Quantum Risk Timeline — When Does Crypto Actually Break?
Signal
Detection: NIST publishes revised PQC migration timeline. Commentary: The “harvest now, decrypt later” threat is now acknowledged at the federal level.
Vector
Definition: Post-quantum cryptographic migration — the multi-year process of replacing vulnerable algorithms before quantum computers can break them. Validation: NIST timeline confirmed. ML-KEM and ML-DSA are the new standards. Direction: Every organization needs a crypto inventory yesterday.
Wrapper
Analogies: This is Y2K for encryption. The deadline is fuzzy but the work is concrete. Cross-domains: theology (faith in systems we can’t verify), engineering (replacing foundations while the building stands), cyber (the attack surface is time itself) Synthesis: The quantum threat isn’t about quantum computers. It’s about the data being harvested today that becomes readable tomorrow.
Yeti Take
Everyone asks “when will quantum break crypto?” Wrong question. The right question is “how much of today’s traffic is being stored for future decryption?” The answer: all of it that matters.
Related
- map[context:Standard timeline reference title:NIST Post-Quantum Cryptography type:external url:https://csrc.nist.gov/projects/post-quantum-cryptography]