You are on page 1of 69

SECURING

COMMUNICATIONS
IN THE

QUANTUM
COMPUTING AGE
MANAGING THE RISKS TO ENCRYPTION

MICHAEL J. D. VERMEER | EVAN D. PEET

C O R P O R AT I O N
Cover design: Peter Soriano
Cover image: Adobe Stock/sakkmesterke

Limited Print and Electronic Distribution Rights


This document and trademark(s) contained herein are protected by
law. This representation of RAND intellectual property is provided for
noncommercial use only. Unauthorized posting of this publication online
is prohibited. Permission is given to duplicate this document for personal
use only, as long as it is unaltered and complete. Permission is required
from RAND to reproduce, or reuse in another form, any of our research
documents for commercial use. For information on reprint and linking
permissions, please visit
www.rand.org/pubs/permissions.html.
RAND’s publications do not necessarily reflect the opinions of its research
clients and sponsors. R® is a registered trademark.

For more information on this publication,


visit www.rand.org/t/RR3102.
Library of Congress Cataloging-in-Publication Data is available for this publication.

ISBN: 978-1-9774-0461-9
© Copyright 2020 RAND Corporation
Summary and broad consumer survey. This approach was meant to

T
Recommendations assess the likely events, risks, and uncertainties and
recommend appropriate policies and risk-mitigation
he world is waiting for the first quantum com-
actions. The results of this research, in brief, are as
puters, which are expected to revolutionize
follows:
computing. Their unprecedented power may
also enable them to crack the digital encryp- • Quantum computers capable of cryptographic
tion system upon which the modern information and applications are expected, on average, to be
communication infrastructure depends. By breaking approximately 15 years away—roughly 2033.
that encryption, quantum computing could jeopardize However, experts assess that both earlier and
military communications, financial transactions, and much later development are possible.
the support system for the global economy. • Standard protocols for PQC are expected to
This report explores those risks by assessing, be drafted and released within the next five
first, how quickly quantum computers are likely to years. The expected time to near-complete
be developed; second, how quickly encryption that adoption of PQC protocols varies but is gen-
can withstand attacks by quantum computers—or erally expected to extend into the mid- to late-
postquantum cryptography (PQC)—is likely to be 2030s, and potentially much later. However,
standardized; and third, how quickly and widely the nationwide or global transition necessary
PQC will be adopted. The analysis concludes that the to implement the standard protocols and
threat to the security of the modern communications mitigate the vulnerability from quantum com-
infrastructure is urgent but manageable, and the puting is expected to take decades—far longer
authors offer recommendations to the U.S. govern- than the time that experts estimated would be
ment for responding. available for the task.
There is already a race among nations and • If adequate implementation of PQC has not
corporations attempting to develop quantum com- taken place by the time capable quantum com-
puters (primarily in the United States, China, and puters are developed, it may become impossible
the European Union, though many other nations to ensure secure authentication and commu-
are pursuing this goal as well), and many expected nication privacy without major, disruptive
commercial applications are unrelated to cryptogra- changes to our infrastructure. These vulner-
phy. Quantum computers capable of undermining abilities are expected to be not only worse in
current cryptography are likely at least a decade off, many respects than current cybersecurity
but they are already introducing risks, and these risks vulnerabilities, but also of a different kind,
will grow over time. PQC solutions are under devel- expanding the varieties of cyber weaknesses.
opment but will need to be improved, standardized, • Consumers have low awareness of quantum
and implemented. This transition will be challenging computing generally, as well as low awareness
and time-consuming, potentially stretching out over of the risks associated with its advent. This
decades. Moreover, the advent of quantum comput- is true across demographics, even among the
ers presents retroactive risk, because information most informed age group, 18-to-35-year-olds.
being securely communicated today without PQC, • Consumer responses to the potential
which may have been captured and stored but never threats of quantum computing show logical
decrypted, may be revealed once quantum computers consistency—the more proximate the threat,
are created. The period during which cryptography the greater the response. Moreover, a survey
is expected to lag quantum computing developments suggested that certain consumers are likely to
presents a vulnerability that prudence requires us to respond to security threats and reward com-
address today. panies they perceive to be more adequately
To assess these timelines and associated risk, we protecting their security.
undertook a mixed-methods approach consisting of • Nevertheless, the lack of consumer awareness
a literature review, a review of expert opinion, and a of quantum computing and associated risks

1
Abbreviations NSTAC National Security Telecommunications
Advisory Council
AES Advanced Encryption Standard
NSTC National Science and Technology Council
CA certificate authority
NTIA National Telecommunications and
CFRG Crypto Forum Research Group
Information Administration
CIO chief information officer
NQCO National Quantum Coordination Office
CISA Cybersecurity and Infrastructure Security
NQIA National Quantum Initiative Act
Agency
NQIP National Quantum Initiative Program
FIPS Federal Information Processing
Standards OMB Office of Management and Budget

GAO Government Accountability Office OSTP Office of Science and Technology Policy

GCS Google Consumer Surveys PKC public key cryptography

GSA General Services Administration PKI public key infrastructure

IAD Information Assurance Directorate PQC postquantum cryptography

IETF Internet Engineering Task Force QIST Quantum Information Science and
Technology
IoT internet of things
QKD quantum key distribution
ISO International Organization for
Standardization SCQIS Subcommittee on Quantum Information
Science
IT information technology
SEC U.S. Securities and Exchange
NAS National Academies of Sciences
Commission
NIST National Institute of Standards and
S&T science and technology
Technology
TLS transport layer security
NSA National Security Agency

implies that consumers will likely not be the including the passage of the National Quantum
primary drivers for policy change on this issue. Initiative Act and the formation of the National
As a result, federal leadership will be needed to Quantum Coordination Office (NQCO), but as of yet
advocate for consumer protection. it is not clear that it has adequately responded to the
Combining these results and other expert assess- threat to our security posed by quantum computers.
ments and recommendations, we judge the threat to The threat is similar in many ways to the cir-
be urgent. There is little to no margin of safety for cumstances surrounding preparations for Year 2000
beginning the migration to PQC. The vulnerability (Y2K) conversion. The Y2K problem, also known as
presented by quantum computers will affect every the “Millennium Bug,” arose from fear that a calendar
government body, critical infrastructure, and indus- software glitch would cause the world’s computers
try sector. This presents a national security threat to fail at midnight on Dec. 31, 1999, when the clock
that requires a centrally coordinated, whole-of-nation rolled over to the year 2000. This presented a similar
approach to risk mitigation. The United States gov- risk to the global information and communication
ernment has recently taken multiple actions meant infrastructure. One of the primary lessons learned
to maintain and assure its position as a global leader from the response to the Y2K challenge was that
in quantum information science and technology, federal leadership and partnerships were key to suc-
cess, particularly executive branch coordination and

2
bipartisan congressional oversight. These, in turn, information systems that could improve
led to successful partnerships with states, cities, and our ability to respond to both current and
industry groups, useful legislation and mandates, and future cyber threats. The efforts to promote
allocation of human capital and resources needed to PQC adoption and quantum computing
help entities prepare. preparedness should have the tandem goal
There are notable differences between the threat of restructuring systems to enable greater
from Y2K and the threat from quantum comput- cyber-resilience and cryptographic agility.
ers. The world had a known deadline for fixing the 3. Prepare for an uncertain future. Timelines for
vulnerability from Y2K, while we lack such a certain quantum computing development are still very
date when the risk from quantum computers might uncertain, but an uncertain future need not be
appear. Moreover, unlike Y2K, which threatened a less-secure future. Communications to the
wholesale failure of systems without human inter- public on risk from quantum computers should
vention, with quantum computers the threat is due seek to find a middle ground between exagger-
rather to the presence of a vulnerability that could ation of the threat and a reckless disregard of
be exploited by a sophisticated, capable adversary. the real risk. The United States has solutions
Nevertheless, the approach taken in response to to mitigate the risk, and even the worst-case
Y2K can be adapted to the effort to mitigate the risk scenarios will not result in the end of digital
during the transition to quantum computing. information security. In best-case scenarios,
We have three principal findings on what is worldwide cybersecurity could improve.
required for the United States to respond to the threat The development of cryptographically relevant
from quantum computing: quantum computers presents a new kind of threat to
1. Take actions to spur a robust adoption of PQC the security of the U.S. communications infrastruc-
as soon as possible. Widespread, adequate tran- ture. Today, clever cyberattackers find the means to
sition to PQC will be the most effective means bypass cryptographic systems meant to protect infor-
of mitigating risk from quantum computers. mation. Quantum-enabled cyberattacks will instead
Moreover, the sooner an interoperable stan- use a device that attacks those cryptographic systems
dard for PQC can be widely implemented, the directly, breaking a building block of information
more the eventual risk will be diminished. security. This is a significant, urgent security threat,
2. Build cyber-resilience and cryptographic agility and failure to solve it could be devastating to infor-
into the digital infrastructure. As security mation, military, political, and economic security.
implementations are adapted in response If the United States acts in time, however, with
both to constantly evolving current threats appropriate policies, risk reduction measures, a
to our critical infrastructure and to future whole-of-government approach, and a collective sense
threats, such as quantum computing, we of urgency, it has an opportunity to build a future
should consider how to make new security communications infrastructure that is as safe as or
implementations more agile. Specifically, new safer than the status quo. It could reap the enormous
systems should aim for (1) future-compat- benefits expected from quantum computing while
ibility with the expected evolution of stan- enhancing privacy and security. The United States has
dards and more demanding requirements of the solutions, the means, and, very likely, sufficient
PQC, and (2) modularity that would allow time to avert a quantum catastrophe and build a safer
rapid and inexpensive cryptographic adap- future, but only if it begins preparations now.
tation as new threats or vulnerabilities are With these principles in mind, we offer the
discovered. The systemic changes needed to recommendations on the next page for consideration
transition to PQC offer an opportunity to by the executive branch, Congress, and individual
implement structural improvements in the organizations. (Details of these recommendations are
use of cryptography in communication and found on pages 36 to 40.)

