Harvest Now, Decrypt Later: Why Your Encrypted Data Is Already at Risk
Harvest now, decrypt later (HNDL) is a cyberattack strategy in which adversaries intercept and store encrypted data today, waiting for quantum computers to break the encryption and expose the plaintext. Also called "store now, decrypt later," HNDL is not a theoretical future risk. Nation-state actors and advanced persistent threat groups are actively collecting encrypted traffic, backups, and archived communications right now, betting that cryptographically relevant quantum computers will arrive within the next 5 to 15 years. Google announced a 2029 post-quantum cryptography migration deadline on March 25, 2026. For any organization holding data that must stay confidential beyond that window, the threat is already real. Petronella Technology Group, Inc. helps businesses assess their HNDL exposure and build migration roadmaps to quantum-resistant encryption.
Key Takeaways
- Harvest now, decrypt later attacks are active today. Adversaries stockpile encrypted data for future quantum decryption, making long-lived secrets immediately vulnerable.
- Any data that must remain confidential for 5 or more years, including health records, trade secrets, M&A documents, and classified information, falls within the HNDL threat window.
- NIST finalized three post-quantum cryptographic standards (FIPS 203, 204, 205) in August 2024. Google announced a 2029 PQC migration deadline on March 25, 2026.
- NSA CNSA 2.0 mandates quantum-resistant algorithms for all new National Security System acquisitions by January 1, 2027.
- The first step to counter HNDL is a cryptographic inventory: map every use of RSA, ECC, and Diffie-Hellman across your environment, then prioritize by data lifetime.
What Is Harvest Now, Decrypt Later?
The concept is straightforward. RSA, elliptic-curve cryptography (ECC), and Diffie-Hellman key exchange protect virtually all encrypted data in transit and at rest today. These algorithms rely on mathematical problems, specifically integer factorization and discrete logarithms, that classical computers cannot solve in practical time. Quantum computers running Shor's algorithm can solve them efficiently. Once a quantum machine with enough stable, error-corrected qubits exists, every piece of data encrypted with these algorithms becomes readable.
Adversaries understand this timeline. Rather than waiting for quantum computers to arrive and then trying to intercept data, they are collecting encrypted data now. They tap undersea fiber optic cables. They exfiltrate encrypted database backups. They record VPN traffic at network boundaries. They copy encrypted email archives and cloud storage snapshots. The encrypted data sits in storage, sometimes for years, until quantum decryption capability becomes available.
This is not speculation. Intelligence agencies from multiple nations have publicly acknowledged the practice. The U.S. National Security Agency published CNSA 2.0 guidance specifically because HNDL creates a present-tense risk for data with long confidentiality requirements. Google's March 25, 2026 blog post setting a 2029 PQC migration deadline cited HNDL as a primary motivator.
Why HNDL Matters Right Now, Not in 2030
The critical variable in an HNDL attack is not when quantum computers arrive. It is the confidentiality lifetime of the data being targeted.
If the confidentiality window of your data exceeds the estimated time until CRQCs become operational, that data is already at risk. With expert estimates placing CRQC arrival between 2030 and 2040, and Google's internal estimate targeting 2029, any data that must remain confidential past 2030 is in the HNDL threat window today.
This is not just a problem for governments and Fortune 500 companies. Defense contractors handling Controlled Unclassified Information (CUI) under CMMC requirements face immediate exposure. Healthcare organizations subject to HIPAA hold patient records that must remain protected for decades. Law firms, financial institutions, pharmaceutical companies, and manufacturers with long-lived intellectual property are all targets.
Who Is Conducting HNDL Attacks?
HNDL is primarily a nation-state activity because it requires two things most criminal organizations lack: patience and massive storage infrastructure. The payoff comes years from now, which makes it unattractive for financially motivated attackers seeking quick returns. But for intelligence services with long planning horizons and virtually unlimited storage budgets, HNDL is a rational strategy with an asymmetric payoff.
The threat actors most commonly associated with HNDL collection include:
- State intelligence services with access to network infrastructure, undersea cable taps, and ISP-level intercept capabilities. Multiple countries have acknowledged or been documented conducting bulk encrypted traffic collection.
- Advanced persistent threat (APT) groups that exfiltrate encrypted database backups, email archives, and cloud storage during intrusions. Even when responders determine that "only encrypted data was taken," HNDL changes the risk calculation entirely.
- Supply chain compromise operators who position themselves to intercept encrypted communications at chokepoints: CDN providers, managed security services, cloud interconnects, and certificate authorities.
The economics favor the attacker. Storage costs continue to drop. A petabyte of storage, enough to hold years of intercepted encrypted traffic from a mid-size organization, costs under $20,000 today. The cost of quantum decryption, once available, will decrease over time as the technology matures.
What Quantum Computing Changes About Encryption
What breaks: RSA, ECC (ECDSA, ECDH), Diffie-Hellman, and DSA. These algorithms protect TLS/SSL connections, VPN tunnels, SSH sessions, email encryption (S/MIME, PGP), code signing, and certificate-based authentication. Shor's algorithm solves the underlying mathematical problems efficiently on a quantum computer.
What remains secure: Symmetric encryption like AES-256 and hash functions like SHA-384. Grover's algorithm gives a quadratic speedup against symmetric keys, effectively halving their bit strength. AES-256 becomes equivalent to AES-128 against a quantum attacker, which is still computationally secure.
