657:
685:
68:, even though no practical quantum attacks yet exist, as some data stored now may still remain sensitive even decades into the future. As of 2022, the U.S. federal government has proposed a roadmap for organizations to start migrating toward quantum-cryptography-resistant algorithms to mitigate these threats.
60:
algorithms to be broken at some time in the future, making it possible to decrypt any stored material that had been encrypted using those algorithms. However, the improvement in decryption technology need not be due to a quantum-cryptographic advance; any other form of attack capable of enabling
637:
467:
230:
225:
305:
256:
204:
41:, is a surveillance strategy that relies on the acquisition and long-term storage of currently unreadable encrypted data awaiting possible breakthroughs in
114:
722:
148:
140:
298:
756:
516:
447:
89:
171:
746:
291:
766:
632:
587:
390:
751:
715:
627:
261:
65:
45:
technology that would render it readable in the future - a hypothetical date referred to as Y2Q (a reference to
617:
607:
462:
612:
602:
395:
355:
348:
333:
328:
271:
400:
343:
741:
660:
506:
452:
708:
622:
546:
53:
375:
491:
475:
417:
551:
541:
407:
266:
57:
761:
486:
338:
226:"Prepare for a New Cryptographic Standard to Protect Against Future Quantum-Based Threats"
692:
561:
481:
437:
380:
365:
735:
642:
597:
556:
536:
427:
385:
360:
64:
The existence of this strategy has led to concerns about the need to urgently deploy
592:
432:
422:
412:
370:
314:
571:
115:"Half of organizations worry about quantum 'harvest now, decrypt later' attacks"
46:
531:
501:
496:
457:
42:
521:
684:
566:
526:
205:"'Harvest Now, Decrypt Later' Concern Boosts Quantum Security Awareness"
442:
90:"Solving the Quantum Decryption 'Harvest Now, Decrypt Later' Problem"
17:
287:
52:
The most common concern is the prospect of developments in
696:
468:
Cryptographically secure pseudorandom number generator
279:
580:
321:
231:Cybersecurity and Infrastructure Security Agency
716:
299:
8:
257:Communications interception (disambiguation)
723:
709:
306:
292:
284:
280:
179:UK National Quantum Technologies Programme
691:This cryptography-related article is a
77:
7:
681:
679:
198:
196:
172:"Quantum-Safe Secure Communications"
141:"Quantum Computing and Cryptography"
88:Townsend, Kevin (16 February 2022).
83:
81:
149:European Data Protection Supervisor
25:
683:
656:
655:
203:Liu, Nancy (27 September 2022).
61:decryption would be sufficient.
517:Information-theoretic security
1:
695:. You can help Knowledge by
633:Message authentication code
588:Cryptographic hash function
391:Cryptographic hash function
783:
678:
512:Harvest now, decrypt later
56:which would allow current
31:Harvest now, decrypt later
651:
628:Post-quantum cryptography
283:
262:Indiscriminate monitoring
66:post-quantum cryptography
618:Quantum key distribution
608:Authenticated encryption
463:Random number generation
39:retrospective decryption
35:store now, decrypt later
613:Public-key cryptography
603:Symmetric-key algorithm
396:Key derivation function
356:Cryptographic primitive
349:Authentication protocol
334:Outline of cryptography
329:History of cryptography
272:Perfect forward secrecy
401:Secure Hash Algorithms
344:Cryptographic protocol
757:Computer data storage
507:End-to-end encryption
453:Cryptojacking malware
27:Surveillance strategy
747:Espionage techniques
623:Quantum cryptography
547:Trusted timestamping
54:quantum cryptography
376:Cryptographic nonce
121:. 20 September 2022
767:Cryptography stubs
492:Subliminal channel
476:Pseudorandom noise
418:Key (cryptography)
752:Mass surveillance
704:
703:
673:
672:
669:
668:
552:Key-based routing
542:Trapdoor function
408:Digital signature