3
TOP RECOMMENDATIONS
Recommendations to the Executive Branch
If the White House wishes to minimize risk from quantum computing, it should
■ ensure a central coordinating body adequately prioritizes the threat: The U.S. government
response requires a body dedicated to responding to the threat from quantum computing and
responsible for coordinating action across the government and industry. It is not yet clear that
the National Quantum Coordination Office (NQCO) can give adequate attention to the threat,
given the office's other priorities, and the executive branch should consider whether an alterna-
tive body or approach is needed.

■ institute a standard that facilitates adoption: Minimize the final number of algorithms to be
standardized by the National Institute for Standards and Technology (NIST) and follow through
on creating an international standard. In keeping with current NIST evaluation criteria, the stan-
dard should be designed to avoid market fragmentation, maximize interoperability, and facilitate
widespread adoption.

■ mandate PQC transition for government: The NSA Cybersecurity Directorate should consider
a mandate to transition to PQC for government agencies, critical infrastructure, and other organi-
zations. It should assure adequate enforcement and grant few waivers.

■ coordinate agencies to drive change and improve awareness: Expand the representation of
the central coordinating body to include staff from many more departments and agencies in the
federal government. Task them soon with (1) convening stakeholders across government and the
private sector to increase awareness and address the risk from quantum computers, (2) issuing
frequently updated guidance on PQC transition and cryptographic agility, and (3) driving broad
information technology changes.

Recommendations to Congress
If Congress wishes to boost the response to risk from quantum computing and increase oversight, it
should consider
■ hearings to improve awareness and oversight: Congressional hearings could promote aware-
ness of the risk from quantum computing, establish oversight, and monitor progress toward
preparing for quantum computers. Committees should pay special attention to the blurring line
between national security and non–national security organizations.

■ incentivizing cryptographic transition in the public and private sectors: Legislative options
for Congress include (1) further regulation and mandates on PQC transition and cryptographic
agility for government and critical infrastructure, (2) additional or more focused allocation of
human capital and funding for government transition efforts, (3) business incentives for PQC
transition, and (4) a certification scheme for adequate implementation of PQC.

Recommendations to Individual Organizations


If organizations wish to minimize risk, they should consider
■ assessing future and retroactive risk from quantum computers: Integrate risk from quantum
computers into organizational risk assessment and management. Assess current and future vul-
nerabilities, including from information that has already been captured or that may be captured
now and exploited years later.

■ an inventory of public key cryptography use: Take inventory of every place that public key
cryptography is used within the organization, by partners, and by third-party suppliers. Each will
eventually need to be transitioned to PQC once a standard is available.

■ building cyber-resilience and cryptographic agility: Plan to build in greater cyber-resilience and
cryptographic agility to improve overall cybersecurity and smooth future cryptographic transitions.

4
Introduction Because it is trivial to obtain a public key from
a private key but computationally intractable to do
Public key cryptography (PKC) has formed the back-
the reverse, PKC has run behind the scenes of nearly
bone of trust in all digital communications since the
all digital communications to date, providing the
inception of the internet. It has allowed people who
mechanism that secures the internet. Quantum
rarely, if ever, meet physically to exchange important
computers will challenge all that. If PKC, the cur-
and sensitive information in secure digital interac-
rent mechanism for securing the internet, possesses
tions. PKC allows two parties to share information
weaknesses that can be exploited by a quantum
with only one another on a communication channel
computer, this could, in theory, render the modern
that is otherwise visible to others.
digital infrastructure nonviable, as communications
PKC provides the privacy and security that
ranging from private emails to financial transactions
enables a wide variety of digital interactions. Each
to national security communiques would no lon-
time we check and open email, browse social media
ger have any assured privacy or authenticity. Shor’s
accounts, shop on e-commerce sites, pay for lunch
publication both launched a race to create a quan-
with credit cards, edit documents stored on the
tum computer and triggered the need to develop a
cloud, telework over virtual private networks, or
new cryptographic system to protect privacy in the
allow our mobile apps to update automatically, PKC
postquantum age.2
enables each side to trust the information provided
Quantum computers will perform fundamentally
by the other. In short, PKC, also known as asym-
different computing operations from conventional
metric cryptography, is what provides security and
binary computers. Conventional (binary) computers’
permits trust in open networked communications.
smallest unit of data is a bit, which is assigned a value
In PKC, each user has two keys—one public
of either off (0) or on (1). In quantum computing, in
and one private. The private key is kept secret. Any
contrast, a qubit is the smallest unit of data. Qubits
message encrypted (i.e., mathematically scrambled)
leverage quantum mechanics,3 so that the switches
with the public key can be decrypted only with the
that are off (0) or on (1) in conventional computing
private key and can thus be securely transmitted over
instead exhibit a state called superposition, or some
observable channels. Although the public and private
combination of both states simultaneously. This
keys are mathematically related, and it is technically
phenomenon allows a quantum computer to per-
possible to determine the private key from the public
form operations involving many qubits simultane-
key when the keys are small enough, the private key
ously, rather than in sequence. This novel capability
has so far remained secure because the operations
can provide monumental improvements in certain
required to derive the public key, such as number
computing operations, including number factor-
factoring and solving the discrete logarithm problem,
ing and database search algorithms. This ability to
have been computationally challenging.1
factor numbers with relative ease, enabled by Shor’s
In 1994, the future viability of PKC was put in
algorithm, will enable quantum computers to attack
doubt, however, when mathematician Peter Shor
strong cryptographic defenses directly, in a way that
published a paper describing how a theoretical device
is qualitatively different from today’s cyberattacks.
called a quantum computer could solve the num-
The majority of current cyberattacks target human
ber factoring and discrete logarithm problems in a
or technical vulnerabilities that allow an attacker
much shorter time than conventional computers,
to go around the defenses. Quantum computing
thereby making private keys vulnerable (Shor, 1994).
will use raw computational power to go through the
Estimates of how long it would take for conventional
cryptographic defenses themselves. It will, thus, layer
computers to factor the numbers commonly used in
an additional vulnerability on top of those currently
PKC are often given in time scales roughly equivalent
plaguing cybersecurity.
to the age of the universe. In contrast, a sufficiently
It is theoretically possible that quantum comput-
powerful quantum computer could theoretically do
ers could compromise applications that use the inter-
the same task in days or hours.
net and destroy the ability to keep secrets in digital

5
form, but these are entirely preventable outcomes. over the coming years and decades will determine
The United States has the time and the technology to whether the development of a quantum computer
implement new encryption systems that can not only badly disrupts digital communication security or
withstand quantum computers but also make future whether its effects are diminished by timely, adequate
digital interactions as safe as, if not safer than, they implementations of PQC.
are now. This will require preparation, implementa- The development of quantum computing is
tion, and political will. dependent on scientific and engineering innova-
Quantum computers with the ability to wreak tions. These innovations are driven by demand for
havoc on digital communications are years—at the the new capabilities of quantum computing that will
very least—away. Technological breakthroughs have advance basic science and drive private investments,
been occurring rapidly in recent years, but more international competition, and regulations that either
major breakthroughs are still required to make such facilitate or impede scientific breakthroughs. While
a computer a reality. Despite decades of research, the there are many unknowns in the future development
timeline for the arrival of a quantum computer with trajectory of quantum computers, a PQC standard is
sufficient capability to attack any common imple- expected to be released before quantum computers
mentation of PKC remains uncertain. Moreover, even become broadly used. Standardization is not suf-
when the first quantum computers with such capa- ficient, however. After standardization, PQC will
bility are created, it is very likely that the time and need to be adopted—and the sooner that occurs, the
cost of performing such an attack will be very high at greater the benefits. If the answer to the question
first. This will require attackers to rigorously priori- “When will quantum computers be developed?” is
tize potential targets while they work to improve the anything but “Never,” the United States will be vul-
technology and methods. Furthermore, there are new nerable to decryption of sensitive information—not
(or less developed), alternative ways of implement- only in the future, but retroactively. Because open
ing public key cryptography that may be resistant networks are used to communicate, many entities
to quantum attacks. This postquantum public key presumably record encrypted communications
cryptography, referred to hereafter as PQC, is an today. PKC makes these communications unread-
active area of research in the cryptography commu- able at the moment, but once a quantum computer is
nity and already has several known implementations. created any data that had previously been captured
A number of standards development organizations and stored can be decrypted and exploited. As a
are testing and analyzing PQC algorithms,4 and result, organizations transmitting information that
the National Institute of Standards and Technology must stay secret for a very long time may already
(NIST) is in the midst of drafting standard protocols face significant risk from the future development
for PQC. NIST reports a target date for release of of quantum computing. This vulnerability should
the standard for PQC between 2022 and 2024, after incentivize the rapid adoption of any PQC method,5
which a widespread transition to security using the whether or not the method is ultimately chosen as the
new protocols should begin. Whether standardiza- industry standard.
tion of PQC will be timely and effective depends on Despite the threat, multiple factors may lead to
regulatory choices, resources, and the overall institu- delays. First, adopting new cryptographic methods is
tional priority given to the effort. costly. Also, in most cases, new systems must com-
To understand the likelihood and magnitude municate with cryptography systems on other net-
of the potential disruption caused by the advent of works, and insufficient testing of new methods may
quantum computing, one needs to consider two result in vulnerabilities being overlooked—calling
timelines: (1) the development timeline of a quan- into question the promised protection. Consequently,
tum computer with sufficient capability to attack most adoptions of new cryptographic methods must
PKC, and (2) the timeline for the standardization wait until after completion of the evaluation and
and adoption of new PKC that is not vulnerable to testing leading to standardization. Cryptographic
quantum computing. How these two timelines evolve transitions are generally messy and slow, and there