The HNDL threat specifically targets the asymmetric layer. When an adversary records a TLS session, they capture the key exchange (typically ECDHE) and the encrypted data stream. Today, breaking the ECDHE key exchange is infeasible. With a CRQC, it becomes trivial. The session key is recovered, and all data from that session is exposed.
This is why post-quantum cryptography focuses on replacing public-key algorithms. NIST finalized three PQC standards in August 2024:
- ML-KEM (FIPS 203), based on CRYSTALS-Kyber, for key encapsulation (replacing ECDHE and RSA key exchange)
- ML-DSA (FIPS 204), based on CRYSTALS-Dilithium, for digital signatures (replacing ECDSA and RSA signatures)
- SLH-DSA (FIPS 205), based on SPHINCS+, as a hash-based signature alternative for highest-assurance use cases
The Compliance Clock Is Ticking
For defense contractors, the NSA CNSA 2.0 January 2027 deadline is less than nine months away as of March 2026. Organizations in the CMMC ecosystem should expect post-quantum requirements to appear in future assessment criteria. Healthcare organizations should monitor the proposed HIPAA encryption rule expected around May 2026.
How HNDL Changes Your Incident Response Calculus
HNDL fundamentally alters how organizations should assess data breaches. Traditionally, when an adversary exfiltrates encrypted data without obtaining the decryption keys, the breach is considered lower severity. Many organizations have reported breaches with language like "only encrypted data was accessed" to minimize regulatory and reputational impact.
HNDL eliminates that comfort. Encrypted data exfiltrated today may become plaintext tomorrow. This has concrete implications:
- Breach notification timelines may need to account for future quantum decryption risk, not just current decryption capability.
- Data retention policies need revision. Every additional year of encrypted data you retain is another year of HNDL-exposed material if the keys are RSA or ECC-based.
- Cyber insurance policies may begin excluding quantum-related losses or requiring PQC migration as a condition of coverage.
- Third-party risk assessments should evaluate vendor PQC readiness, not just their current encryption strength.
Five Steps to Defend Against HNDL
1. Cryptographic Inventory
Build a CBOM covering every TLS certificate, VPN endpoint, SSH key, code signing cert, KMS/HSM integration, and third-party dependency. Most organizations are surprised by the breadth of their cryptographic footprint. You cannot protect what you have not mapped.
2. Classify by Data Lifetime
Map every encrypted data flow against its required confidentiality window. Data that must remain secret for 5+ years is the priority. Health records, trade secrets, classified info, and legal communications go to the top of the list.
3. Pilot Hybrid Key Exchange
Combine classical X25519 with ML-KEM in TLS handshakes. The connection is secure if either algorithm remains unbroken. Google Chrome, Cloudflare, and AWS already support this in production with negligible latency impact.
4. Protect Data at Rest
Use envelope encryption: wrap DEKs under both a classical KEK and a post-quantum KEK via ML-KEM. The underlying data does not need re-encryption. Prioritize backups, archives, and cold storage with long retention periods.
What Small and Mid-Size Businesses Should Do First
SMBs do not need a multi-year, multi-million-dollar migration program to address HNDL. The first three actions are accessible at any budget level:
- Inventory your encryption. List every TLS certificate, VPN endpoint, and encrypted data store. Identify which use RSA or ECC key exchange. Free tools like SSL Labs and OpenSSL can scan your external endpoints in hours.
- Identify your longest-lived secrets. What data in your environment must stay confidential the longest? Client records, financial data, intellectual property, and employee PII are common candidates. If any of these must remain confidential past 2035, you have HNDL exposure.
- Talk to your IT provider. Ask them specifically about post-quantum cryptography migration planning. If they cannot articulate a roadmap, consider working with a provider that can.
The Cost of Waiting
The SHA-1 to SHA-2 migration, a comparatively simple hash algorithm swap, took the industry over a decade. Post-quantum migration is more complex by an order of magnitude because it affects key exchange, digital signatures, authentication, PKI hierarchies, code signing, and device firmware. Organizations that start now can spread the cost across 3 to 5 budget cycles, pilot incrementally, and avoid the operational risk of a rushed cutover.
Organizations that wait until CRQCs are publicly demonstrated will face a compressed timeline with premium consulting costs, emergency vendor upgrades, and the knowledge that years of their encrypted data is already in adversary hands, waiting to be decrypted. The HNDL clock started years ago. Every month of delay is another month of encrypted communications and backups added to the adversary's stockpile.
Updated March 2026. Compliance timelines current as of publication date.
Frequently Asked Questions About Harvest Now, Decrypt Later
What is a harvest now, decrypt later attack?
Is harvest now, decrypt later actually happening?
What types of data are most vulnerable to HNDL attacks?
Does AES-256 encryption protect against quantum attacks?
What is the difference between HNDL and Q-Day?
How does post-quantum cryptography stop HNDL attacks?
When should my business start preparing for HNDL threats?
Is Your Data Already Being Harvested?
Petronella Technology Group, Inc. helps businesses assess their HNDL exposure and build a migration roadmap to post-quantum encryption standards. Our team holds CMMC-RP and CMMC-CCA credentials with deep expertise in compliance-driven security.
BBB A+ Rated Since 2003 • 24+ Years in Business • 2,500+ Clients Served