Workshop Description
Harvest-now-decrypt-later is the most immediate quantum threat facing organisations today. Nation-state adversaries and sophisticated threat actors are already intercepting and storing encrypted communications and data transfers for future decryption once cryptographically relevant quantum computers (CRQCs) become available. The question is not whether this is happening but which of your data assets are worth harvesting and how long they need to remain confidential.
This workshop provides a structured methodology for answering that question. The Mosca inequality gives a precise framework: if the time your data must remain confidential plus the time needed to migrate to PQC exceeds the time until a CRQC exists, the data is already at risk. Participants apply this framework to their own data assets, building a cryptographic inventory that maps data classification (public through to top secret) against retention periods (transient through to 25+ years) and encryption protocols (identifying where RSA key transport or ECDH key agreement creates quantum vulnerability). The output is a prioritised HNDL risk profile and a sequenced mitigation plan covering immediate actions (forward secrecy enablement, retention period reduction) and medium-term migration (hybrid ML-KEM key agreement deployment).
What participants cover
- HNDL threat model: how adversaries collect encrypted data today for future quantum decryption, and which data types are highest-value targets (diplomatic, M&A, trade secrets, healthcare, classified)
- Mosca inequality: quantitative risk scoring with worked examples for 5-year, 10-year, and 25-year retention data under optimistic, median, and conservative CRQC timeline assumptions
- Cryptographic exposure mapping: protocol-level audit of TLS, VPN, email (S/MIME, PGP), and database encryption to identify quantum-vulnerable key agreement operations
- Forward secrecy assessment: why ephemeral Diffie-Hellman provides limited HNDL protection and what additional measures are required
- Mitigation sequencing: immediate actions (forward secrecy, retention reduction, symmetric encryption under customer control) before full PQC key agreement deployment
- Board communication: translating HNDL risk into business language with timeline visualisations for different CRQC arrival scenarios