6
is ample reason to suspect that the transition to PQC
will be especially difficult. Products using cryptog-
raphy that are being designed and built now will be
We conducted 15
used for decades and will be vulnerable to quantum interviews of generalist
attack until they are retired, unless they are updated.
Additionally, it is unclear how aware consumers are or academic experts
of the threat quantum computing poses to PKC and
how much consumers care about the security of their in quantum computing
information. Consumer awareness may influence the
speed of and demand for corporate investments to and PQC, as well as
adopt PQC.
To address questions surrounding the future
industry experts from
development timelines of quantum computing and
PQC and the postdevelopment adoption of PQC,
companies involved
we employed a mixed-methods research approach.
Because policies involving quantum computing
in the development of
investments, PQC standardization, and PQC adop- quantum computing
tion involve uncertainty that cannot be addressed by
traditional science and statistics, we use the expert or companies with
elicitation method to characterize the timelines
(and uncertainties) of quantum computing and interests in advanced
PQC. Expert elicitation is a formalized, documented
procedure for obtaining and combining probabilistic cryptographic methods
judgments, and it is most appropriate when decisions
are required that go beyond well-established knowl-
such as PQC.
edge (Morgan, 2014; Colson and Cooke, 2018).
We conducted 15 interviews of generalist or posed by quantum computing to privacy and infor-
academic experts in quantum computing and PQC, mation security. The results of the consumer survey
as well as industry experts from companies involved offer insight into how this potential change could
in the development of quantum computing or both affect consumer behavior and inform the delib-
companies with interests in advanced cryptographic erations of corporations deciding upon investments
methods such as PQC. The interviews followed a and adoption of PQC.
structured protocol to elicit probabilistic expert opin- What do these results imply for agencies and
ions on the timelines of quantum computing, PQC organizations trying to assess and manage their risk
development, and the likely adoption of PQC. We from quantum computing? The data point toward a
also elicited expert opinions on the dangers posed in need to find a middle ground between exaggerating
hypothetical scenarios where quantum computing or fearmongering about the threat and having a reck-
is developed before PQC standardization, or PQC is less disregard for the real risks. Many agencies and
standardized and quantum computing arrives either organizations may already face information security
in short order or after a longer period of time. risks from quantum computing now that will only
Using the information gained through our grow over time. A future with quantum computers
expert elicitation, we then constructed a survey, could be disastrous for information security in sev-
which we fielded to a national sample of individual eral ways, but solutions exist that would mitigate this
respondents, with the goals of ascertaining consumer vulnerability if they are implemented in a deliberate,
awareness of encryption and quantum computing, timely manner. Moreover, the predictable advent of
how consumers have responded to previous cyber quantum computing offers numerous opportunities
incidents, and how consumers may react to the threat

7
to redesign the current approach to cryptographic are being pursued, including superconducting qubits,
transitions that could ultimately improve cyberse- trapped ion qubits, spin qubits, photonic qubits, and
curity and smooth future cryptographic transitions. topological qubits. Basic scientific research and hard-
Finally, quantum computing presents not only ware engineering are often proceeding hand-in-hand
security perils but also the promise of scientific and as organizations seek to overcome the technical chal-
technical innovation. The threat that it may break lenges to scaling and using them (Touzalin, 2016).
paradigms on which the internet depends is real but Each architecture has strengths and weaknesses
can be countered. If governments and corporations in terms of the ability to achieve low error rates,
act collectively to address their vulnerability, they multi-qubit coupling, and demonstrated control with
may await this new technology with curiosity, hope, a path to scale up. The long-term goal is to develop
and excitement, rather than apprehension. a universal, fault-tolerant quantum computer. Until
This report will proceed as follows. In the recently, the near-term goal had been to develop an
following section we will review the literature and intermediate-scale quantum computer that could,
give background on cryptography generally as well for the first time, achieve quantum supremacy or
as PKC specifically, the progress being made in the quantum advantage, i.e., computing capability for
development of quantum computing, and the precise a specific problem that is beyond the reach of even
nature of quantum computing’s threats to encryp- the most powerful conventional computers (Bleicher,
tion. Next, we will describe the results of the expert 2018). This goal was met in 2019 when Google
elicitation and consumer survey, the methodology announced the first-ever demonstration of quantum
and protocols for which are described in appendixes. supremacy, claiming that its device could perform a
Finally, we will conclude with a discussion of the task in 200 seconds that would take a state-of-the-art
implications and recommendations of our work. conventional supercomputer 10,000 years (Arute et
al., 2019).
The literature contains timeline estimates for
Background the creation of a quantum computer that naturally
To understand the technological and behavioral vary depending on how a quantum computer is
drivers of the risk posed by quantum computers to defined and what route is taken to develop it. In 2018,
information security and commerce, we considered the National Academies of Sciences (NAS) released
three distinct but interrelated areas: the development one of the most comprehensive reports to date on
of quantum computers, the development of PQC, the progress and prospects of quantum computing,
and the challenges involved in the adoption of novel including milestones, key metrics, and technologies
cryptographic approaches. We reviewed technical to track when assessing the progress of quantum
publications, media reporting, academic research, computing research. This report concluded that
and other sources and summarize our findings here. the minimum time required to build a large-scale
quantum computer is eight to ten years, but it did not
predict when such a system would actually be built,
Quantum Computing due to the many unknowns. The report documents
Despite years of research and significant investment, the many challenges inherent in the development
quantum computing is still a nascent technology. of a large-scale quantum computer (NAS, 2018b).
No consensus has yet been reached on the best way Indeed, even quantifying the computing power of
to implement the fundamental building block of an implementation for comparison to conventional
a quantum computer, the qubit. The current state computers or competing architectures can be chal-
of quantum computing may be compared to the lenging (Bishop et al., 2017). We are interested in
time when conventional computers were still using better understanding the timeline to the creation of a
vacuum tubes, before the move to transistor-based cryptographically relevant quantum computer, which
computers. Numerous possible qubit architectures we define generally as a quantum computing imple-
mentation of sufficient capability to break many of

8
the common implementations of PKC in a useful Cryptography
time frame.6
Cryptography (literally “hidden writing”) has been
There have been multiple efforts to estimate
used to secure communications and information by
the computing resources that would be required to
concealing message contents using ciphers since at
use Shor’s algorithm to break varying PKC imple-
least the ancient Greeks, and its use in the United
mentations, usually concluding that a quantum
States goes at least as far back as the Revolutionary
computer would require anywhere from hundreds of
War (Weber, 2013). The modern government bodies
millions (Mohseni et al., 2017) to billions (Roetteler
most involved with directing the use, standardiza-
et al., 2017) of physical qubits. There have yet to be
tion, and implementation of cryptography in the
implementations with more than 100 qubits, and
United States are the National Security Agency
the implementation Google used to demonstrate
(NSA) and NIST. These organizations have roles vis-
quantum supremacy used 53 qubits.7 In 2009, some
à-vis cryptography that are complementary and often
experts were predicting that it would be 15 to 20
collaborative.
years before quantum computers could solve prac-
The NSA’s missions encompass both signals
tical problems in cryptography, and 20 to 30 years
intelligence and information assurance. NSA’s
before quantum computers powerful enough to break
information assurance role was principally estab-
RSA-2048 (a popular PKC implementation) could be
lished in 1990 with the creation of the Information
created (Moses, 2009). More recently, Mosca docu-
Assurance Directorate (IAD). The NSA recently
mented several estimates associated with particular
reorganized, disestablishing the IAD and placing
hardware efforts and further stated his own proba-
many of its activities under the newly established
bilistic estimate of a one-in-seven chance of break-
Cybersecurity Directorate. The IAD’s main role, now
ing RSA-2048 by 2026, and a one-in-two chance of
carried out by the Cybersecurity Directorate, was the
breaking it by 2031 (Mosca, 2015). At the same time,
protection of classified and other national security–
some experts have postulated that it may eventually
related information systems and generally providing
be shown that a quantum computing implementa-
confidence in cyberspace by partnering with gov-
tion of this size is not physically possible. While this
ernment, industry, and academia to commercialize
appears to be a minority view, their case is using
information assurance technology and products.8
an argument that scaling up current architectures
It set standards and encouraged vendors to build to
may not be practical. (Moskvitch, 2018; Kalai, 2016).
those standards (NSA, 2016). One of the most notable
There is also the possibility that sudden hardware
recent examples of this was the IAD definition of
breakthroughs or improved quantum algorithms that
the Commercial National Security Algorithm Suite,
lower resource requirements could accelerate devel-
also known as Suite B, which was published to give
opment timelines.
guidance on cryptographic algorithms and standards
As may be expected, in an attempt to predict
that are approved for use on national security systems
any future state for an emerging technology, there
(Committee on National Security Systems, 2015). The
is a great deal of uncertainty. Nevertheless, under-
NSA’s work in cryptography management is com-
standing the timeline for development of a cryp-
plemented by NIST. NIST is responsible for devel-
tographically relevant quantum computer is critically
oping cryptographic standards, Federal Information
important to assessing risk, even if great uncertainty
Processing Standards (FIPS), and guidelines to
exists in any predictions now that must be revised
protect non–national security federal information
over time. Current implementations of cryptography
systems. These standards are also used widely outside
in communications will need to adapt to this new
the government to protect sensitive information and
computing capability as development progresses,
promote economic development and interoperability
especially where PKC is used.
nationally and globally (NIST, 2016a).

