Quantum Computing | Post-Quantum Cryptography

Harvest Now, Decrypt Later: Why Your Encrypted Data Is Already at Risk

Harvest now, decrypt later (HNDL) is a cyberattack strategy in which adversaries intercept and store encrypted data today, waiting for quantum computers to break the encryption and expose the plaintext. Also called "store now, decrypt later," HNDL is not a theoretical future risk. Nation-state actors and advanced persistent threat groups are actively collecting encrypted traffic, backups, and archived communications right now, betting that cryptographically relevant quantum computers will arrive within the next 5 to 15 years. Google announced a 2029 post-quantum cryptography migration deadline on March 25, 2026. For any organization holding data that must stay confidential beyond that window, the threat is already real. Petronella Technology Group, Inc. helps businesses assess their HNDL exposure and build migration roadmaps to quantum-resistant encryption.

BBB A+ Rated Since 2003 • 24+ Years in Business • 2,500+ Clients Served

Key Takeaways

  • Harvest now, decrypt later attacks are active today. Adversaries stockpile encrypted data for future quantum decryption, making long-lived secrets immediately vulnerable.
  • Any data that must remain confidential for 5 or more years, including health records, trade secrets, M&A documents, and classified information, falls within the HNDL threat window.
  • NIST finalized three post-quantum cryptographic standards (FIPS 203, 204, 205) in August 2024. Google announced a 2029 PQC migration deadline on March 25, 2026.
  • NSA CNSA 2.0 mandates quantum-resistant algorithms for all new National Security System acquisitions by January 1, 2027.
  • The first step to counter HNDL is a cryptographic inventory: map every use of RSA, ECC, and Diffie-Hellman across your environment, then prioritize by data lifetime.

What Is Harvest Now, Decrypt Later?

The concept is straightforward. RSA, elliptic-curve cryptography (ECC), and Diffie-Hellman key exchange protect virtually all encrypted data in transit and at rest today. These algorithms rely on mathematical problems, specifically integer factorization and discrete logarithms, that classical computers cannot solve in practical time. Quantum computers running Shor's algorithm can solve them efficiently. Once a quantum machine with enough stable, error-corrected qubits exists, every piece of data encrypted with these algorithms becomes readable.

Adversaries understand this timeline. Rather than waiting for quantum computers to arrive and then trying to intercept data, they are collecting encrypted data now. They tap undersea fiber optic cables. They exfiltrate encrypted database backups. They record VPN traffic at network boundaries. They copy encrypted email archives and cloud storage snapshots. The encrypted data sits in storage, sometimes for years, until quantum decryption capability becomes available.

This is not speculation. Intelligence agencies from multiple nations have publicly acknowledged the practice. The U.S. National Security Agency published CNSA 2.0 guidance specifically because HNDL creates a present-tense risk for data with long confidentiality requirements. Google's March 25, 2026 blog post setting a 2029 PQC migration deadline cited HNDL as a primary motivator.

Why HNDL Matters Right Now, Not in 2030

The critical variable in an HNDL attack is not when quantum computers arrive. It is the confidentiality lifetime of the data being targeted.

Data Type
Confidentiality Requirement
At Risk from HNDL Today?
Protected health information (PHI)
50+ years (patient lifetime)
Yes
Trade secrets and IP
10-30 years (competitive advantage)
Yes
M&A documents
5-15 years (deal sensitivity)
Yes
Classified government data
25-75 years (classification period)
Yes
Attorney-client communications
Indefinite (privilege)
Yes
Financial transaction records
7-10 years (regulatory retention)
Likely
Marketing campaign data
1-2 years (campaign cycle)
Low risk

If the confidentiality window of your data exceeds the estimated time until CRQCs become operational, that data is already at risk. With expert estimates placing CRQC arrival between 2030 and 2040, and Google's internal estimate targeting 2029, any data that must remain confidential past 2030 is in the HNDL threat window today.

This is not just a problem for governments and Fortune 500 companies. Defense contractors handling Controlled Unclassified Information (CUI) under CMMC requirements face immediate exposure. Healthcare organizations subject to HIPAA hold patient records that must remain protected for decades. Law firms, financial institutions, pharmaceutical companies, and manufacturers with long-lived intellectual property are all targets.

Who Is Conducting HNDL Attacks?

HNDL is primarily a nation-state activity because it requires two things most criminal organizations lack: patience and massive storage infrastructure. The payoff comes years from now, which makes it unattractive for financially motivated attackers seeking quick returns. But for intelligence services with long planning horizons and virtually unlimited storage budgets, HNDL is a rational strategy with an asymmetric payoff.

The threat actors most commonly associated with HNDL collection include:

  • State intelligence services with access to network infrastructure, undersea cable taps, and ISP-level intercept capabilities. Multiple countries have acknowledged or been documented conducting bulk encrypted traffic collection.
  • Advanced persistent threat (APT) groups that exfiltrate encrypted database backups, email archives, and cloud storage during intrusions. Even when responders determine that "only encrypted data was taken," HNDL changes the risk calculation entirely.
  • Supply chain compromise operators who position themselves to intercept encrypted communications at chokepoints: CDN providers, managed security services, cloud interconnects, and certificate authorities.

