
Securing theQuantumera
The Challenge: Evolving Threats and Long-Term Security
Quantum computing creates two distinct security imperatives.
First, encrypted data captured today may be stored and decrypted once quantum computers become powerful enough — a risk known as harvest now, decrypt later. Second, research, intellectual property, and sensitive innovations in quantum science must be protected against a broad range of adversaries, including state and non-state actors.
This page outlines both sides of that challenge and points to resources to help organizations respond.
Post-Quantum Cryptography: Securing Data for the Future
Encryption must evolve to outlast tomorrow's quantum capabilities.
Traditional public-key algorithms — such as RSA and ECC — are vulnerable to quantum attacks; replacing them with quantum-resistant alternatives is central to future security.
NSA and partners encourage the adoption of post-quantum cryptography (PQC) — algorithms designed to resist quantum attacks — because they can be deployed on existing systems and have a well-understood risk profile compared to specialized quantum hardware solutions.
What organizations should do now:
- •Begin developing a quantum readiness roadmap.
- •Inventory systems and cryptographic assets.
- •Prioritize migration of the most sensitive systems.
- •Engage with vendors about their PQC transition plans.
Learn more: NSA Post-Quantum Resources
Protecting Innovation: Counterintelligence and Technology Protection
Quantum science must be protected from theft and exploitation.
The FBI leads coordinated efforts with interagency partners to safeguard research, development, and commercialization of quantum technologies. This includes outreach to government labs, private companies, and academic institutions to help identify suspicious activity and counter attempts by foreign intelligence services or malicious actors to steal or exploit sensitive work.
Threats can come in many forms — not only from traditional espionage but through complex economic, academic, and supply-chain influence efforts. Security approaches therefore blend operational vigilance, workforce awareness, and institutional safeguards.
Practical Actions and Best Practices
A layered, proactive defense strengthens resilience across domains.
Whether addressing cryptographic migration or protecting intellectual property, these practices help organizations take measurable steps:
Build a Quantum Readiness Plan
Document current cryptographic use, prioritize assets, and set a migration timeline.
Implement PQC
Adopt and test standardized post-quantum algorithms as they mature, aligned to guidance from NIST and NSA.
Strengthen Counterintelligence Hygiene
Establish policies for suspicious activity reporting, IP handling, third-party risk assessment, and export controls.
Engage with Partners
Public-private collaboration accelerates preparedness across sectors and amplifies early warning capacity.
Preparing today safeguards tomorrow's infrastructure and innovation.
Whether your focus is long-term data protection or defending the frontier of technology, there are concrete steps organizations can take now — and resources to support them.
Start with guidance. Build your roadmap. Engage with partners.