9
Cryptography in Communications the two numbers that are factors of a single large
Three types of cryptography are used often in com- number). As a result, users can easily generate and
munications: symmetric key cryptography, cryp- publish their public keys with reasonable confidence
tographic hash functions, and PKC.9 These methods that no one who sees them could obtain their private
are sometimes combined for security. They are not keys and read messages that were encrypted with the
equally vulnerable to quantum computing. public keys (Shenk, 2018).
In symmetric key cryptography, one shared secret PKC is often used along with symmetric key
key is used both to encrypt and to decrypt a message. cryptography and hash functions in common com-
The symmetric key is combined with data to create munication protocols, where PKC is used to securely
an unreadable, encrypted message, and only a person establish shared symmetric keys for message encryp-
who possesses the symmetric key can reverse this tion and hash functions are used to ensure message
process and obtain the unencrypted message. Both integrity. The security afforded by PKC allows for
parties to the communication must have this key, and networks where each user requires only two keys—
therefore symmetric key cryptography requires some the user’s public-private key pair—to securely com-
means of secure key exchange for use. Symmetric key municate with any other user on the network. While
cryptography is usually used for bulk encryption of this fixes some scalability challenges in principle,
data and for encryption of message contents. large-scale deployment of PKC must still deal with
Unlike symmetric key cryptography, cryp- practical challenges to user authentication and key
tographic hash functions are one-way cryptographic distribution. These challenges are overcome with a
functions, i.e., they are not meant to be reversed. concept called a public key infrastructure (PKI).
When a hash function is applied to a message, it
creates a much smaller text of a fixed size, known as Public Key Infrastructures
a digest or hash, that is unique to that message. Any A PKI is a construct used to establish identities in a
changes to the message, no matter how small, would network using PKC. In a PKI, credentials known as
generate a completely different hash. Hash functions digital certificates containing a user’s verified iden-
are largely used in communications to confirm that a tity and public key are issued to associate a person,
message has not been altered (Shenk, 2018). device, or organization with a particular public key.10
In PKC, each user has two keys that are mathe- Network users are able to engage in trusted commu-
matically related to each other. One of these keys can nication by providing their digital certificates, allow-
be shared publicly with anyone and is aptly named ing others on the network to verify their identities
the public key. The other key, called the private key, and send them messages encrypted with the public
is kept secret by the user. Any message encrypted keys. These certificates are issued by trusted third
with the public key can be decrypted only with the parties to the communication, certificate authorities
corresponding private key. As a result, anyone who (CAs), which provide this identity verification. While
knows a user’s public key can encrypt a message with CAs may delegate the responsibility for registering
that key and be assured that only the intended recip- users or issuing certificates to subsidiaries, they
ient, who holds the private key, can read the message. usually act as the guarantors of trust for the PKC
Because the two keys are mathematically related, it is infrastructure. (Thales eSecurity, 2018).
possible to determine the private key from the public Digital certificates and PKIs are the centerpiece
key, and vice versa. Even so, in practice, the private facilitating user authentication wherever public key
key remains secure because, while deriving the public cryptography is used, including on the internet.
key from the private key involves a computationally They are used in such a wide range of applications
trivial operation (like multiplying two large prime and systems that it is difficult to exhaustively iden-
numbers together), doing the reverse to obtain tify them. Examples include, but are by no means
the private key from the public key involves a very limited to, online banking, email, online gaming,
computationally difficult problem (such as finding e-commerce, smartphones, and cloud computing.

10
Digital certificates and PKIs are also deployed in
private applications, such as a corporation’s internal
network. They are used to secure code signing, veri-
If and when a quantum
fying the authorship and integrity of software before computer could derive
downloading and installing and enabling wide-scale
deployment of trusted update pathways, such as those private keys in relatively
used in computer and smartphone operating systems.
In short, they are a foundational element enabling a short periods of time,
wide swath of activities associated with our modern,
digital infrastructure, and they are predicated upon it would threaten the
the presumed difficulty in computationally deriving
a private key from a public key. If and when a quan-
trust and security of this
tum computer could derive private keys in relatively
short periods of time, it would threaten the trust and
entire infrastructure.
security of this entire infrastructure.

Risks from Quantum Computing


Quantum computing will not affect all types of cryp-
tography in the same way.11 Known algorithms will
security against attempts to break public keys,
enable quantum computers to improve performance,
but longer keys also require more computational
at a minimum, on two specific operations that are of
resources for routine encryption and decryption
particular concern for information security: number
operations using those keys. The quantum algo-
factoring (Shor, 1994) and database search algorithms
rithms change the resource scaling for breaking keys
(Grover, 1996). Quantum database search algorithms
such that using keys long enough to provide equiv-
will reduce the effective security strength of symmet-
alent security against a quantum computer would
ric keys and hash functions, but probably only mod-
quickly require impractical computational resources
estly. The best currently known quantum attacks on
for encryption and decryption using those keys.12
the strongest symmetric key cryptography protocols
This is the reason why current PKC implementations
can be countered by doubling the length of the sym-
ultimately become ineffective and impractical in
metric key. Similarly, the best currently known quan-
defending against a quantum computer (Wolchover,
tum attacks on the strongest hash functions can be
2015).
countered by increasing the key length by 50 percent
The vulnerability of public key encryption key
(Shenk, 2018). Furthermore, there is mathematical
schemes leads to two categories of risk. The first
evidence (though no rigorous proof) that this is the
stems from the ability of a quantum computer to
limit to the performance enhancement a quantum
break public keys such as those used in digital cer-
computer is capable of, i.e., no algorithm could be
tificates in a short time period, thereby threatening
found that is more effective than this (Zalka, 1999).
authentication. The second stems from the ability
The reduction of security in these methods against a
of a quantum computer to decrypt communications
quantum computer thus must not be disregarded, but
that were secure against attack at the time of trans-
doubling the effective key length generally does not
mission but were preserved in encrypted form—and
require a paradigm-shifting alteration in cryptogra-
so can be decrypted when a quantum computer
phy implementation to secure systems against attack
became available. We call the former just-in-time,
by a quantum computer.
and the latter catch now, exploit later or just catch and
The quantum enhancement in solving the com-
exploit.13 These categories are associated with differ-
putations behind PKC poses a much more significant
ent risks and different priorities for preparation, in
threat. Using longer key lengths provides increased
terms of what is vulnerable, what steps must be taken

11
to mitigate the vulnerability, and when those prepa- exploit this type of vulnerability may also be more
rations must take place. difficult in some cases because the cryptographic
problem may need to be solved in real time, rather
Just-in-Time Risks than after a period of hours or days. The negative
Just-in-time vulnerabilities are more potentially consequences from vulnerability to quantum attack
devastating because the vulnerabilities tend to under- are potentially more devastating, but they can be
mine trust in establishing identity and authentication completely mitigated if the vulnerability is fixed in
in systems that use PKC. For example, if a quantum time.
computer were used to obtain the private key for a
root certificate authority, a malicious actor could Catch Now, Exploit Later
issue digital certificates that could falsely identify Catch now, exploit later refers to transmitted data
themselves as nearly any entity on a network. They that do not have forward secrecy against quantum
could fake the digital signatures required for trusted computers. Data encrypted with PKC and transmit-
software updates and upload malicious software to ted prior to the creation of a cryptographically rele-
devices, impersonate financial institutions to initiate vant quantum computer could be intercepted, and,
fraudulent transactions or currency transfers, or gain while unreadable at the time of interception, these
trusted access to other networks that use PKI. Even if data could later be deciphered by a quantum com-
a root of trust such as a CA were not compromised, puter and read. The primary factor affecting the risk
each individual organization’s public key used for from this scenario is the length of time that trans-
signatures could be compromised on a case-by-case mitted information must stay secret. If data were
basis with more limited effect. transmitted now that must remain secret for 20 years,
Fortunately, in keeping with the label, systems but a quantum computer were created in ten years,
vulnerable to just-in-time decryption must merely then transmitting those data now using current PKC
make changes before a cryptographically relevant would incur risk. The value of some data quickly
quantum computer is used against them. Attacks that expires (for example, the number of a canceled credit
card), while other types of data have long-lasting
privacy and security implications (think of genetic

These categories information collected from a child who is now in


the workforce). We cannot confidently describe or

are associated with enumerate all the ways in which making today’s data
public years from now could be damaging, but exam-
different risks and ples might include
• embarrassing personal information
different priorities for • medical history or genetic information
• juvenile criminal records
preparation, in terms of • brand-damaging information (e.g., executive

what is vulnerable, what communications or drug trial data)


• sensitive intellectual property, including early

steps must be taken to research that may portend future research


avenues or development roadmaps
mitigate the vulnerability, • any information transmitted between cloud
data centers, potentially including between
and when those secure clouds used to transmit classified
information
preparations must take • State Department cables or communications
between Department of Energy laboratories
place.

12
• information on physical security protocols for are developed. This can be a lengthy and tortuous
facilities. process. New approaches that appear promising
The shorter the time between when informa- are subjected to attacks to look for vulnerabilities;
tion was transmitted using current PKC and when a occasionally, vulnerabilities are found and years of
quantum computer was created, the more useful that work must be abandoned. Such was the case with a
information might be to a competitor or malicious lattice-based scheme called Soliloquy, developed in
actor. Other factors will also affect the value of the 2007, after an efficient quantum attack against it was
information and the risk to an organization from its discovered by its authors (Campbell, Groves, and
revelation. Data at rest (i.e., not transmitted) will not Shepherd, 2014).
be vulnerable (unless it was previously hacked from Recognizing the potential threat from quantum
its source), and many organizations may expect that computing, NSA IAD announced that it would be
their old data will be of low priority for decryption preparing for a switch to PQC algorithms in its rec-
by an attacker with limited resources. Furthermore, ommended security protocols (NSA, 2015). It recom-
given the potential that only nation-state actors mended a halt to an ongoing transition effort toward
may have the resources needed to access and catch elliptic curve cryptography in anticipation of a future
network traffic then store data gathered through bulk standardization effort for PQC. Shortly thereafter,
collection for many years, it may also be true that NIST announced a request for nominations for PQC
only targeted rather than “dragnet” collection will be algorithms as the start of an effort to develop and
feasible while quantum computers are thought to be standardize one or more PQC algorithms for more
many years away. Nevertheless, the risk from retroac- widespread deployment (NIST, 2016b). Since the for-
tive decryption is likely to grow over time, and there mal call for proposals, NIST has received its first and
are organizations creating methodologies for assess- second round of submissions and held a conference
ing organizational risk from this threat (Mosca and on the subject in April 2018. Another standardiza-
Mulholland, 2017). tion conference and additional selection rounds are
currently planned, and the organization expects to
release a draft PQC standard between 2022 and 2024
Post-Quantum Cryptography (NIST, 2018b). While there are many other standards
PQC is a branch of PKC related to cryptographic bodies testing and analyzing PQC (Pecen, 2018), for
algorithms that are resistant to attacks by quantum the most part these groups appear to be waiting in
computers. Rather than using number factoring or anticipation of the result of the NIST process. While
discrete logarithms, which are vulnerable to known the U.S. federal government is typically required to
quantum algorithms, PQC implementations use a use the standards created by NIST, usually mandated
number of other approaches to PKC that are expected in the form of FIPS and NIST Special Publications,
to be secure even against quantum computers. Such industry and other standards bodies often adopt
approaches include lattice-based, code-based, hash- these standards as well in an effort to obtain the
based, and multivariate systems, among others (ETSI, benefits of cryptographic interoperability for
2015). Multiple articles, special journal issues (Aysu, national and global business and commerce. In many
2018), and conferences (PQCrypto, 2018) are now cases, these standards are also then adopted by the
dedicated to the subject. International Organization for Standardization (ISO)
While there is significant research effort on the (NIST, 2016a).
subject, these methods are newer and have received It is expected that new algorithms and crypto-
relatively little testing compared to currently used systems will be made public and rigorously subjected
cryptographic approaches. Given the potential for to attacks by the cryptography community for years
flaws to create unanticipated vulnerability, new before being recommended for further adoption by
security approaches need to undergo extensive standards bodies. After this point, industries and
testing by the cryptographic community after they organizations must make their own calculation about

