Quantum Threat Looms: NIST Urges RSA, ECC Retirement by 2035

The Quantum Clock Is Ticking Sixty-three per cent of organisations are concerned about the future encryption compromise posed by quantum computing. And 58% are worried about harvest-now-decrypt-later attacks — adversaries intercepting encrypted data today to decrypt it once quantum capability matures (Thales, 2025 Data Threat Report). NIST has responded. Their 2024 transition guide recommends phasing out RSA and ECC by 2030 and discontinuing them entirely by 2035. That's not a distant horizon. For organisations with long data retention requirements — healthcare, financial services, government, defence — the data they're encrypting today may still be sensitive when quantum decryption becomes viable. Fifty-seven per cent of organisations are prototyping or evaluating post-quantum cryptography algorithms. That's a good start. But fewer than half have assessed their current encryption strategies against the quantum threat. Cryptographic agility — the ability to transition encryption methods without rearchitecting entire systems — needs to be built into infrastructure now. Retrofitting it later will be exponentially more expensive and disruptive. The quantum threat isn't theoretical. The preparation window is practical, finite, and shrinking. https://buff.ly/dl9mJCF #CyberSecurity #QuantumComputing #Encryption #DataSecurity #CyberResilience

  • No alternative text description for this image

the gap isn't technical capability, it's organizational inertia. most orgs know quantum's coming but treat crypto agility like a nice-to-have instead of infrastructure debt. by the time procurement catches up, they'll be retrofitting under pressure instead of migrating on their terms

To view or add a comment, sign in

Explore content categories