Workshops Law & Policy Quantum Computing and Digital Evidence
Law & Policy Full Day Workshop

Quantum Computing and the Future of Digital Evidence and Forensics

This workshop examines how quantum computing affects digital evidence integrity, forensic authentication, and admissibility standards for legal professionals and investigators.

Full day (6 hours + Q&A)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside

Workshop Description

Digital evidence depends on cryptographic authentication at every stage. Forensic disk images are hash-verified and digitally signed. Chain of custody logs use timestamped signatures. Court submissions rely on qualified electronic signatures under eIDAS. All of these mechanisms use RSA or ECDSA, both of which Shor's algorithm breaks on a sufficiently capable quantum computer. The consequence is that evidence authenticated today may face admissibility challenges in future proceedings if an adversary can demonstrate the ability to forge the signatures that validated it.

This is not a theoretical concern for evidence with long legal significance. Criminal appeals, civil claims with extended limitation periods, and regulatory investigations can revisit evidence years or decades after collection. If the cryptographic signatures on that evidence can be retroactively forged, defence counsel will challenge its integrity. This workshop maps the specific cryptographic dependencies in forensic evidence workflows, assesses the timeline for quantum capability against evidence retention periods, and provides practical guidance on transitioning to quantum-resistant evidence authentication. It also gives an honest assessment of quantum-enhanced forensic analysis: Grover's algorithm offers quadratic speedup for search but not the transformative capability sometimes claimed.

What participants cover

  • Quantum threats to digital signatures on forensic images, chain of custody logs, and court submissions
  • RFC 3161 timestamp authority vulnerability: how quantum capability undermines timestamped evidence
  • eIDAS Regulation qualified electronic signatures: the quantum vulnerability timeline for EU electronic evidence
  • Forensic imaging standards (ISO 27037, ACPO): which hash algorithms survive quantum attack and which signing algorithms do not
  • Expert witness preparation: how defence counsel will argue quantum-era signature unreliability
  • Honest assessment of quantum-enhanced forensics: Grover quadratic speedup versus fault-tolerant requirements for practical forensic analysis

Preliminary Agenda

Full Day Workshop structure with scheduled breaks. Content is configurable to your organisation's evidence handling procedures, jurisdiction, and forensic toolchain.

# Session Topics
1 Digital Evidence in the Pre-Quantum Era How current evidence authentication depends on classical cryptography
2 Quantum Threats to Evidence Integrity and Admissibility When cryptographic authentication can be retroactively broken
  • Digital signatures on evidence: how Shor algorithm breaks RSA and ECDSA signatures used to authenticate forensic images, chain of custody logs, and court submissions
  • Timestamp authority vulnerability: RFC 3161 timestamps rely on RSA or ECDSA; quantum capability undermines their evidentiary value
  • Historical evidence re-examination: when a quantum-capable adversary can forge signatures that were valid at time of creation, what happens to convictions based on digitally signed evidence
Break, after 50 min
3 Chain of Custody and Forensic Image Authentication Quantum implications for evidence handling procedures
  • Forensic imaging standards (ISO 27037, ACPO Good Practice Guide): how SHA-256 hash verification survives quantum attack but RSA-signed chain of custody does not
  • eIDAS Regulation and qualified electronic signatures: the quantum vulnerability timeline for EU electronic evidence admissibility
  • Expert witness challenges: how defence counsel will argue quantum-era signature unreliability in court
4 Interactive Demonstration: Evidence Vulnerability Assessment Full-day format only
  • Mapping a forensic evidence workflow to identify quantum-vulnerable cryptographic dependencies
  • Assessing timestamp authority PQC readiness for forensic evidence chains
  • Drafting a quantum-aware evidence handling protocol for a law enforcement or legal team
Break, after 60 min
5 Quantum-Enhanced Forensic Analysis Where quantum computing creates new investigative capabilities
  • Quantum pattern matching: Grover algorithm applications to keyword search across encrypted forensic datasets (quadratic speedup, not exponential)
  • Quantum machine learning for forensic analysis: NISQ-era limitations versus fault-tolerant potential for large-scale digital forensic triage
  • Honest assessment: most quantum forensic capabilities remain theoretical; the near-term impact is defensive (protecting evidence) not offensive (analysing it)
6 Standards Bodies and Legislative Responses How evidence law and forensic standards are adapting
  • NIST Digital Evidence Working Group: draft guidance on PQC for forensic evidence handling
  • UK Crown Prosecution Service digital evidence guidance: quantum readiness assessment
  • Electronic signature law reform: eIDAS 2.0 and the inclusion of PQC algorithms in qualified signature requirements
7 Q&A and Evidence Protection Planning

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and digital forensics.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

DF

Digital Forensics and Evidence Law Partners

Domain expertise and procedural validation

Digital evidence workshops are co-delivered with forensic practitioners and evidence law specialists who have direct courtroom experience. This ensures workshop content reflects current evidence handling standards and admissibility requirements.

Commission This Workshop

Sessions are configured around your organisation's evidence handling procedures, jurisdiction, and forensic toolchain. Get in touch to discuss requirements and schedule a date.

Contact Us