====== 2.2 Risk ======
Risk analysis for the quantum threat and protective measures.
----
===== The Threat: Harvest Now, Decrypt Later =====
**Scenario:**
- Attackers intercept encrypted communication today
- Store the data for years
- Decrypt it with a future quantum computer
**Affected Data:**
* TLS-encrypted connections
* Signed documents and contracts
* Authentication certificates
* Archived business data
----
===== Timeline =====
timeline
title Quantum Migration Timeline
section Now (2024-2025)
NIST FIPS 203/204 final : ML-DSA & ML-KEM standardized
OpenSSL 3.6 : PQ algorithms available
WvdS Library : Hybrid cryptography production-ready
section Transition (2026-2028)
EU NIS2 : Critical infrastructure must act
BSI Recommendation : PQ migration for agencies
Enterprise : Large companies migrate
section Critical (2029-2032)
CRQC possible : Cryptographically relevant quantum computer
Legacy unsafe : RSA/ECDSA broken
Deadline : All systems must be PQ-capable
^ Source ^ Estimate (cryptographically relevant QC) ^
| BSI((BSI: "Quantum-Safe Cryptography - Fundamentals, Current Developments and Recommendations", 2021, Section 4.1: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf)) | 10-20 years |
| NIST((NIST: "Post-Quantum Cryptography FAQ", 2024: https://csrc.nist.gov/projects/post-quantum-cryptography/faqs)) | "Unknown, could come faster" |
| Global Risk Institute((Global Risk Institute: "Quantum Threat Timeline Report", December 2023, pp. 4-5: https://globalriskinstitute.org/publication/quantum-threat-timeline-report-2023/)) | ~14 years to CRQC (median estimate) |
**Critical Point:** Data with protection requirements >10 years is **now** at risk((BSI: "Make cryptography quantum-safe - BSI recommendations for action", September 2024, Section 2.3: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Krypto/Post-Quanten-Kryptografie_Handlungsempfehlungen.pdf)).
----
===== Risk Matrix =====
^ Data Type ^ Protection Requirement ^ Risk without PQ ^
| State secrets | 50+ years((BSI VS-Instruction (VSA): Retention periods for classified materials)) | Critical |
| Health data | 30+ years((MBO Medical Professional Code: Retention requirements for medical documentation)) | Critical |
| Financial contracts | 10-30 years((Commercial Code: Retention periods for commercial and business correspondence)) | High |
| Trade secrets | 5-10 years | Medium |
| Day-to-day operations | <5 years | Low |
----
===== Risk Mitigation =====
**Hybrid cryptography provides:**
^ Aspect ^ Benefit ^
| Future-proofing | PQ signature protects against quantum attacks |
| Backward compatibility | Legacy systems continue to work |
| No risk | Secure if either algorithm is secure |
| Ready immediately | 2 lines of code for activation |
----
===== Cost-Benefit =====
**Implementation Costs:**
* Library integration: Minimal (NuGet package)
* OpenSSL 3.6: Freely available
* Development effort: 2 lines of code + tests
**Costs of Inaction:**
* Data compromise after quantum computer availability
* Regulatory penalties (when standards become mandatory)
* Reputational damage
**Conclusion:** Low investment, high protection value.
----
===== Recommendation for Action =====
**Start now, don't wait.**
Migration to hybrid cryptography takes months to years (depending on system size). When quantum computers become available, it will be too late for data intercepted today.
----
===== Further Reading =====
* [[.:migration-roadmap|Strategy & Technology]] - Implementation plan
* [[en:int:pqcrypt:konzepte:sicherheit|Security]] - Technical details
* [[en:int:pqcrypt:developer:migration|Migration]] - Technical steps
----
//Wolfgang van der Stille @ EMSR DATA d.o.o. - Post-Quantum Cryptography Professional//
{{tag>risk hndl quantum-threat}}