Inhaltsverzeichnis
2.2 Risk
Risk analysis for the quantum threat and protective measures.
The Threat: Harvest Now, Decrypt Later
Scenario:
- Attackers intercept encrypted communication today
- Store the data for years
- Decrypt it with a future quantum computer
Affected Data:
- TLS-encrypted connections
- Signed documents and contracts
- Authentication certificates
- Archived business data
Timeline
timeline
title Quantum Migration Timeline
section Now (2024-2025)
NIST FIPS 203/204 final : ML-DSA & ML-KEM standardized
OpenSSL 3.6 : PQ algorithms available
WvdS Library : Hybrid cryptography production-ready
section Transition (2026-2028)
EU NIS2 : Critical infrastructure must act
BSI Recommendation : PQ migration for agencies
Enterprise : Large companies migrate
section Critical (2029-2032)
CRQC possible : Cryptographically relevant quantum computer
Legacy unsafe : RSA/ECDSA broken
Deadline : All systems must be PQ-capable
| Source | Estimate (cryptographically relevant QC) |
|---|---|
| BSI1) | 10-20 years |
| NIST2) | „Unknown, could come faster“ |
| Global Risk Institute3) | ~14 years to CRQC (median estimate) |
Critical Point: Data with protection requirements >10 years is now at risk4).
Risk Matrix
| Data Type | Protection Requirement | Risk without PQ |
|---|---|---|
| State secrets | 50+ years5) | Critical |
| Health data | 30+ years6) | Critical |
| Financial contracts | 10-30 years7) | High |
| Trade secrets | 5-10 years | Medium |
| Day-to-day operations | <5 years | Low |
Risk Mitigation
Hybrid cryptography provides:
| Aspect | Benefit |
|---|---|
| Future-proofing | PQ signature protects against quantum attacks |
| Backward compatibility | Legacy systems continue to work |
| No risk | Secure if either algorithm is secure |
| Ready immediately | 2 lines of code for activation |
Cost-Benefit
Implementation Costs:
- Library integration: Minimal (NuGet package)
- OpenSSL 3.6: Freely available
- Development effort: 2 lines of code + tests
Costs of Inaction:
- Data compromise after quantum computer availability
- Regulatory penalties (when standards become mandatory)
- Reputational damage
Conclusion: Low investment, high protection value.
Recommendation for Action
Start now, don't wait.
Migration to hybrid cryptography takes months to years (depending on system size). When quantum computers become available, it will be too late for data intercepted today.
Further Reading
- Strategy & Technology - Implementation plan
- Security - Technical details
- Migration - Technical steps
Wolfgang van der Stille @ EMSR DATA d.o.o. - Post-Quantum Cryptography Professional
1)
BSI: „Quantum-Safe Cryptography - Fundamentals, Current Developments and Recommendations“, 2021, Section 4.1: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptography.pdf
2)
NIST: „Post-Quantum Cryptography FAQ“, 2024: https://csrc.nist.gov/projects/post-quantum-cryptography/faqs
3)
Global Risk Institute: „Quantum Threat Timeline Report“, December 2023, pp. 4-5: https://globalriskinstitute.org/publication/quantum-threat-timeline-report-2023/
4)
BSI: „Make cryptography quantum-safe - BSI recommendations for action“, September 2024, Section 2.3: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Krypto/Post-Quanten-Kryptografie_Handlungsempfehlungen.pdf
5)
BSI VS-Instruction (VSA): Retention periods for classified materials
6)
MBO Medical Professional Code: Retention requirements for medical documentation
7)
Commercial Code: Retention periods for commercial and business correspondence
Zuletzt geändert: on 2026/01/29 at 11:27 PM