quantum computer availability
- Prioritisation of systems to be migrated by risk and effort
- Crypto-agility assessment: can systems flexibly switch algorithms?
- 2 Phase 2 - By 2027
Hybrid Cryptography & Pilot Projects
- Implementation of hybrid cryptography (classical + PQC combined)
- Pilot projects for critical systems: TLS connections, VPN, PKI
- Procurement of PQC-capable HSMs (Hardware Security Modules)
- Update of cryptography policies in line with BSI TR-02102
- Supplier audits: do critical third-party providers support PQC?
- 3 Phase 3 - By 2030
Full PQC Migration
- Complete migration of all critical systems to FIPS 203/204/205
- PKI migration: upgrade CA hierarchy to ML-DSA/SLH-DSA
- Disable classical algorithms (RSA, ECC) for highly sensitive data
- Documentation and compliance evidence for regulatory authorities
- Continuous monitoring of new quantum computer developments
Consulting Services
How AWARE7 Helps with PQC Migration
From the initial cryptography inventory to validating migrated systems - we accompany your PQC migration with technical depth and regulatory know-how.
Cryptography Inventory & Risk Analysis
Complete identification of all asymmetric algorithms in use, risk classification by data protection requirements, and prioritisation of the migration sequence.
Request Crypto InventoryPenetration Test with Cryptography Analysis
Penetration tests with explicit examination of cryptography in use: weak algorithms, certificate issues, insecure TLS configurations, and missing crypto-agility.
Request PentestISMS & BSI TR-02102 Compliance
Embedding PQC migration in your ISMS. Cryptography policies according to BSI TR-02102, NIS-2-compliant crypto-agility, and evidence for regulatory authorities.
Start ISMS Consulting„Post-quantum cryptography is not a future concern - the Harvest-Now-Decrypt-Later threat is already real. Organisations working with data that requires protection for 10 or more years must act today. We help organisations inventory their cryptography and develop a realistic migration plan.“
Chris Wojzechowski
Cryptography & Security Consulting · AWARE7 GmbH
FAQ
Frequently Asked Questions on Post-Quantum Cryptography
The most important questions about PQC, NIST standards, and the quantum threat - answered with technical depth and practical guidance.
What is Post-Quantum Cryptography and why is it necessary?
When will quantum computers be able to break RSA-2048?
Which NIST PQC standards have been finalised since August 2024?
What does "Harvest Now, Decrypt Later" mean in practice?
Are AES-256 and SHA-256 secure against quantum computers?
What does the BSI require in TR-02102 for post-quantum migration?
What is crypto-agility and why is it important?
What regulatory requirements exist for PQC migration?
How does a PQC cryptography inventory work?
What does a PQC migration cost and how long does it take?
Aus dem Blog
Weiterführende Artikel
Alle ArtikelSchedule a Cryptography Audit
In a free 30-minute conversation, we analyse your current cryptography situation, identify the most urgent migration priorities, and outline a realistic path to post-quantum readiness - with a concrete next step.
Kostenlos · 30 Minuten · Unverbindlich