267:Mass surveillance
58:strong encryption
16:(Redirected from
774:
725:
718:
711:
687:
680:
659:
658:
487:Insecure channel
339:Classical cipher
308:
301:
294:
285:
281:
244:
243:
241:
239:
222:
216:
215:
213:
211:
200:
191:
190:
188:
186:
176:
168:
162:
161:
159:
157:
145:
137:
131:
130:
128:
126:
111:
105:
104:
102:
100:
85:
33:, also known as
21:
782:
781:
777:
776:
775:
773:
772:
771:
732:
731:
730:
729:
676:
674:
665:
647:
576:
317:
312:
277:
253:
248:
247:
237:
235:
224:
223:
219:
209:
207:
202:
201:
194:
184:
182:
174:
170:
169:
165:
155:
153:
143:
139:
138:
134:
124:
122:
113:
112:
108:
98:
96:
87:
86:
79:
74:
28:
23:
22:
15:
12:
11:
5:
780:
778:
770:
769:
764:
759:
754:
749:
744:
734:
733:
728:
727:
720:
713:
705:
702:
701:
688:
671:
670:
667:
666:
664:
663:
652:
649:
648:
646:
645:
640:
638:Random numbers
635:
630:
625:
620:
615:
610:
605:
600:
595:
590:
584:
582:
578:
577:
575:
574:
569:
564:
562:Garlic routing
559:
554:
549:
544:
539:
534:
529:
524:
519:
514:
509:
504:
499:
494:
489:
484:
482:Secure channel
479:
473:
472:
471:
460:
455:
450:
445:
440:
438:Key stretching
435:
430:
425:
420:
415:
410:
405:
404:
403:
398:
393:
383:
381:Cryptovirology
378:
373:
368:
366:Cryptocurrency
363:
358:
353:
352:
351:
341:
336:
331:
325:
323:
319:
318:
313:
311:
310:
303:
296:
288:
275:
274:
269:
264:
259:
252:
249:
246:
245:
217:
192:
181:. October 2021
163:
132:
106:
76:
75:
73:
70:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
779:
768:
765:
763:
760:
758:
755:
753:
750:
748:
745:
743:
740:
739:
737:
726:
721:
719:
714:
712:
707:
706:
700:
698:
694:
689:
686:
682:
677:
662:
654:
653:
650:
644:
643:Steganography
641:
639:
636:
634:
631:
629:
626:
624:
621:
619:
616:
614:
611:
609:
606:
604:
601:
599:
598:Stream cipher
596:
594:
591:
589:
586:
585:
583:
579:
573:
570:
568:
565:
563:
560:
558:
557:Onion routing
555:
553:
550:
548:
545:
543:
540:
538:
537:Shared secret
535:
533:
530:
528:
525:
523:
520:
518:
515:
513:
510:
508:
505:
503:
500:
498:
495:
493:
490:
488:
485:
483:
480:
477:
474:
469:
466:
465:
464:
461:
459:
456:
454:
451:
449:
446:
444:
441:
439:
436:
434:
431:
429:
428:Key generator
426:
424:
421:
419:
416:
414:
411:
409:
406:
402:
399:
397:
394:
392:
389:
388:
387:
386:Hash function
384:
382:
379:
377:
374:
372:
369:
367:
364:
362:
361:Cryptanalysis
359:
357:
354:
350:
347:
346:
345:
342:
340:
337:
335:
332:
330:
327:
326:
324:
320:
316:
309:
304:
302:
297:
295:
290:
289:
286:
282:
278:
273:
270:
268:
265:
263:
260:
258:
255:
254:
250:
234:. 5 July 2022
233:
232:
227:
221:
218:
206:
199:
197:
193:
180:
173:
167:
164:
151:
150:
142:
136:
133:
120:
116:
110:
107:
95:
91:
84:
82:
78:
71:
69:
67:
62:
59:
55:
50:
48:
44:
40:
36:
32:
19:
742:Cryptography
697:expanding it
690:
675:
593:Block cipher
511:
433:Key schedule
423:Key exchange
413:Kleptography
371:Cryptosystem
315:Cryptography
276:
236:. Retrieved
229:
220:
208:. Retrieved
183:. Retrieved
178:
166:
154:. Retrieved
147:
135:
123:. Retrieved
119:SiliconANGLE
118:
109:
97:. Retrieved
94:SecurityWeek
93:
63:
51:
49:) or Q-Day.
38:
34:
30:
29:
581:Mathematics
572:Mix network
736:Categories
532:Ciphertext
502:Decryption
497:Encryption
458:Ransomware
72:References
43:decryption
522:Plaintext
661:Category
567:Kademlia
527:Codetext
470:(CSPRNG)
448:Machines
251:See also
238:10 April
210:10 April
762:Privacy
322:General
185:9 April
156:9 April
125:9 April
99:9 April
443:Keygen
152:. 2020
478:(PRN)
175:(PDF)
144:(PDF)
693:stub
240:2023
212:2023
187:2023
158:2023
127:2023
101:2023
47:Y2K
37:or
18:Y2Q
738::
228:.
195:^
177:.
146:.
117:.
92:.
80:^
724:e
717:t
710:v
699:.
307:e
300:t
293:v
242:.
214:.
189:.
160:.
129:.
103:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.