Harvest Now, Decrypt Later
   HOME

TheInfoList



OR:

Harvest now, decrypt later is a surveillance strategy that relies on the acquisition and long-term storage of currently unreadable encrypted data awaiting possible breakthroughs in
decryption In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plai ...
technology that would render it readable in the future – a hypothetical date referred to as Y2Q (a reference to
Y2K Y2K may refer to: * Y2K problem, a computer issue related to the year 2000 * Year 2K, the year 2000 2000 was designated as the International Year for the Culture of Peace and the World Mathematics, Mathematical Year. Popular cultu ...
) or Q-Day. The most common concern is the prospect of developments in
quantum computing A quantum computer is a computer that exploits quantum mechanical phenomena. On small scales, physical matter exhibits properties of wave-particle duality, both particles and waves, and quantum computing takes advantage of this behavior using s ...
which would allow current
strong encryption Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very high (usually insurmountable) level of protection against any eavesdropper, including the ...
algorithms to be broken at some time in the future, making it possible to decrypt any stored material that had been encrypted using those algorithms. However, the improvement in decryption technology need not be due to a quantum-cryptographic advance; any other form of attack capable of enabling decryption would be sufficient. The existence of this strategy has led to concerns about the need to urgently deploy
post-quantum cryptography Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms (usually public-key algorithms) that are currently thought to be secure against a crypt ...
, even though no practical quantum attacks yet exist, as some data stored now may still remain sensitive even decades into the future. , the U.S. federal government has proposed a roadmap for organizations to start migrating toward quantum-cryptography-resistant algorithms to mitigate these threats.On January 16, 2025, before the end of his term, Joe Biden issued Executive Order 14144, formally ordering governmental departments to start post-quantum cryptography transitions within a specified timeframe (ranging from 60 to 270 days). Some National Defense departments must complete this transition by January 2, 2030.


See also

*
Communications interception (disambiguation) Communications interception can mean: * Postal interception, the interception of physical mail * Wiretapping, the interception of telegraph, telephone or Internet traffic * Signals intelligence Signals intelligence (SIGINT) is the act and fie ...
*
Indiscriminate monitoring Indiscriminate monitoring is the mass monitoring of individuals or groups without the careful judgement of wrong-doing. This form of monitoring could be done by government agencies, employers, and retailers. Indiscriminate monitoring uses tools suc ...
*
Mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
*
Perfect forward secrecy In cryptography, forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of specific key-agreement protocols that gives assurances that session keys will not be compromised even if long-term secrets used in the session ke ...


Notes


References

Cryptography Espionage techniques Mass surveillance Computer data storage Privacy {{crypto-stub