Post-Quantum Cryptography: Why Executives Must Act Now

Chiara Hartmann
Chiara Hartmann
10 min read
Post-Quantum Cryptography: Why Executives Must Act Now

Post-quantum cryptography is not a future problem. For executives, it is a governance decision with a multi-year lead time, real liability exposure, and regulatory deadlines already on the horizon.

  • Attackers are already capturing encrypted data today in order to decrypt it later with quantum computers — the "harvest now, decrypt later" pattern. The risk starts well before large-scale quantum hardware becomes available.
  • The National Institute of Standards and Technology (NIST) has finalized the first quantum-safe encryption standards. In practice, the migration has already begun.
  • Germany's Federal Office for Information Security (BSI) recommends preparing early and designing systems so that cryptographic primitives can be exchanged.
  • Large organizations need several years to complete the transition. Those who start late face compressed timelines and uncontrolled costs. For decision-makers this is not an IT detail — it is a question of liability, budget planning, and long-term resilience.

What Is Quantum Computing — in Plain Terms

Quantum computers are a new class of machines that can solve certain complex problems dramatically faster than classical computers — for example in cryptography, materials science, or large-scale simulation. The technology is still maturing, but its long-term potential is significant.

Importantly, quantum computing does not replace classical IT. It augments it for narrow, high-value problem classes.

Key points:

  • Quantum systems do not replace classical IT infrastructure — they complement it.
  • They are typically operated alongside existing hardware, not instead of it.
  • Their practical advantage is solving specific mathematical problems — including the very problems that today's public-key cryptography is built on.

The Strategic Problem: Long Protection Horizons Meet Cryptography With an Expiration Date

Many organizations hold confidential data that must remain protected far longer than the useful life of today's cryptographic primitives. The BSI's own guidance (TR-02102-1) publishes expected suitability horizons for currently deployed cryptographic algorithms — and for some data categories the required confidentiality horizon can exceed that window. This applies in particular to public-key schemes, which rely on a matched pair of public and private keys.

The core problem: today's widely deployed algorithms are considered secure now, but sufficiently powerful quantum computers could break them in the future.

"Harvest Now, Decrypt Later" — the Underrated Threat

Attackers do not need a working quantum computer today to benefit from one tomorrow. They can already:

  1. Intercept or copy encrypted data in transit or at rest.
  2. Store that ciphertext indefinitely at low cost.
  3. Decrypt it later, once sufficiently capable quantum hardware becomes available.

This scenario is known as "harvest now, decrypt later" and, from a security-policy perspective, has to be treated as an active threat — not a hypothetical one.

For organizations that means: the risk is deferred, but the responsibility is not. Acting early is the only reliable way to ensure long-term protection of sensitive data.

From Research to Regulation: What NIST Standardization Really Means

With the finalization of the first quantum-safe algorithms by the National Institute of Standards and Technology (NIST), a decisive step has been taken. These schemes are no longer academic prototypes — they are the industrial reference.

Current NIST standards include algorithms such as:

  • CRYSTALS-Kyber for quantum-safe key establishment.
  • CRYSTALS-Dilithium, SPHINCS+, and Falcon for digital signatures.

Standardization creates expectation. International partners, security-sensitive procurement bodies, and regulated sectors will increasingly orient their requirements around these standards. That means quantum-safe cryptography will show up in future RFPs, tender specifications, and supplier questionnaires — and organizations have to be ready to answer.

Waiting until post-quantum requirements appear in a compliance audit leaves too little time to react.

The BSI's Position: Crypto-Agility as a Strategic Obligation

Germany's Federal Office for Information Security (BSI) has consistently emphasized in its post-quantum publications that organizations must prepare early. Two concrete milestones anchor its expectations:

  • The transition to quantum-safe procedures should, per BSI guidance, be completed by the end of 2031.
  • For systems and applications with very high protection needs, the migration has to be finished by the end of 2030 (see BSI TR-02102-1).

At the center of this guidance is a concept that is often strategically underestimated: crypto-agility.

What does crypto-agility mean?

Crypto-agility means that cryptographic algorithms are implemented in an exchangeable way. Individual primitives can be swapped for new standards as the threat landscape and certifications evolve — without rewriting the surrounding application.

In most real-world infrastructures, however, the opposite is true:

  • Cryptography is locked to a specific vendor or product.
  • Cryptographic routines are hard-coded deep in firmware or hardware.
  • Certificates and trust chains are static and operationally fragile.
  • PKI structures based on asymmetric algorithms have grown organically over decades.

The real challenge is therefore not the new algorithm itself — it is the architecture that has to host it.

