Knowledge

Harvest now, decrypt later

Source 📝

657: 685: 68:, even though no practical quantum attacks yet exist, as some data stored now may still remain sensitive even decades into the future. As of 2022, the U.S. federal government has proposed a roadmap for organizations to start migrating toward quantum-cryptography-resistant algorithms to mitigate these threats. 60:
algorithms to be broken at some time in the future, making it possible to decrypt any stored material that had been encrypted using those algorithms. However, the improvement in decryption technology need not be due to a quantum-cryptographic advance; any other form of attack capable of enabling
637: 467: 230: 225: 305: 256: 204: 41:, is a surveillance strategy that relies on the acquisition and long-term storage of currently unreadable encrypted data awaiting possible breakthroughs in 114: 722: 148: 140: 298: 756: 516: 447: 89: 171: 746: 291: 766: 632: 587: 390: 751: 715: 627: 261: 65: 45:
technology that would render it readable in the future - a hypothetical date referred to as Y2Q (a reference to
617: 607: 462: 612: 602: 395: 355: 348: 333: 328: 271: 400: 343: 741: 660: 506: 452: 708: 622: 546: 53: 375: 491: 475: 417: 551: 541: 407: 266: 57: 761: 486: 338: 226:"Prepare for a New Cryptographic Standard to Protect Against Future Quantum-Based Threats" 692: 561: 481: 437: 380: 365: 735: 642: 597: 556: 536: 427: 385: 360: 64:
The existence of this strategy has led to concerns about the need to urgently deploy
592: 432: 422: 412: 370: 314: 571: 115:"Half of organizations worry about quantum 'harvest now, decrypt later' attacks" 46: 531: 501: 496: 457: 42: 521: 684: 566: 526: 205:"'Harvest Now, Decrypt Later' Concern Boosts Quantum Security Awareness" 442: 90:"Solving the Quantum Decryption 'Harvest Now, Decrypt Later' Problem" 17: 287: 52:
The most common concern is the prospect of developments in
696: 468:
Cryptographically secure pseudorandom number generator
279: 580: 321: 231:Cybersecurity and Infrastructure Security Agency 716: 299: 8: 257:Communications interception (disambiguation) 723: 709: 306: 292: 284: 280: 179:UK National Quantum Technologies Programme 691:This cryptography-related article is a 77: 7: 681: 679: 198: 196: 172:"Quantum-Safe Secure Communications" 141:"Quantum Computing and Cryptography" 88:Townsend, Kevin (16 February 2022). 83: 81: 149:European Data Protection Supervisor 25: 683: 656: 655: 203:Liu, Nancy (27 September 2022). 61:decryption would be sufficient. 517:Information-theoretic security 1: 695:. You can help Knowledge by 633:Message authentication code 588:Cryptographic hash function 391:Cryptographic hash function 783: 678: 512:Harvest now, decrypt later 56:which would allow current 31:Harvest now, decrypt later 651: 628:Post-quantum cryptography 283: 262:Indiscriminate monitoring 66:post-quantum cryptography 618:Quantum key distribution 608:Authenticated encryption 463:Random number generation 39:retrospective decryption 35:store now, decrypt later 613:Public-key cryptography 603:Symmetric-key algorithm 396:Key derivation function 356:Cryptographic primitive 349:Authentication protocol 334:Outline of cryptography 329:History of cryptography 272:Perfect forward secrecy 401:Secure Hash Algorithms 344:Cryptographic protocol 757:Computer data storage 507:End-to-end encryption 453:Cryptojacking malware 27:Surveillance strategy 747:Espionage techniques 623:Quantum cryptography 547:Trusted timestamping 54:quantum cryptography 376:Cryptographic nonce 121:. 