The Attack Is Already Happening
Harvest-Now, Decrypt-Later (HNDL) is not a future risk. It is a present one. Nation-state adversaries are intercepting and archiving encrypted traffic today, specifically targeting data whose value will outlast the time it takes to build a sufficiently powerful quantum computer.
The implication is uncomfortable: your migration deadline is not Q-Day. It is right now, for any data that must remain confidential beyond the next 5–15 years. Traffic captured today will sit in cold storage until a cryptographically relevant quantum computer exists. Then it gets decrypted in bulk.
You don't need to finish migrating everything before Q-Day. You need to stop generating harvestable traffic before Q-Day. That's a much earlier deadline — and it applies selectively, based on what you're protecting.
Why "Migrate Everything" Is the Wrong Frame
Most organizations, when they hear "post-quantum migration," imagine a sprawling multi-year project: find every RSA key, every TLS endpoint, every certificate, and replace them. That instinct leads to paralysis. The asset surface is enormous and the urgency feels abstract.
The right frame is not completeness; it's exposure. Not all encrypted data carries the same HNDL risk. A TLS session protecting a public webpage carries near-zero long-term confidentiality value. A session carrying patient records, financial terms, or state secrets is an entirely different exposure profile.
The question to answer for every system is: if this traffic were decrypted in 10 years, what is the damage? That answer determines where you move first.
The Four Migration Tiers
Below is a concrete prioritization framework. Move through these tiers in order. Tier 1 is harvestable now and damaging forever. Tier 4 can wait — the blast radius is bounded and near-term.
Any data whose confidentiality must hold for more than 5–10 years is harvestable today and vulnerable at Q-Day. This includes health records, legal communications, financial agreements, strategic IP, classified or sensitive government data, and long-term personal data under GDPR-class retention.
These are the assets HNDL adversaries specifically target. Sessions using static RSA key exchange are the worst case: the session key is protected only by the server's long-term RSA private key, so every recorded session using that key can be decrypted with a single private key derivation at Q-Day. Sessions using ECDHE are also quantum-vulnerable (Shor's algorithm breaks the elliptic curve discrete log), but each session used a fresh ephemeral key pair, so each requires its own separate quantum computation rather than a single master key recovery. Both warrant migration; RSA key exchange is the more urgent priority within Tier 1.
Root certificate authorities and long-lived signing keys are not a confidentiality risk; they are an integrity risk. This is distinct from HNDL. The threat is not retroactive decryption of recorded traffic; it is that once a cryptographically relevant quantum computer exists, an adversary can derive your CA's private signing key from its public key and forge certificates going forward. There is no "harvest now" phase for CA signing keys, but the "decrypt later" moment (Q-Day) is when the forgery attack becomes possible.
The blast radius is systemic: a quantum adversary who derives your root CA private key can forge any certificate in your hierarchy — creating fraudulent TLS certificates, code-signing certificates, or identity certificates that relying parties accept as legitimate. Existing issued certificates are not retroactively invalidated, but the adversary gains the ability to impersonate any entity your CA vouches for, going forward from Q-Day. Migrating to ML-DSA (Dilithium) signatures for root and intermediate CAs before Q-Day closes this permanently.
Authentication systems that rely on long-lived asymmetric keys have a compounding risk: the public key is observable in traffic or retrievable from public directories, and a quantum adversary who records that material can later derive the private key via Shor's algorithm. This enables impersonation, session hijacking, or unauthorized access — not at the time of capture, but at Q-Day.
SSH host keys are a particular concern: widely deployed, rarely rotated, and their public keys are trivially observable in network traffic. SSH uses the host private key for server authentication, not for encrypting session content. An adversary who collects that public key can derive the host private key at Q-Day and impersonate that server going forward — forging authentication to fool clients into trusting a fake host. Zero-trust architectures that rely on asymmetric device identity are similarly exposed.
General web traffic under TLS (your public website, marketing pages, low-sensitivity API endpoints) carries short-lived session data. Even if harvested and later decrypted, the confidentiality damage is limited: a shopping session from 2026 is not strategically valuable in 2035.
This tier still needs migration before Q-Day, but it is not where HNDL pressure is most acute today. You have time to migrate this tier as part of a normal infrastructure cadence; the urgency is measured in years, not months. The exception: if any of these endpoints carry longer-lived session tokens or authentication data, reclassify them to Tier 3.