The Biggest Risk: Existing Systems

Public debate tends to focus on when powerful quantum computers will actually exist. Strategically, a different factor matters more: existing infrastructure with long depreciation cycles.

Typical high-impact areas include:

  • VPN and remote-access infrastructure.
  • Smartcards and hardware tokens.
  • Long-term archive systems.
  • Industrial control systems and OT environments.

A forced late migration in these areas would not just mean software updates. It would mean:

  • Hardware replacement.
  • Re-certification of systems and components.
  • Operational downtime during the cutover.

What this means concretely:

  • For the CEO — a reputational and disclosure risk.
  • For the CFO — a budget risk with costs that are hard to plan if deferred.
  • For the CTO — a fundamental architecture problem, not a point fix.
  • For the CISO — a protection-horizon problem that outlasts today's primitives.

A Realistic Path Forward

Experience from large-scale transformation programs is clear: this kind of migration takes several years. Organizations that wait for explicit regulatory obligations lose strategic freedom of action — and tend to end up paying for the change twice.

Against that backdrop the EU Coordinated Implementation Roadmap (June 2025) targets the end of 2030 for critical infrastructure and the end of 2035 for broader medium-risk systems.

Step 1: Create transparency with a crypto inventory

Organizations need to know where and how cryptographic algorithms are used — across applications, infrastructure, partner integrations, and products. Without a complete inventory, every strategy remains hypothetical.

Step 2: Prioritize by risk, including protection horizon

Prioritize:

  • Information with a long confidentiality horizon — data that must stay protected well past 2032.
  • Data classified as high or very high protection need under your existing classification scheme.

Step 3: Build crypto-agility

  • Deploy hybrid schemes that combine quantum-safe key establishment with classical algorithms during the transition.
  • Establish architectures that can be migrated — abstracting cryptographic primitives behind well-defined interfaces.

Step 4: Structured, phased migration

  • Prepare the migration with planning, inventory, and dependency mapping.
  • Start with pilot projects, then migrate the most critical systems.
  • Scale out to less critical systems in broad rollouts once the pattern is proven.
Only on the basis of structural preparation does a targeted migration make sense.

Strategic Framing for Decision-Makers

CEO / Management Board

The priority is long-term protection of sensitive information. A retrospective disclosure that historic data was inadequately protected can carry legal and reputational consequences — especially in regulated sectors.

CFO

A planned migration reduces financial volatility. Funding inventory and roadmap work today avoids uncoordinated emergency investment later, when regulatory pressure removes scheduling flexibility.

CTO

The transformation is an opportunity to modernize aging architectures, remove hard-coded cryptographic dependencies, and create the abstractions that will be needed for the next generation of compliance and interoperability requirements.

CISO

The mandate is to make sure protection horizons are actually honored — also beyond the era of classical cryptography. That requires inventory, risk-based prioritization, and measurable crypto-agility.

Three Strategic Takeaways

  1. Post-quantum cryptography is a governance topic — not an isolated IT project.
  2. The biggest threat is inaction in existing infrastructure, not the unknown arrival date of a cryptographically relevant quantum computer.
  3. Migrating to quantum-safe algorithms is no longer a future topic — it must already be part of architectural design decisions today.

Conclusion: Time Is the Decisive Factor

The question is no longer whether powerful quantum computers will be built, but when they will be able to break today's widely deployed cryptographic schemes — and with them, data that is considered safely protected today. BSI and NIST have set the frame.

For executives, the phase of structured preparation starts now. Those who inventory, prioritize, and make architectural decisions early do not only reduce technical risk — they reinforce strategic sovereignty over their own infrastructure.

Further reading: BSI TR-02102-1, NIST Post-Quantum Cryptography Standards.

Hat ihnen der Beitrag gefallen? Teilen Sie es mit:

ISO 27001 Certification — we guide you through the process

ISMS setup, gap analysis and audit readiness in a 30-minute strategy session.

30 Minuten • Unverbindlich • Sofort verfügbar

Further reading

Continue exploring with related insights from our experts.

Your strategic success starts here

Our clients trust our expertise in digital transformation, compliance, and risk management

Ready for the next step?

Schedule a strategic consultation with our experts now

30 Minutes • Non-binding • Immediately available

For optimal preparation of your strategy session:

Your strategic goals and challenges
Desired business outcomes and ROI expectations
Current compliance and risk situation
Stakeholders and decision-makers in the project

Prefer direct contact?

Direct hotline for decision-makers

Strategic inquiries via email

Detailed Project Inquiry

For complex inquiries or if you want to provide specific information in advance