News: 1742476505

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

The post-quantum cryptography apocalypse will be televised in 10 years, says UK's NCSC

(2025/03/20)


The UK's National Cyber Security Centre (NCSC) today started the post-quantum cryptography (PQC) countdown clock by claiming organizations have ten years to migrate to a safer future.

The guidance defines three key milestones that NCSC claims organizations must be aware of as quantum computers - perceived to be the next major technological change, and yet one that's still in the early stage of development - will pose a threat to current encryption standards.

The first comes in just three years: by 2028, organizations need to have defined their PQC migration goals, pinpointed systems to be upgraded and developed an initial plan for this shift.

[1]

Different sectors have varying levels of cryptographic maturity and reliance on encryption, meaning the workload will differ for each organization, NCSC says.

[2]

[3]

By 2031, the highest-priority PQC migrations should be completed and that initial plan three years earlier must be refined and show a clearer pathway to full PQC resilience.

By 2035, the full PQC migration should be complete across all systems, products, and services.

[4]

Given that real-world quantum computers capable of practical use are still estimated to be decades away, the ten-year deadline would put UK organizations well ahead of the curve. The Register wants to wish central Governments, many of which are not known for smooth IT project delivery, the best of British luck. They - and we - may need it.

The [5]guidance sheet states: "The NCSC believes that ten years is a sufficient period for a rich set of PQC standards to appear, for an ecosystem of products that uses them to be developed, and for uptake to become widespread, which will enable the deprecation of most quantum-vulnerable traditional PKC [Public Key Cryptography]. This leads to a target date of 2035 for completing migration to post-quantum cryptography.

"While there is likely to be a tail of technologies for which migration will take longer, it is reasonable to expect all organizations to focus on this 2035 target, prioritizing those systems which process business and personally sensitive data, or which manage critical communications and systems.

[6]

"The activities described in planning your migration are substantial, and is critical to reducing cyber risks. Migration will happen, globally. It will not be possible to avoid PQC migration, so preparing and planning now will mean you can migrate securely and in an orderly fashion."

The NCSC's decision to release the guidance shouldn't be interpreted as a sign of quantum computing becoming mainstream within ten years. There is nothing to suggest the technology will be effective until much later. But, when it does finally arrive, modern public key cryptography won't be sufficient to protect sensitive assets.

Different organizations may also have to tweak these milestones depending on the sectors in which they operate. Those whose market activity is truly global, like some financial institutions and telecoms businesses, may want to bring delivery dates forward.

For those involved in industrial control systems, industrial IoT, and other operational technology, the roadmap might not be as straightforward as it is for organizations with fewer nationally or economically significant responsibilities.

The same PQC migration activities undertaken by a single-market business, such as ensuring remote system access is PQC-compliant, will still apply to [7]OT organizations , but they'll also need to consider beefing up the security of internet-connected field devices like sensors, too.

NCSC says organizations must consider how to bring these devices up to PQC standards, knowing they might be neither upgradeable nor replaceable and could be embedded in hard-to-maintain locations.

On the opposite end of the scale, small and medium businesses, which largely rely on commodity IT, won't have to tackle many of these complex problems themselves since the vendors on which they rely will be doing the heavy lifting.

Larger organizations and those operating critical national infrastructure (CNI) will have more on their plates. The overall transition to PQC will span years, may require multiple rounds of investment, and potentially numerous leadership changeovers.

The NCSC warned: "Like any major IT or OT upgrade, the total financial cost of PQC migration could be significant, so it's essential that organizations budget accordingly, including for preparatory activities as well as the actual migration."

Regardless of how involved a given organization will be, the PQC migration is everyone's responsibility and it should be viewed as an opportunity to build greater defenses against cyber threats.

"Quantum computing is set to revolutionize technology, but it also poses significant risks to current encryption methods," claimed Ollie Whitehouse, CTO at the NCSC.

[8]Nvidia invests in quantum computing weeks after CEO said it's decades from being useful

[9]Microsoft quantum breakthrough claims labeled 'unreliable' and 'essentially fraudulent'

[10]AWS unboxes quantum cat qubit kit called Ocelot

[11]Google exec sees enterprise quantum app on closer horizon

"As quantum technology advances, upgrading our collective security is not just important – it's essential."

PQC and the threat it presents

Quantum computing has been on the horizon for some time now, although its estimates times of arrival vary significantly.

Google's quantum AI chief, Hartmut Neven, [12]predicted recently the first real-world use cases are perhaps five years away, teeing up some excitement amid the widespread belief that the industry was far less mature than his comments would suggest.

Microsoft also made a major claim earlier this month, saying it created the [13]world's first topoconductor – a new material to produce more reliable qubits that underpin quantum computing. However, its paper on the matter was widely shunned by experts for omitting key details, ultimately being dubbed "unreliable" by one academic.

Nvidia CEO Jensen Huang offered a more measured take in January, [14]saying quantum computing was more likely to be around 20 years away, which, if accurate, would make the NCSC's ten-year deadline highly cautious.

Cautious or not, quantum may be coming to the masses at some point to herald digital security challenges. PKC, the more excited among us warn, will no longer be an effective encryption standard, as quantum computing power will break its underlying algorithms.

That means new algorithms to be adopted. While there were once myriad competing proposals, only a few now remain in contention. NIST recently [15]published three complete standards to replace current equivalents, claiming that quantum computers capable of breaking PKC could exist within ten years.

These standards are available for organizations to adopt now. Whether they will be useful when, or if, quantum computing becomes a rewality is another matter.

NCSC says most organizations will have to run PKC and PQC simultaneously for some time as part of a staged migration to PQC. It may involve developing a parallel public key infrastructure using new PQC algorithms to run alongside PKC. That's the simplest way of doing things, the agency mentioned in its guidance today.