The Prioritization Matrix
Use this matrix when triaging your cryptographic asset inventory. Cross-reference confidentiality lifetime against blast radius to place each system in the right tier.
| Asset type | Confidentiality lifetime | Blast radius if broken | HNDL priority |
|---|---|---|---|
| Health / legal / financial records | 10–30+ years | Individual + regulatory | Tier 1 — Now |
| Root & intermediate CAs | N/A: integrity risk, not confidentiality | Entire PKI hierarchy (forward forgery) | Tier 2 — Before Q-Day |
| Code / firmware signing keys | Lifetime of signed artifacts | Supply chain integrity | Tier 2 — Soon |
| SSH host keys | Until rotated (often years) | Server impersonation | Tier 3 — Soon |
| Device attestation / VPN auth | Device lifetime | Network access, identity | Tier 3 — Soon |
| General TLS web traffic | < 1 session (minutes–hours) | Limited, session-scoped | Tier 4 — Plan |
| Ephemeral API tokens | Minutes | Minimal | Tier 4 — Later |
What "Migrating" Actually Means
For Tier 1 (long-lived confidentiality data), migration means deploying hybrid key exchange: running a classical algorithm (ECDH) in parallel with a post-quantum KEM (ML-KEM / Kyber). The session key is derived from both; an adversary must break both algorithms to recover it. This is the approach Chrome, Firefox, and Cloudflare are already deploying in production.
For trust anchors (Tier 2), the migration is about signatures, not key exchange. Root and intermediate CAs don't do key encapsulation; they sign certificates. The migration here means issuing new roots and intermediates using ML-DSA (Dilithium) alongside your existing ECDSA/RSA hierarchy, then planning the trust distribution and transition window before your current roots expire. ML-KEM is not relevant to this tier.
For identity systems (Tier 3), it means auditing which credentials are derived from asymmetric operations, rotating long-lived keys that have been exposed in observable traffic, and moving to PQC-signed attestation for new device enrollments.
Before You Can Migrate: You Need a CBOM
None of this prioritization is possible without knowing what you have. You cannot triage by confidentiality lifetime if you don't know which systems are using RSA key exchange versus ECDHE, which certificates are signed by which roots, or where long-lived credentials are being generated and exposed.
A Cryptographic Bill of Materials (CBOM) is a structured inventory of every cryptographic asset across your infrastructure, and it is the prerequisite. Without it, you're guessing. With it, you can map every asset to a tier and start migrating in priority order.
The QubitAC Scanner produces a CBOM as its output: run it against your TLS endpoints, and it surfaces the key exchange algorithms, certificate chains, protocol versions, and PQC readiness signal for each host. That's the starting inventory your Tier 1 decisions depend on.
The Practical Migration Checklist
- Classify your data by confidentiality lifetime Ask: if this were decrypted in 10 years, what is the damage? Health, legal, financial, and strategic data almost always belongs in Tier 1. This classification drives everything else.
- Run a CBOM scan on Tier 1 systems first Identify which Tier 1 channels are using RSA key transport; these are your maximum HNDL exposure. Any session using static RSA key exchange today is in an adversary's archive.
- Disable RSA key exchange on all Tier 1 endpoints immediately Enforce ECDHE-only cipher suites and disable RSA key transport cipher suites at every TLS termination point: servers, load balancers, and any middleboxes. Legacy stacks may need library upgrades first; audit your full termination inventory before assuming this is a simple change.
-
Deploy hybrid ML-KEM key exchange on Tier 1 TLS
Enable
X25519MLKEM768on servers running OpenSSL 3.x, BoringSSL, or AWS-LC. Clients that support it will negotiate quantum-resistant sessions automatically; others fall back to classical ECDHE. - Audit and rotate long-lived keys that have been observable in traffic SSH host keys, VPN auth keys, and device attestation certificates expose their public keys in observable network traffic. A quantum adversary who captured that material can derive the corresponding private keys at Q-Day, enabling forward impersonation of those hosts and devices. For any keys also used in key encapsulation (not just signing), past captured sessions may also be decryptable. Rotate long-lived keys now and move to shorter rotation cycles going forward.
- Begin the root CA transition planning Issuing ML-DSA root and intermediate certificates takes time; new roots need to be distributed and trusted before old ones expire. Start this process now so the transition window aligns with your existing PKI renewal cycles.
- Treat Tier 4 as a normal infrastructure cadence item Public web traffic doesn't need emergency treatment. Track it in your CBOM, plan the migration into your regular TLS library upgrade cycle, and ensure TLS 1.3 is enforced as a prerequisite.