13
when it is most prudent to sink the costs of transition web browsers are not planning to completely disable
to protect against an uncertain future threat. usage of TLS 1.0 and 1.1 until 2020, more than two
decades after the TLS 1.0 standard was published
Cryptographic Transition (Bright, 2018). The transition from IPv4 to IPv6,
Once a standard is created and published, a lengthy the communications protocol that identifies devices
process to transition systems to the new standard is communicating on the internet, has been underway
begun. The new standard may require significant for seven years, but only approximately 25 percent
changes at numerous places throughout the protocol of users use the new version (Internet Society, 2018).
stack14 that involve changes to software, hardware, Finally, the Advanced Encryption Standard (AES), a
or embedded data structures. Industries and orga- standard for symmetric key cryptography, was first
nizations must compare the potential costs of using published in 2001 (NIST, 2001). In a recent survey for
outdated cryptographic standards against the costs of NIST, the average adoption year of AES for surveyed
transitioning to the new standard. These may involve public- and private-sector consumers was 2014. Some
high switching costs, as new software must be devel- respondents reported adoption as recently as 2018
oped and purchased and hardware must be upgraded. (Leech, Ferris, and Scott, 2018). Given other adoption
Perception of high switching costs is often a driver patterns, it is likely the broader national adoption of
of delayed transition in industry (Leech, Ferris, and the standard will continue for some time.
Scott, 2018), and, historically, timelines for cryp- Each of the examples mentioned above has dif-
tographic transitions are measured in decades (NIST, ferent root causes for how the system or standard has
2017). Furthermore, newly purchased equipment, in evolved or been delayed. Some were delayed due to
particular national security system equipment, often failure to design systems for evolvability and future
has a lifespan of 30 years or more. Equipment that compatibility, while other timelines were actually
uses outdated cryptographic standards may there- accelerated by changes to industry rules or newer
fore delay introduction of the new standard until the versions providing added benefits to users, such as
equipment is replaced (IAD, 2016). performance improvements and improved security.
While cryptographic transitions often happen Some are different in kind from the others and will
quickly for the majority of users, complete switches be affected by different factors: the upgrade to IPv6 is
often have long tails for the nation (or globe) as a a network upgrade, as opposed to the others, which
whole as some organizations lag behind. SHA-2, a are protocol changes. These various timelines are
new standard for cryptographic hash functions, was nevertheless mentioned together in this way to illus-
standardized in NIST FIPS Pub 180-2 in 2002 (NIST, trate that infrastructure transitions such as these take
2002). In November 2016, 35 percent of websites were a great deal of time, usually evolving over decades.
still using certificates with an older standard, and the These drawn-out transitions come with costs
older standard was not deprecated by the major web in terms of vulnerability to cyberattacks. Failures
browsers until 2017 (“Venafi Research: 35 Percent of to discontinue old, vulnerable protocols or hard-to-
Websites Are Still Using Insecure SHA-1 Certificates update security embedded in long-lived systems are
and Putting Users at Risk,” 2016). Transport layer both examples of the cybersecurity risks that result
security (TLS), a protocol for securely communicat- from drawn-out transitions. While new standards
ing over the internet and computer networks, was offer better security, organizations continue using
first defined by the Internet Engineering Task Force the old standards for some time, even after they’ve
(IETF) in 1999 as TLS 1.0 (IETF, 1999). Subsequent enabled the new standard, to enable interoperability
releases of TLS 1.1 and TLS 1.2 occurred in 2002 and with other users or better performance. There is a
2008, respectively. In October 2018, major browsers class of cyberattacks known as protocol downgrade
reported around 1-percent continuing usage of TLS attacks, where an attacker forces a system to use an
1.0 and TLS 1.1, and another laboratory estimated older standard that has not yet been discontinued,
that 94 percent of sites supported TLS 1.2. The major then exploits a known vulnerability in it. Some
major attacks exploiting a vulnerability in MD5,

14
a popular hash function, are primary examples of
this. Researchers presented a vulnerability in MD5
in 2008 that allowed them to fake a legitimate CA
Where hardware
certificate (Sotirov et al., 2008). In 2012, attackers components are
used this vulnerability to forge a digital signature for
a Microsoft root authority, which enabled them to incompatible, they will
counterfeit Microsoft updates and upload malware
to Windows machines (Stiennon, 2012). Despite need to be replaced
this large, publicized attack, MD5 continued to be
used elsewhere and cause problems as recently as with new hardware and
2017, when the Latin American social networking
site Taringa was breached due to its continuing use
components that are
of MD5 (Leyden, 2017). The WannaCry ransom-
ware attack is an example of a different challenge
not yet developed, all
in implementing security in long-lived systems.
Microsoft offered a patch for a security vulnerability
of which will take time
in Windows systems shortly after being alerted to and incur costs that
it in 2017, but those systems that were beyond their
end-of-life did not receive the patch, and they were may further delay the
affected by the attack (Lee, 2017).
decision to transition.
Transition to PQC
The scope of the transition to PQC will not be known improves, and efforts are needed to systemically
until the standard protocols are released, but it is change how systems consume cryptography such that
likely to involve far-reaching changes. It may neces- new protocols can be more easily deployed, newly
sitate much longer key lengths, increased processing discovered flaws can be more easily addressed, and
times, and new data structures, any of which could greater interoperability can be achieved between
be incompatible with hardware or software through- varying cryptosystems. The term cryptographic
out the protocol stack. PKC and PKI are widespread, agility can include three types: agility in algorithms
and every device and network that uses them will (being able to swap in new ciphers), agility in proto-
eventually need to move to use the new standard cols (the ability to choose a different version of a pro-
to be secure against quantum computers. This may tocol, like choosing TLS 1.2 over TLS 1.1), and agility
involve a great deal of effort to inventory each place in implementation (the ability to update or replace
PKC is used, then closely examine the broad com- software that contains a flaw) (National Academies
patibility of components and software with the new of Sciences, Engineering, and Medicine, 2018a).
requirements. Where hardware components are Cryptographic agility comes with the potential
incompatible, they will need to be replaced with new benefits of lower transition costs and greater secu-
hardware and components that are not yet developed, rity due to ease in transitioning away from newly
all of which will take time and incur costs that may discovered security flaws, but it also comes with
further delay the decision to transition. potential costs if handled poorly. Mechanisms that
Such problems with cryptographic transitions support greater agility can quickly introduce much
are leading to growing calls for a focus on cryp- greater complexity, which can make it challenging
tographic agility and cyber resilience (i.e., resistance for operators to configure safely. If the number of
to failure due to cyberattacks). Cryptographic agility supported algorithms or protocols is not carefully
refers broadly to the acknowledgment that cryp- curated, systems could be configured to allow or
tography breaks over time as computing capability default to vulnerable versions. This was the case with

15
the FREAK vulnerability in TLS, where systems Results and Discussion
could be configured in a manner that allowed an
attacker to trick them into using a weak algorithm Interview Results Summary
(Beurdouche et al., 2015). Another potential risk to Our discussion here summarizes the major find-
agility comes from ossification. Ossification refers ings from the interviews and their implications for
to the phenomenon where aspects of a protocol policymakers. The interviews with the subject-matter
technically incorporate flexibility but, in practice, experts were structured such that quantifiable results
are used the same way so often that the flexibility could be obtained from discussions that were other-
is overlooked, and new tools are not developed to wise qualitative in nature. In addition to context and
accommodate it. When that flexibility is eventually insights from qualitative discussion of related issues,
used, it leads to incompatibility with other systems, the interviews yielded quantitative assessments of
as was the case when TLS 1.3 was deployed (Sullivan, development timelines and vulnerabilities. Weighting
2017). To summarize, while approaches to improve by expertise, we were able to obtain averages that
cryptographic agility carry great potential benefits, describe when experts expect the development of
agility must be promoted and implemented carefully a cryptographically relevant quantum computer to
to avoid pitfalls like these. Nevertheless, despite these occur, or when PQC will be adopted. Beyond the fol-
challenges, proper implementation of more cryp- lowing major findings, a full accounting of the results
tographically agile systems was recommended as an of the 15 interviews that we conducted with experts
absolutely essential means to improve overall net- and the methodology that we employed are given in
work security and, specifically, as a means to mitigate Appendixes A and B, respectively.
the threat from quantum computing. As one partici- While our major findings rely on the aggregation
pant in the workshop noted, “The best line of defense of the expert opinions, the details of our interviews
is being able to change things” (National Academies provide insight into the variation in expert opinions.
of Science, Engineering, and Medicine, 2018a). The variation observed in expert opinions is, in itself,
In the interim, the transition to PQC is likely a critical result describing the inherent uncertainty in
to be time-consuming, costly, and challenging. the expert assessments. Both the quantitative results
Products and systems will be developed and pro- and surrounding context in the interviews displayed
duced without new standards that may be used for a significant degree of variation in expert opinion on
many decades, potentially well past the time when a what is possible and what is likely to occur. In some
quantum computer is developed. Furthermore, orga- instances, the opinions differ widely—for instance,
nizations with data that must remain secret for a very some experts opined that a cryptographically rele-
long time will incur more and more risk from a catch vant quantum computer could be developed as early
now, exploit later vulnerability the longer they wait to as 2022, while others thought that at least 20 years
make the transition. were needed. Additionally, each expert prediction
was accompanied by significant uncertainty. For
example, the experts each reported best estimates

Our discussion here of their predictions, as well as ranges. The ranges


reported by each expert show that each expert is

summarizes the highly uncertain about the timeline of quantum


computing, PQC, and the potential effects of dif-
major findings from ferent scenarios of development. For this reason, we
refer interested readers to the greater details of the
the interviews and expert opinions described in Appendix A (p. 43). A
thorough justification of our methodology for and
their implications for
policymakers.