Perceived wisdom is that symmetric cryptography won't be affected to any significant degree by quantum, and as long as algorithms with at least 128-bit keys are deployed, they can remain in use. The same goes for hash functions like SHA-256. ®

Get our [16]Tech Resources



[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Z9xK8O8-7pcEO11KTVU-LQAAAII&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z9xK8O8-7pcEO11KTVU-LQAAAII&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z9xK8O8-7pcEO11KTVU-LQAAAII&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z9xK8O8-7pcEO11KTVU-LQAAAII&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[5] https://www.ncsc.gov.uk/guidance/pqc-migration-timelines

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z9xK8O8-7pcEO11KTVU-LQAAAII&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[7] https://www.theregister.com/2024/02/02/critical_infrastructure_ot_ransomware/

[8] https://www.theregister.com/2025/03/19/nvidia_boston_quantum_research/

[9] https://www.theregister.com/2025/03/12/microsoft_majorana_quantum_claims_overshadowed/

[10] https://www.theregister.com/2025/02/27/aws_unboxes_quantum_cat_qubit/

[11] https://www.theregister.com/2025/02/06/google_quantum_apps/

[12] https://www.theregister.com/2025/02/06/google_quantum_apps/

[13] https://www.theregister.com/2025/03/12/microsoft_majorana_quantum_claims_overshadowed/

[14] https://www.theregister.com/2025/01/08/quantum_no_solace_nvidia_ceo/

[15] https://csrc.nist.gov/News/2024/postquantum-cryptography-fips-approved

[16] https://whitepapers.theregister.com/



Bollocks

Clausewitz4.1

"organizations have ten years to migrate to a safer future."

Likely who wrote this has stocks in post-quantum crypto companies. My RSA-4096 will still be safe.

And IA will never beat real human intelligence.

Re: Bollocks

JimmyPage

+1

I have no idea what grifting outfit downvoted you.

Quantum cryptography (if it ever comes to pass. Where's my fusion powered jetpack ?) just means that you apply a little logic to your encryption needs. 80% of encrypted data will generally have a very short shelf life and can be generally casually encrypted.

And there is probably a lot of data that doesn't really need to be encrypted at all.

Re: Bollocks

rafff

"And there is probably a lot of data that doesn't really need to be encrypted at all."

The trouble with encrypting just the important stuff is that you are firing a signal rocket to tell any attacker just where to focus his energies.

You cannot hide the needle if there is no haystack to hide it in.

Re: Bollocks

Scotech

One of many reasons why the push for HTTPS by default in Web browsers was worth doing, why the move towards some form of encryption for DNS is also sensible (assuming that a sensible standard can ever be agreed on here - my preference is for either DoT or DoQ, just not DoH, please!) and a very good reason to push for a shift in all web encryption to use PQC techniques by default, before anyone comes up with a scalable quantum computing system. In fact, any responsibile business who reckons they're close to achieving this milestone should absolutely be pushing for these changes vocally and publicly, right now. The fact that MS isn't is a further piece of evidence that they're maybe not so close as they claim?

Re: Bollocks

Anonymous Coward

RSA keys useful lengths are 2048 (equivalent to 112 bit symmetric keys, eg 3DES), 3072 (AES128), 7680 (AES192) and 15360 (AES256), as described in NIST SP800-57 Part 1.

That the use of 4096 is so commonplace is interesting, because it shows the love for neat powers of 2, disregarding whether they're actually useful (ie, people using them don't really understand how what they using works, but they want it to look good).

Ed25519 ftw!

Seems not entirely unreasonable

SsiethAnabuki

Whilst we still seem to be a way away from anyone having a realistic chance of leveraging quantum computing to crack encryption, it probably will continue to feel that way almost until the day that someone is in that position. At that point, it's pretty much too late to scrabble for a solution.

Compounding the problem is that there's a great deal of incentive for state-level actors to conceal their capabilities - either playing them up or down for different effect.

All in all - encouraging people to move, on a challenging timescale, doesn't feel so bad.

SMS

PCScreenOnly

Don't worry, you'll still be asked to validate from the SMS text they are about to send you.

Nice and safe

thatguywithadog

Wait... is this the same government that just issued a notice to a well known tech company demanding it secretly punch holes in existing encryption, cos they want to see what Mrs Miggins is talking about with her neighbour at number 32 down the road?

That government?

That is telling businesses to work on their encryption skills?

I... um... yeah.

Standard Operating Procedure

DancesWithPoultry

That's been SOP for our spooks for quite some time.

NCSC, part of GCHQ, looks after business interests and gives advice on securing OT/IT and using encryption, including a recommendation to use E2EE.

MI5 and plod are on the hunt for "baddies" [1] and so want a back door into everything.

This has been the confused government policy for years.

[1] This included using the Regulation of Investigatory Powers Act 2000 to catch people not picking up their dogs shit, as reported by El Reg many moons ago

Keep It Simple, Stupid and let LOVE Flow with Compassionate Conservatism at ITs Very Best

amanfromMars 1

If governments are worried about the post-quantum cryptography world then they can define and provide the applications required for any desired mitigations designed to secure sensitive and secretive information and intelligence......... and charge a subscription fee for the service rather than causing untold expense upon others who may not have a clue about what to do.

Methinks even now though, the full truth of the matter is that there is nothing to be done to prevent quantum computer base communication rendering any and all defensive measures against it’s remarkable abilities a complete and utter waste of time and money.

Doctor Syntax

Yes, quantum computing is sticking to the schedule it's always had - 10 years away.

Things are more like they used to be than they are now.