The economics favor the attacker. Storage costs continue to drop. A petabyte of storage, enough to hold years of intercepted encrypted traffic from a mid-size organization, costs under $20,000 today. The cost of quantum decryption, once available, will decrease over time as the technology matures.

What Quantum Computing Changes About Encryption

What breaks: RSA, ECC (ECDSA, ECDH), Diffie-Hellman, and DSA. These algorithms protect TLS/SSL connections, VPN tunnels, SSH sessions, email encryption (S/MIME, PGP), code signing, and certificate-based authentication. Shor's algorithm solves the underlying mathematical problems efficiently on a quantum computer.

What remains secure: Symmetric encryption like AES-256 and hash functions like SHA-384. Grover's algorithm gives a quadratic speedup against symmetric keys, effectively halving their bit strength. AES-256 becomes equivalent to AES-128 against a quantum attacker, which is still computationally secure.

The HNDL threat specifically targets the asymmetric layer. When an adversary records a TLS session, they capture the key exchange (typically ECDHE) and the encrypted data stream. Today, breaking the ECDHE key exchange is infeasible. With a CRQC, it becomes trivial. The session key is recovered, and all data from that session is exposed.

This is why post-quantum cryptography focuses on replacing public-key algorithms. NIST finalized three PQC standards in August 2024:

  • ML-KEM (FIPS 203), based on CRYSTALS-Kyber, for key encapsulation (replacing ECDHE and RSA key exchange)
  • ML-DSA (FIPS 204), based on CRYSTALS-Dilithium, for digital signatures (replacing ECDSA and RSA signatures)
  • SLH-DSA (FIPS 205), based on SPHINCS+, as a hash-based signature alternative for highest-assurance use cases

The Compliance Clock Is Ticking

Framework
Key Date
Requirement
NIST FIPS 203/204/205
August 2024
PQC algorithm standards published and available for adoption
NIST CSWP 39
December 2025
Crypto agility guidance for PQC migration published
PCI DSS 4.0
March 2025
Mandatory cryptographic inventory and migration planning
Google PQC timeline
March 25, 2026
2029 PQC migration deadline announced
CISA CMVP
September 21, 2026
Cryptographic module transition deadline
NSA CNSA 2.0
January 1, 2027
All new NSS acquisitions must be quantum-resistant
G7 Financial Sector
2030-2032
Critical financial systems must be quantum-safe

For defense contractors, the NSA CNSA 2.0 January 2027 deadline is less than nine months away as of March 2026. Organizations in the CMMC ecosystem should expect post-quantum requirements to appear in future assessment criteria. Healthcare organizations should monitor the proposed HIPAA encryption rule expected around May 2026.

How HNDL Changes Your Incident Response Calculus

HNDL fundamentally alters how organizations should assess data breaches. Traditionally, when an adversary exfiltrates encrypted data without obtaining the decryption keys, the breach is considered lower severity. Many organizations have reported breaches with language like "only encrypted data was accessed" to minimize regulatory and reputational impact.

HNDL eliminates that comfort. Encrypted data exfiltrated today may become plaintext tomorrow. This has concrete implications:

  • Breach notification timelines may need to account for future quantum decryption risk, not just current decryption capability.
  • Data retention policies need revision. Every additional year of encrypted data you retain is another year of HNDL-exposed material if the keys are RSA or ECC-based.
  • Cyber insurance policies may begin excluding quantum-related losses or requiring PQC migration as a condition of coverage.
  • Third-party risk assessments should evaluate vendor PQC readiness, not just their current encryption strength.

Five Steps to Defend Against HNDL

1. Cryptographic Inventory

Build a CBOM covering every TLS certificate, VPN endpoint, SSH key, code signing cert, KMS/HSM integration, and third-party dependency. Most organizations are surprised by the breadth of their cryptographic footprint. You cannot protect what you have not mapped.

2. Classify by Data Lifetime

Map every encrypted data flow against its required confidentiality window. Data that must remain secret for 5+ years is the priority. Health records, trade secrets, classified info, and legal communications go to the top of the list.

3. Pilot Hybrid Key Exchange

Combine classical X25519 with ML-KEM in TLS handshakes. The connection is secure if either algorithm remains unbroken. Google Chrome, Cloudflare, and AWS already support this in production with negligible latency impact.

4. Protect Data at Rest

Use envelope encryption: wrap DEKs under both a classical KEK and a post-quantum KEK via ML-KEM. The underlying data does not need re-encryption. Prioritize backups, archives, and cold storage with long retention periods.