16
use of expert elicitation in producing the recommen- Vulnerabilities from Quantum
dations in this report is also provided in detail in Computing
Appendix B (p. 55).
The expert elicitation led to the conclusion that The insights gained from discussing hypothetical
the development of a cryptographically relevant scenarios in the expert interviews offer a useful
quantum computer is expected by the year 2033. illustration of real threats, vulnerabilities, and
More optimistic and pessimistic timelines were mitigating factors that would be extant in a range of
deemed possible, however, with six experts suggest- potential futures. We begin discussion by merging
ing it was at least possible that a cryptographically the results on expected vulnerabilities, sector risk
relevant quantum computer could be developed as profiles, adoption rates, and likely countermeasures
early as 2023—while half of the experts thought it and responses to create summary assessments of the
was possible such a device might never be created. real risks and lasting impacts that may be expected
Likewise, when asked when it was likely that a in each of the scenarios. In this manner, we hope to
cryptographic system capable of resisting quantum offer more complete pictures of what the future may
attack would be developed, the best estimate offered look like, given a few sets of decisions and assump-
by the most experts was that this would occur in tions, to emphasize the importance of the actions
2023. Most noted that (presumably) quantum-safe that can be taken now to positively affect the future.
algorithms exist already, but they are not yet stan- There are a number of interesting results, including
dardized for widespread implementation. The the perception from the experts that (for a variety
majority believed that PQC would proceed along the of reasons) the consequences for the defense and
schedule of NIST, which is creating a standard that intelligence establishment would be the least severe
is scheduled, but not guaranteed, to be completed of the four groups we asked about. We again direct
between 2022 and 2024. One expert believed that the interested reader to view more detailed results
truly secure responses to quantum computing might from the expert interviews in the Scenarios section of
never be presented, because any public key encryp- Appendix A (p. 43).
tion that was developed may eventually be shown
to be vulnerable to future quantum computing Scenario 1: Quantum Surprise
capabilities. In Scenario 1, which we title “Quantum Surprise,”
Experts considered the most critical issue to be a cryptographically relevant quantum computer is
timing of adoption of PQC. The weighted average created and used before a PQC standard has been
of the assessments placed near-complete adoption released, either as a result of a large covert program
of PQC (i.e., greater than 95 percent of organiza- or sudden leaps in capability generated by advance-
tions) for government and advanced technology ments and innovations in basic science and engi-
organizations in the mid-2030s, with less-advanced neering, followed by a “race to the finish.” It should
technology organizations lagging approximately five be noted that some have assessed that it is very
years later. Despite this average, the individual expert unlikely that a large-scale quantum computer could
assessments again showed significant variation, be developed in secret, implying that hypothetical
with early and late extremes thought possible across event may be unlikely (Encryption Working Group,
categories and wide variability expected even within 2019). However, this is due, in part, to the significant
sectors in terms of speed and adequacy of implemen- amount of development effort motivated by expected
tation. In the surrounding discussion, this issue also applications that are unrelated to cryptography,
frequently was assessed to be highly dependent on which may also increase the potential for sudden
a variety of external events and decisions by poli- leaps in capability. Ultimately, we assess that this is
cymakers that might induce significant changes in a low-probability scenario that, nevertheless, has the
adoption rate. potential for high consequences, and we opted to
query the experts about the risks associated with it.

17
There is no obvious analog for this scenario in to this quantum surprise could be significant. Vital
recent history, and the consequences would be severe. systems may be taken offline for periods of time
Were it to happen, experts thought it likely that the as a precaution, and trust in institutions would be
ability to authenticate identity on digital networks diminished. The scramble to hastily implement PQC
and assure secure communications would fail. would have long-term consequences in terms of poor
Describing the scenario, one said, implementations and expensive patch management
I think control over identity, cryptographically
extending many years. The opportunity for an effec-
protected identity, is lost. And cryptographic tive, robust transition enabling greater efficiency,
sequestration of the channel is lost. So all com- interoperability, and cryptographic agility would be
munication becomes transparent, and identity lost.
as necessary to gain complete control becomes Nevertheless, this disastrous scenario would
readily accessible. not end all security in networked communications.
Rather, we project short-term disruptions and
Indeed, many experts thought the loss of authen-
adaptations, a flurry of activity to mitigate the vul-
ticated identity was the most significant threat,
nerability, and a long period of dealing with fallout
suggesting that attackers would pursue control over
from compromised sensitive information, eventually
roots of trust in the system, such as private keys for
settling in to a less secure, less certain business-as-
root CAs, leading to complete loss of control in most
usual environment.
networked systems: “You just go for the controlling
asset, which is identity. And if you get that, then you
get it all.” High-value targets like the SWIFT network Scenario 2: PQC Standard Briefly Precedes
for financial services were expected to be vulnera- Cryptographically Relevant Quantum
ble. Defense and intelligence targets were expected Computers
to exhibit some degree of protection, but most other In Scenario 2, a cryptographically relevant quantum
organizations were expected to have little chance to computer is created and used within just a few years
protect their information systems. after the release of PQC standards. While organiza-
Consistent, repeated cyberattacks over a period tions that place the highest priority on information
of months or years, especially if they remained unde- security, such as defense and intelligence agencies
tected for some time, could disrupt digital commerce and critical infrastructure providers, have already
and banking, cause significant damage and loss of adopted PQC, most others have not. One expert said,
trust in vital records, and compromise reliable oper- “The idea that they’ll be able to procure systems
ation of vital infrastructure and communications. that they need and get them deployed within three
Loss of authentication in code signing could allow years of PQC standardization, I think, borders on
attackers to perform wide-scale distribution of mal- zero.” Significant vulnerability would remain across
ware. While systemic institutional crashes of entities sectors.
like the power grid or financial system are unlikely In this scenario, however, adequate security
given the planning, coordination, and resources that solutions are available in many cases, including
would be required to execute attacks in quick succes- many core information technology (IT) protocols
sion using immature quantum computing technol- like TLS, which will have moved quickly to include
ogy, widespread damage and disruption would still PQC. Experts thought the IETF, its research group,
be possible. Beyond these short-term disruptions, the Internet Research Task Force, the Crypto Forum
the consequences from loss of secure communica- Research Group (CFRG), and other similar orga-
tion and decryption of very recent communications nizations would accept the standard NIST PQC
would project vulnerability of unknown magnitude algorithms and quickly incorporate them into the
well into the future as they were exploited. protocols they manage. These will be online quickly,
Even if few attacks were made or little actual even if old versions will take decades to phase out.
damage done, negative consequences from reaction Once a quantum computer is created, organizations

18
will quickly realize the need for these solutions and for many years beyond this point, especially where
may move to implement them. products have long development and deployment
Ideally, ready availability of standard PQC- life cycles and where manufacturers may not proac-
enabled security solutions will enable a significant tively prioritize security against quantum computers.
degree of interoperability and faster adoption, miti- Furthermore, these lingering vulnerabilities would
gating the major disruptions expected in Scenario 1, offer additional attack vectors enabled by a quantum
even if major cyberattacks and vulnerabilities from computer, layered on top of those available today.
very recently captured communications cause signif- Experts thought that Scenario 3 offered the best-
icant problems. The question is how quickly organi- case scenario. Not only would a PQC standard be
zations will adopt PQC and new protocols, once they available and a transition well underway by the time
become available. Historically, many “early mover” a quantum computer was created, but the United
organizations have quickly adopted new protocol States would also have the opportunity and incentive
standards once they are released, though late- to take some very beneficial proactive measures to
adopters may take years. Due to the novelty, com- generally improve cryptographic infrastructure. The
plexity, and scope of this transition, the early movers move to PQC could be initiated with enough time to
may also be vulnerable, albeit to a lesser degree, even enable a robust transition that was not rushed. If the
after implementation of PQC in the initial systems. threat from quantum computers were taken seri-
Taking measures to spur faster, more robust adoption ously enough, organizations could collectively push
of PQC as soon as a standard is available will help to out timely, adequately implemented PQC solutions,
mitigate the risk in this scenario. incorporate them into life-cycle security manage-
ment, and take advantage of the opportunity afforded
Scenario 3: PQC Standard Significantly by the transition to build greater cryptographic agil-
Precedes Cryptographically Relevant ity into our systems. As a result, despite the inevitable
Quantum Computers layering of quantum computer vulnerabilities on
In Scenario 3, a cryptographically relevant quantum top of current cybersecurity vulnerabilities, experts
computer is created and used approximately a decade thought this scenario at least had the possibility of
after the release of a PQC standard. In such a sce-
nario, it is assumed that a widespread transition to
PQC is well underway. Following historical patterns,
however, there remain many organizations that have
Scenario 3 was
lagged in updating their security. Many long-lived assessed to be
or hard-to-update products still use vulnerable PKC,
and some organizations have waited to adopt PQC the closest to the
“by default” through their normal technology refresh
cycles. current status quo
Scenario 3 was assessed to be the closest to the
current status quo of cybersecurity vulnerability, of cybersecurity
though most experts suggested that scenario would
still be at least slightly worse than today. Despite a vulnerability, though
decade to prepare, historical precedent suggested that
a transition to PQC would still be incomplete. “Even
most experts suggested
after ten years, there’s still been, historically, some
things [that have] lingered on that no one’s ever paid
that scenario would still
much attention to, which could be a potential vul- be at least slightly worse
nerability,” one expert said. Many systems deployed
with vulnerable cryptography would be in operation than today.