20 September 2022 767:Cryptography stubs 492:Subliminal channel 476:Pseudorandom noise 418:Key (cryptography) 752:Mass surveillance 704: 703: 673: 672: 669: 668: 552:Key-based routing 542:Trapdoor function 408:Digital signature 267:Mass surveillance 58:strong encryption 16:(Redirected from 774: 725: 718: 711: 687: 680: 659: 658: 487:Insecure channel 339:Classical cipher 308: 301: 294: 285: 281: 244: 243: 241: 239: 222: 216: 215: 213: 211: 200: 191: 190: 188: 186: 176: 168: 162: 161: 159: 157: 145: 137: 131: 130: 128: 126: 111: 105: 104: 102: 100: 85: 33:, also known as 21: 782: 781: 777: 776: 775: 773: 772: 771: 732: 731: 730: 729: 676: 674: 665: 647: 576: 317: 312: 277: 253: 248: 247: 237: 235: 224: 223: 219: 209: 207: 202: 201: 194: 184: 182: 174: 170: 169: 165: 155: 153: 143: 139: 138: 134: 124: 122: 113: 112: 108: 98: 96: 87: 86: 79: 74: 28: 23: 22: 15: 12: 11: 5: 780: 778: 770: 769: 764: 759: 754: 749: 744: 734: 733: 728: 727: 720: 713: 705: 702: 701: 688: 671: 670: 667: 666: 664: 663: 652: 649: 648: 646: 645: 640: 638:Random numbers 635: 630: 625: 620: 615: 610: 605: 600: 595: 590: 584: 582: 578: 577: 575: 574: 569: 564: 562:Garlic routing 559: 554: 549: 544: 539: 534: 529: 524: 519: 514: 509: 504: 499: 494: 489: 484: 482:Secure channel 479: 473: 472: 471: 460: 455: 450: 445: 440: 438:Key stretching 435: 430: 425: 420: 415: 410: 405: 404: 403: 398: 393: 383: 381:Cryptovirology 378: 373: 368: 366:Cryptocurrency 363: 358: 353: 352: 351: 341: 336: 331: 325: 323: 319: 318: 313: 311: 310: 303: 296: 288: 275: 274: 269: 264: 259: 252: 249: 246: 245: 217: 192: 181:. October 2021 163: 132: 106: 76: 75: 73: 70: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 779: 768: 765: 763: 760: 758: 755: 753: 750: 748: 745: 743: 740: 739: 737: 726: 721: 719: 714: 712: 707: 706: 700: 698: 694: 689: 686: 682: 677: 662: 654: 653: 650: 644: 643:Steganography 641: 639: 636: 634: 631: 629: 626: 624: 621: 619: 616: 614: 611: 609: 606: 604: 601: 599: 598:Stream cipher 596: 594: 591: 589: 586: 585: 583: 579: 573: 570: 568: 565: 563: 560: 558: 557:Onion routing 555: 553: 550: 548: 545: 543: 540: 538: 537:Shared secret 535: 533: 530: 528: 525: 523: 520: 518: 515: 513: 510: 508: 505: 503: 500: 498: 495: 493: 490: 488: 485: 483: 480: 477: 474: 469: 466: 465: 464: 461: 459: 456: 454: 451: 449: 446: 444: 441: 439: 436: 434: 431: 429: 428:Key generator 426: 424: 421: 419: 416: 414: 411: 409: 406: 402: 399: 397: 394: 392: 389: 388: 387: 386:Hash function 384: 382: 379: 377: 374: 372: 369: 367: 364: 362: 361:Cryptanalysis 359: 357: 354: 350: 347: 346: 345: 342: 340: 337: 335: 332: 330: 327: 326: 324: 320: 316: 309: 304: 302: 297: 295: 290: 289: 286: 282: 278: 273: 270: 268: 265: 263: 260: 258: 255: 254: 250: 234:. 5 July 2022 233: 232: 227: 221: 218: 206: 199: 197: 193: 180: 173: 167: 164: 151: 150: 142: 136: 133: 120: 116: 110: 107: 95: 91: 84: 82: 78: 71: 69: 67: 62: 59: 55: 50: 48: 44: 40: 36: 32: 19: 742:Cryptography 697:expanding it 690: 675: 593:Block cipher 511: 433:Key schedule 423:Key exchange 413:Kleptography 371:Cryptosystem 315:Cryptography 276: 236:. Retrieved 229: 220: 208:. Retrieved 183:. Retrieved 178: 166: 154:. Retrieved 147: 135: 123:. Retrieved 119:SiliconANGLE 118: 109: 97:. Retrieved 94:SecurityWeek 93: 63: 51: 49:) or Q-Day. 38: 34: 30: 29: 581:Mathematics 572:Mix network 736:Categories 532:Ciphertext 502:Decryption 497:Encryption 458:Ransomware 72:References 43:decryption 522:Plaintext 661:Category 567:Kademlia 527:Codetext 470:(CSPRNG) 448:Machines 251:See also 238:10 April 210:10 April 762:Privacy 322:General 185:9 April 156:9 April 125:9 April 99:9 April 443:Keygen 152:. 2020 478:(PRN) 175:(PDF) 144:(PDF) 693:stub 240:2023 212:2023 187:2023 158:2023 127:2023 101:2023 47:Y2K 37:or 18:Y2Q 738:: 228:. 195:^ 177:. 146:. 117:. 92:. 80:^ 724:e 717:t 710:v 699:. 307:e 300:t 293:v 242:. 214:. 189:. 160:. 129:. 103:. 20:)

Index

Y2Q
decryption
Y2K
quantum cryptography
strong encryption
post-quantum cryptography


"Solving the Quantum Decryption 'Harvest Now, Decrypt Later' Problem"
"Half of organizations worry about quantum 'harvest now, decrypt later' attacks"
"Quantum Computing and Cryptography"
European Data Protection Supervisor
"Quantum-Safe Secure Communications"


"'Harvest Now, Decrypt Later' Concern Boosts Quantum Security Awareness"
"Prepare for a New Cryptographic Standard to Protect Against Future Quantum-Based Threats"
Cybersecurity and Infrastructure Security Agency
Communications interception (disambiguation)
Indiscriminate monitoring
Mass surveillance
Perfect forward secrecy
v
t
e
Cryptography
History of cryptography
Outline of cryptography
Classical cipher
Cryptographic protocol

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.