What Small and Mid-Size Businesses Should Do First

SMBs do not need a multi-year, multi-million-dollar migration program to address HNDL. The first three actions are accessible at any budget level:

  1. Inventory your encryption. List every TLS certificate, VPN endpoint, and encrypted data store. Identify which use RSA or ECC key exchange. Free tools like SSL Labs and OpenSSL can scan your external endpoints in hours.
  2. Identify your longest-lived secrets. What data in your environment must stay confidential the longest? Client records, financial data, intellectual property, and employee PII are common candidates. If any of these must remain confidential past 2035, you have HNDL exposure.
  3. Talk to your IT provider. Ask them specifically about post-quantum cryptography migration planning. If they cannot articulate a roadmap, consider working with a provider that can.

The Cost of Waiting

The SHA-1 to SHA-2 migration, a comparatively simple hash algorithm swap, took the industry over a decade. Post-quantum migration is more complex by an order of magnitude because it affects key exchange, digital signatures, authentication, PKI hierarchies, code signing, and device firmware. Organizations that start now can spread the cost across 3 to 5 budget cycles, pilot incrementally, and avoid the operational risk of a rushed cutover.

Organizations that wait until CRQCs are publicly demonstrated will face a compressed timeline with premium consulting costs, emergency vendor upgrades, and the knowledge that years of their encrypted data is already in adversary hands, waiting to be decrypted. The HNDL clock started years ago. Every month of delay is another month of encrypted communications and backups added to the adversary's stockpile.

Updated March 2026. Compliance timelines current as of publication date.

Frequently Asked Questions About Harvest Now, Decrypt Later

What is a harvest now, decrypt later attack?
Harvest now, decrypt later (HNDL), also called store now, decrypt later, is a cyberattack strategy in which adversaries intercept and store encrypted data today with the intention of decrypting it once quantum computers can break RSA and ECC encryption. Nation-state actors are the primary practitioners because HNDL requires patience and significant storage infrastructure for a payoff that may be years away.
Is harvest now, decrypt later actually happening?
Yes. Multiple intelligence agencies and cybersecurity organizations have confirmed that HNDL collection is underway. The NSA published CNSA 2.0 guidance specifically because of the HNDL threat to long-lived classified data. Google cited HNDL as a primary motivator in its March 25, 2026 announcement of a 2029 post-quantum cryptography migration deadline.
What types of data are most vulnerable to HNDL attacks?
Data with long confidentiality requirements is most vulnerable: protected health information (50+ years), trade secrets (10-30 years), classified government data (25-75 years), attorney-client communications (indefinite), M&A documents (5-15 years), and financial records (7-10 years). If the data must remain confidential past the estimated arrival of quantum decryption capability (2030-2040), it is already at risk.
Does AES-256 encryption protect against quantum attacks?
AES-256 symmetric encryption remains quantum-resistant. Grover's algorithm halves its effective security to approximately AES-128 equivalent, which is still computationally infeasible to break. The quantum threat targets asymmetric algorithms (RSA, ECC, Diffie-Hellman) used for key exchange and digital signatures. However, if the symmetric key was exchanged using a vulnerable asymmetric algorithm, the entire session can be compromised.
What is the difference between HNDL and Q-Day?
Q-Day (also called Y2Q) is the projected date when quantum computers become powerful enough to break RSA and ECC encryption. Harvest now, decrypt later is the attack strategy that exploits the gap between today and Q-Day: adversaries collect encrypted data now and wait for Q-Day to decrypt it. HNDL is the present-tense threat; Q-Day is the future event that makes the collected data readable.
How does post-quantum cryptography stop HNDL attacks?
Post-quantum cryptography uses algorithms based on mathematical problems that resist both classical and quantum attacks. By replacing RSA and ECC key exchange with ML-KEM (FIPS 203) and signatures with ML-DSA (FIPS 204), new encrypted sessions cannot be broken by future quantum computers. However, PQC cannot retroactively protect data already intercepted under classical encryption. This is why migration must start before Q-Day, not after.
When should my business start preparing for HNDL threats?
Now. NIST finalized PQC standards in August 2024. NSA CNSA 2.0 requires PQC for new National Security System acquisitions by January 2027. Google set a 2029 migration deadline in March 2026. The SHA-1 to SHA-2 migration took over a decade, and PQC migration is significantly more complex. Start with a cryptographic inventory and data classification exercise; these are valuable regardless of your migration timeline.
Craig Petronella
CEO, Petronella Technology Group, Inc.
Craig Petronella is a CMMC Registered Practitioner (CMMC-RP), Certified CMMC Assessor (CMMC-CCA), Licensed Digital Forensic Examiner, and author of 15 published books on cybersecurity and technology. With over 24 years of experience protecting businesses from evolving threats, Craig advises organizations on post-quantum cryptography readiness, harvest-now-decrypt-later mitigation, and compliance-driven security programs.

Is Your Data Already Being Harvested?

Petronella Technology Group, Inc. helps businesses assess their HNDL exposure and build a migration roadmap to post-quantum encryption standards. Our team holds CMMC-RP and CMMC-CCA credentials with deep expertise in compliance-driven security.

BBB A+ Rated Since 2003 • 24+ Years in Business • 2,500+ Clients Served