19
leaving us as secure as or more so than today. This captured information might ultimately be used to do
would entirely depend, however, on appropriate them harm. One expert said, “I don’t know exactly
government and commercial prioritization and risk how cyber criminals and various actors are going
management of the threat from quantum computers. to exploit this information and make money off it
If the threat is not taken seriously, the United States or hurt people or advance their political objectives,
is expected to be less secure in this scenario than it is because it’s such a foundational and new thing.”
today. One expert summarized it as follows: While some of those interviewed downplayed the
If enough of us deal with life-cycle manage-
significance of this issue in the later scenarios, where
ment, we’ll actually have a stronger crypto any communications would be many years old by
foundation. Things will be a little bit better. If the time they were decrypted and read, many others
most people just procrastinate, wait until the suggested that not only was the risk significant, but
threat is staring them in the face, then it’ll be a we would be dealing with the effects of it for years
little worse than we have today. or decades to come. Regardless of the uncertainties,
they generally thought risk minimization demanded
that PQC implementation be done as quickly as pos-
Cross-Cutting Issue: Catch Now, Exploit Later
sible, and they thought that individual organizations
Discussion of the scenarios was largely limited to should do risk assessments to quantify the organiza-
vulnerabilities in authentication and issues that must tional risk they faced, based on potential timelines
be resolved just before the use of a quantum com- for quantum computing development, the sensitive
puter. During discussions of these scenarios, experts information secured with PKC, overall organiza-
also pointed out issues that were not confined to one tional usage of PKI, and who potential threat actors
particular scenario but would, instead, be relevant in might be.
many. The risk from information that was captured
now and decrypted once a quantum computer was Mitigating Factors
created, in particular, was seen as a vulnerability that
Note that, for each of the scenarios, we asked experts
was extant in all three scenarios. Experts pointed out
to assess a level of risk or vulnerability assuming no
that risk from this issue was present already for many
additional countermeasures were taken aside from
organizations, and it would be worse the shorter
adequately implementing PQC. However, experts
the gap ultimately was between when PQC was
also pointed to a number of mitigating factors that
implemented and when a cryptographically relevant
would limit the real vulnerability that might be
quantum computer was created. Furthermore, they
experienced, should a threat actor possess a quantum
expressed considerable uncertainty as to the degree
computer.
of the risk, both because risk would vary consider-
Several experts spoke of the realistic limitations
ably from organization to organization depending
that should be expected of a quantum computer
on their particular sensitive assets and use of cryp-
with a nascent capability relevant to problems in
tography, and because it was uncertain how any
cryptography. At first, such problems would likely
be challenging even for highly resourced adversaries,
requiring specialized teams of experts for operation.
"If enough of us These applications would likely also be computa-
tionally resource-intensive, and experts thought that,
deal with life-cycle at least at first, solving any one cryptographically
relevant problem, such as breaking a strong public-
management, we'll private key pair, would take weeks or months. Under
those circumstances, any adversary in possession of a
actually have a stronger cryptographically relevant quantum computer would
need to rigorously prioritize targets, pursuing only a
crypto foundation."

20
few of the highest-value targets for months or years against a dedicated adversary with a quantum com-
after the initial use of the device. As the technology puter, but it would make the organization a harder
improved and constraints were reduced, the list of target and mitigate risk while it transitioned to PQC.
targets or potential targets would expand, but there Organizations could also reduce their attack surface
might be a phase where the capability remained by minimizing use of public key cryptography or
limited even as its existence became more and more temporarily limiting the transit of encrypted data
widely known or suspected, providing both opportu- to trusted networks. In extreme cases, alternate key
nity and motivation for the majority of organizations distribution methods such as symmetric key distri-
to move to PQC. bution schemes with trusted couriers could be used.
The target triage induced by resource constraints Any of these actions, from the minor to the extreme,
might also disproportionately affect vulnerabilities will carry efficiency costs over the status quo, but
from past communications awaiting decryption by a they could provide effective temporary risk mitiga-
quantum computer. One expert pointed out that if an tion while organizations transition to a longer-term
adversary is capturing encrypted traffic, there may solution.
be a considerable volume of it awaiting decryption. Key Takeaways: Time is of the essence when
Furthermore, it may be very difficult to distinguish implementing PQC for key exchange in communi-
what are likely to be valuable communications from cations. It is critical to have implemented PQC for
uninteresting ones in intermingled encrypted traffic. authentication and other just-in-time risks by the
Finally, new, ephemeral public keys are often gen- time quantum computers become a realized threat,
erated to protect new sessions of communication, but, barring significant technological leaps in secret,
potentially leaving only a small yield of valuable it is likely that most systems will implement this
information from breaking any one key.15 Unless an in time. Risk from communications that could be
adversary has some way of knowing that breaking the captured now and decrypted later, however, is already
public key protecting one particular stream of com- present and will only grow the longer a transition to
munications will yield valuable information, they are PQC in key exchange is delayed. Some exceptional
more likely to go after other, more clearly beneficial organizations should already be considering imple-
targets at first, at least until the technology is more mentation of PQC, even before a standard is ready,
efficient at attacking cryptographic problems. This due to the high sensitivity of information they hold,
may reduce the risk from this vulnerability for many while the majority should at least be taking prepara-
organizations considerably, as captured information tory steps for transition, such as inventorying their
from lower-value targets will be allowed to languish use of PKI and performing organizational risk assess-
in an unreadable state until well after it might have ments. Organizations that have very little use of PKI
been useful. or PKC may have little risk and could afford to wait,
As soon as the first attack enabled by a quantum while others with extensive transmission of sensitive
computer became known, and perhaps as soon as its information using these methods may need to act
existence was suspected, many organizations that as soon as possible. Each organization should assess
had not yet implemented PQC could begin to take organizational risk from quantum computers today,
short-term precautionary measures to protect them- taking into account attack surface, the sensitivity of
selves. Organizations could institute policies and information touching a PKI, how long that informa-
controls that would afford a degree of risk mitigation tion must stay secure, and who the threat actors are
while the long-term solution of PQC implementation expected to be.
is put in place. For example, a CA might rotate its
public key on shorter time scales of weeks, instead of
months, or greater certificate transparency systems
could be put into place to identify (though not pre-
vent) attacks.16 As quantum computing capabilities
improve, this would eventually prove insufficient

21
Implications of Quantum Computer like number factoring are possible. If more efficient
Timeline algorithms are discovered, they could substantially
reduce resource requirements, thus allowing a less
On average, experts suggested 2033 as the most likely capable quantum computing system to be relevant for
date for the creation of a cryptographically relevant cryptographic problems and advancing the timeline
quantum computer, and this is consistent with other for a cryptographically relevant quantum computer.
estimates in the literature. A 15-year development Faced with such a situation, several have sug-
timeline is sufficiently far away to acknowledge the gested that a probabilistic, risk-management response
significant science and engineering hurdles, known is necessary (Mosca, 2015). Risk management for
and unknown, that must yet be overcome. At the threats from quantum computing must account for
same time, it is temporally near enough that the low-probability, high-consequence extremes, as well
security implications of its creation can no longer be as more likely decades-long timelines. As one of our
easily dismissed, especially considering preparatory interviewees noted, “Security is kind of risk-based
measures that may have very long lead times. these days, so you have to prepare for eventualities.
There are many unknowns remaining in the The effort that you expend is essentially proportion-
development roadmap that make predictions dif- ate to the risk you perceive. From a security invest-
ficult, and this is reflected in the wide range in the ment perspective, it doesn’t really matter. If there is a
possible timelines given by the experts we inter- risk there, then we need to prepare for it.” Such a risk
viewed. Experts noted that early or late extremes in management approach would require a risk assess-
the development timeline were possible. Very near- ment of the type described by Mosca and Mulholland
term development timelines within the next decade (2017), also described in the NAS report on quan-
were considered possible, as was the possibility that tum computing (NAS, 2018a). Such a risk assess-
development of a cryptographically relevant quan- ment would necessarily involve taking into account
tum computer could ultimately prove physically individual organizational vulnerability to a threat
impossible. Unpredictable, sudden leaps in capability from quantum computers, an assessment of who
may be possible due to new basic science discoveries. the relevant threat actors are who have both ability
This nonlinear advancement in capability could also and motivation to seek sensitive information using
then be compounded by the race to the finish effect a quantum computer, and how soon a cryptographi-
if the technology is perceived to be close to feasible, cally relevant quantum computer will be developed.
meaning significant money and effort are put toward The development timeline for a cryptographically
making the last steps in development to claim a his- relevant quantum computer will need to be period-
toric victory. The opposite is also possible; research ically reassessed as developmental milestones are
investment in quantum computing may stall due to reached, and elicitations of expert opinion such as
perceived lack of progress. this one will continue to be instructive in this regard.
The assessment of what constitutes cryptographic Key takeaways: While estimates for the arrival
relevance is also subject to change. Current estimates of a cryptographically relevant quantum computer
of quantum computing resource requirements are continue to be “about 15 years away,” experts sug-
based on variants of Shor’s algorithm, and, unlike gest the timeline has both early and late extremes as
quantum database search algorithms, Shor’s algo- possibilities. Moreover, there are known near-term
rithm has not been shown to be optimal for num- technological milestones and resource estimates for
ber factoring. There is ongoing research into more what constitutes cryptographic relevance, which can
efficient algorithms; variational quantum factoring is be used as markers to update the expected timeline
one such example (Anschuetz et al., 2018). Quantum over the next decade and reduce uncertainty over
computing and quantum algorithm development are time. Those concerned about the arrival of quan-
relatively young fields compared to general compu- tum computing, especially those responsible for risk
tational complexity theory, and it may yet be shown reduction measures that may take years or decades
that much more efficient algorithms for problems to implement, should conduct quantum computing

