Download this chapter (PDF)
Rising pressure to prepare for post-quantum cryptography

Once quantum computers reach sufficient scale, traditional cryptographic systems, which are used in digital signatures and secure communications, will be extremely vulnerable to attack.

Many of our current infrastructures lack crypto-agility, which slows transitions to robust cryptographic systems and leaves them exposed to Store Now-Decrypt Later (SNDL) threats. Most organisations are or will be exposed to these decryption threats, and their data (communication) protection readiness hinges on adopting Post-Quantum Cryptography (PQC).

Currently, the US agency NIST has released standards for PQC encryption and is encouraging system administrators to begin transitioning as soon as possible. In addition, European initiatives such as the European Quantum Communication Infrastructure (EuroQCI) seek to build secure communication networks using quantum key distribution (QKD), enabling and accelerating the distribution of cryptographic keys.

Impact

education

Education

  • Post-quantum security breaches are possible due to open IT environments, dependence on third-party cloud providers, and the long retention of confidential data.
  • Identities could be compromised, with the exposure of gradebooks, assessments, or personal info.
  • Archived teaching content, communications, or certification records could be forged or altered.
Research

Research

  • “Store now, decrypt later” is a significant threat to research confidentiality. Data such as genetic records and AI models intercepted today could be decrypted years later, exposing proprietary or sensitive findings.
  • Research partners may hesitate to share data or collaborate if quantum-insecure systems are in use, leading to a breakdown in trust-based collaboration.
  • Universities involved in patentable or commercially relevant research could lose a competitive advantage in the event of intellectual property theft.
  • Failure to secure data may lead to funding body restrictions or non-compliance with ethical and legal requirements.
Operations

Operations

  • The emerging risk of quantum computers eventually breaking today’s encryption algorithms is already prompting “store now, decrypt later” tactics by state-affiliated actors, targeting data with long-term sensitivity. Therefore, key PQC infrastructure must be established. Without early PQC action in terms of policy and infrastructure funding, institutions risk long-term data exposure and eroded trust.
More info about Cybersecurity?
Visit surf.nl
Link SURF icoon