Readiness
Securing the quantum era.
Prepare today to safeguard tomorrow.
Quantum computing creates two distinct security imperatives — protecting data against future decryption, and protecting the science and infrastructure that make quantum possible. This page outlines both sides of that challenge and points to the resources that help organizations respond.
The Challenge
Evolving threats and long-term security.
First, encrypted data captured today may be stored and decrypted once quantum computers become powerful enough — a risk known as harvest now, decrypt later.
Second, research, intellectual property, and sensitive innovations in quantum science must be protected against a broad range of adversaries, including state and non-state actors.
Post-Quantum Cryptography
Securing data for the future.
Encryption must evolve to outlast tomorrow's quantum capabilities. Traditional public-key algorithms — such as RSA and ECC — are vulnerable to quantum attacks; replacing them with quantum-resistant alternatives is central to future security.
NSA and partners encourage the adoption of post-quantum cryptography (PQC) — algorithms designed to resist quantum attacks — because they can be deployed on existing systems and have a well-understood risk profile compared to specialized quantum hardware solutions.
What organizations should do now
- Begin developing a quantum readiness roadmap.
- Inventory systems and cryptographic assets.
- Prioritize migration of the most sensitive systems.
- Engage with vendors about their PQC transition plans.
Learn more: NSA Post-Quantum Resources
Protecting Innovation
Counterintelligence and technology protection.
Quantum science must be protected from theft and exploitation. The FBI leads coordinated efforts with interagency partners to safeguard research, development, and commercialization of quantum technologies — including outreach to government labs, private companies, and academic institutions to help identify suspicious activity and counter attempts by foreign intelligence services or malicious actors to steal or exploit sensitive work.
Threats can come in many forms — not only from traditional espionage but through complex economic, academic, and supply-chain influence efforts. Security approaches therefore blend operational vigilance, workforce awareness, and institutional safeguards.
Learn more: FBI Counterintelligence — Protecting Quantum Science and Technology
Practical Actions
A layered, proactive defense.
Whether addressing cryptographic migration or protecting intellectual property, these practices help organizations take measurable steps.
Build a Quantum Readiness Plan
Document current cryptographic use, prioritize assets, and set a migration timeline.
Implement PQC
Adopt and test standardized post-quantum algorithms as they mature, aligned to guidance from NIST and NSA.
Strengthen Counterintelligence Hygiene
Establish policies for suspicious activity reporting, IP handling, third-party risk assessment, and export controls.
Engage with Partners
Public-private collaboration accelerates preparedness across sectors and amplifies early warning capacity.
Resources & References
Preparing today safeguards tomorrow.
Whether your focus is long-term data protection or defending the frontier of technology, there are concrete steps organizations can take now — and authoritative guidance to support them. Start with guidance. Build your roadmap. Engage with partners.
View Resources