22
risk assessments and continue to closely follow these
markers to minimize the chance of being surprised. "Quite frankly, there's
Implications of PQC Adoption Timeline always going to be
A Challenging Transition some old piece of
Experts pointed to durations of prior cryptographic
transitions and challenges associated with those equipment that no one
transitions to justify their expectations regarding
adoption timelines. The recent NAS report on quan-
remembers, which still
tum computing also provides details on the many
steps and challenges involved in a transition to PQC
is going to use the old
that may draw it out over decades (NAS, 2018b). The
transition to PQC is an umbrella term for the many
standard."
cryptographic transitions that will need to take place
across the entire networked communication infra- private networks, will also need to undergo similar
structure, in every PKI instance, and it will include PQC transitions.
several significant transitions that are similar or While the requirements of the new standard will
more expansive in scope compared to these histori- not be fully understood until it is released, experts
cal examples. For example, once a PQC standard is thought there was reason to suspect that some of the
released, protocols like TLS will need to incorporate changes may make transitions especially challenging.
those algorithms. One expert suggested that, opti- Built-in assumptions in software and hardware, such
mistically, it would take three years to integrate PQC as assumed key lengths or digital signature sizes, may
into a new TLS protocol. Most organizations would be incompatible with the PQC standard and render
likely adopt the new TLS protocol within a few years, systems incapable of handling PQC as a drop-in
but this protocol will need to be nearly universally replacement. Many of these will be able to be some-
adopted before previous, vulnerable protocols can be what easily adapted to accommodate a PQC stan-
phased out. TLS 1.0 will have taken roughly 20 years dard, especially where only minor software changes
before it is finally phased out, so, realistically, if a were concerned, but several examples were given of
PQC standard is released around 2023, as expected, more intractable problems that may be encountered.
vulnerable TLS implementations will likely still be in These included things like unpatchable signature
use in the mid-2030s. One expert noted how chal- validation code in processors, embedded data struc-
lenging it can be to remove vulnerabilities from old tures in every operating system executable file that
standards: cannot handle a PQC key length, and parts in trusted
platform modules or hardware security modules
Quite frankly, there’s always going to be some
that have no flexibility to handle other encryption
old piece of equipment that no one remembers,
schemes. One expert said,
which still is going to use the old standard. It
took us until a couple years ago to get rid of I fear that there are built-in assumptions
MD-5 certificates even though they could have in software stacks all over the world that
a number broken . . . so that’s broken for like say public keys are never larger than 4,096
15 years. . . . It just takes so long to get rid of bits, because that’s the largest practical RSA
these older standards. key somebody uses. . . . But what happens
when you’re using a lattice-based public key
TLS governs only some types of networked
post-quantum scheme where you’re talking
communication security, however, and multiple other about keys that are on the order of nine to
protocols all along the protocol stack, such as those 10 kilobytes, and you all of sudden break
governing internet protocol networks and virtual databases, and you break software, and the

23
software’s got to get patched? These aren’t the end client can actually use it.” It is not enough to
necessarily drop-in replacements. implement PQC into your own products if you buy
Such problems could require years to develop from component suppliers or partner with third par-
and acquire new hardware and software before wide- ties that don’t implement it. Especially in the case of
spread implementation could begin, even for those long-lived products with many components and long
willing to pay the significant transition costs. design and development cycles, failing to quickly
Finally, some experts noted, in particular, demand PQC in partners could embed vulnerable
the challenges of implementation beyond devel- security into products in the field for decades to
opment of standards and potential hurdles due to come.
more demanding requirements. New protocols and Figure 1 displays notional timelines portray-
algorithms often undergo years, even decades, of ing how products with long lifetimes and extended
testing for vulnerabilities before they are trusted to development life cycles will extend vulnerability to
be secure. Due to the immaturity of PQC protocols, quantum computers far into the future.17 The figure
several experts thought the PQC transition would portrays the relative percentage of products “in the
need to go through two phases: an initial phase, in field” that will employ vulnerable cryptography after
which hybrid security schemes using both trusted a quantum computer is created. We use the average
conventional protocols and PQC protocols were predicted date for the creation of a cryptographically
implemented, followed by eventual transition to relevant quantum computer from the expert elicita-
PQC-only once the protocol’s security against con- tion as a benchmark for the start of vulnerability in
ventional threats was assumed. One expert stated, “I these systems and use NIST’s future release of a draft
would not feel comfortable risking our infrastructure PQC standard as the reference point. Development of
and customer data on the classical resistance of these new protocol standards like TLS that incorporate the
postquantum schemes.” Furthermore, several experts PQC algorithms and development of new hardware
noted the daunting number of applications that will like hardware security modules that facilitate imple-
need to be updated. Some noted this in a general mentation of PQC are assumed to begin shortly after
way, saying “[standards] have to be embedded into the release of a PQC standard, and experts thought
your banking applications. Your web browser has new standard protocols would be ready within
to have its own crypto library that supports every- approximately three years. Adoption of PQC into PKI
thing post quantum. It has to be into your mobile is assumed to happen quickly for many organizations
apps, your chat apps. So, the application part of the after that, though with a long tail extending 25 years
standards would be the thing I would be worried from the release of a new standard. As a result, when
about.” Others were more specifically focused on quantum computers are created, most instances of
challenges with tracking a large organization’s appli- PKI will have transitioned to PQC. Internet of things
cations or components, especially when partnering (IoT) devices, automobiles, and aircraft are used
with many suppliers and third parties: “Where the as notional examples of some long-lived products.
challenge comes in for us is around having a really Each will have varying durations of average prod-
solid inventory of knowing where we’re using PKI. uct development life cycles and product lifetimes.
We’ve got 2,600 applications that we're running. Each Modifications of drop-in software-based systems
of those are talking to each other and third parties. I in vehicles often require at least two years of devel-
think all companies of this size sort of struggle with opment and testing, and incorporation of PQC into
keeping a really good inventory of what's running vehicle security may be much more complex (Porges,
and where.” The need to assure that every node in 2015). In particular, systems-of-systems products like
the supply chain or communication and processing automobiles and aircraft will be likely to have signif-
infrastructure implements PQC came up several icant development work stretching over many years
times. One expert said, “You have to enable quantum to incorporate PQC, especially where such work will
resistant crypto in complete supply chains before require design and production of new hardware, such
as a specialized vehicular hardware security module

24
FIGURE 1
Notional Timeline of Vulnerability in Long-Lived Products and Systems

Mandate for PQC PKI employing vulnerable


adoption announced cryptography in use
PKI Use of old, vulnerable
standards discontinued

Design cycle for


first IoT products Vulnerable IoT devices
with PQC “in the field”
IoT Expected end-of-life for
last vulnerable IoT device
First IoT device Default on IoT Assumed IoT device
with PQC is PQC lifetime is 15 years

Vulnerable vehicles
Design cycle for first “in the field”
vehicles for PQC Expected
end-of-life for
Automobiles last vulnerable
vehicle
First vehicles Default on vehicle Assumed vehicle lifetime
produced with PQC is PQC is 20 years

Vulnerable aircraft
Design cycle for new “in the field”
aircraft with PQC

Aircraft Expected
First aircraft Default on Assumed aircraft lifetime is 30 years
produced with aircraft is end-of-life for
PQC PQC last vulnerable
aircraft

Year 0 +5 +10 +15 +20 +25 +30 +35 +40


NIST releases Average predicted
Standard PQC date of quantum
Protocols computing creation
NOTE: IoT = internet of things.

needed to protect in-vehicle electronics control units products with extended development life cycles or
and communications (Wolf and Gendrullis, 2011). product lifetimes.18
The result of these factors is the creation of products
that will persist in the field for decades with security Factors Affecting Adoption
that is vulnerable to quantum computers. While Given the expected challenges with the coming
expensive programs to recall or retrofit vulnerable cryptographic transition, we also discussed factors
systems could be executed, the figure assumes the that could affect the rate of adoption. We discussed
most likely scenario is one where systems are instead factors that could slow or accelerate adoption rates
gradually replaced with products employing PQC and solicited suggestions from experts on ways to
once they reach their end-of-life. This notional figure spur faster, more robust adoption of PQC. Some
is meant to highlight the importance of prioritizing experts pointed to the importance of getting certain
adoption of PQC to reduce the scope of vulnerability aspects of the standardization process correct. They
to quantum computers, especially in industries or worried that releasing too many acceptable protocols
in the PQC standard could cause interoperability

25
continued to be perceived as decades away and no
One expert stressed near-term threat was perceived. Experts thought that
perceptions of high switching costs, coupled with a
that "seconds matter, collective lack of urgency in some sectors, would lead
many organizations to be very slow to adopt, with
and whatever the many organizations adopting only “by default.” By
this they meant that organizations would not take
solution is it should not any specific action to adopt. They would replace cur-
rent systems in normal technology obsolescence and
add to that, or people replacement cycles, and only when all replacement

just won't adopt it." systems on the market used PQC as the default would
a de facto switch to PQC happen. “What they’re most
likely going to do is not actually replace their cur-
challenges and vulnerability due to greater com- rent technology or update it, but basically buy new
plexity. Relatedly, they thought that if the interna- stuff as old stuff . . . is no longer supported or doesn’t
tional community did not follow suit with the PQC work anymore. And so you’re going to have . . . a long
standard, there would be additional interoperability period of time where they basically replace things by
problems and challenges for industry, all of which parts.”
would slow adoption. Several experts noted, as well, The experts we interviewed also noted factors
that inadequate regulation and mandates or lack of that could serve to speed adoption. One of the most
effective, consistent enforcement and compliance common such opinions was the widespread per-
measures would likely lead to slower adoption. Other ception that the threat from quantum computing
experts worried about the effect of the new stan- is imminent. While experts often noted the need to
dard on factors such as processing time for financial have realistic threat projections and avoid fearmon-
transactions. Overall speed of processing was seen as gering, they suggested that helping organizations
a key performance metric, especially for large finan- understand the real vulnerability they face now and
cial institutions and payment processors, and any in the near future would serve to speed adoption of
solution that increased processing time was seen as PQC once a standard was released. In tandem with
less likely to be quickly adopted. One expert stressed this, some noted that effective regulation, mandates,
that “seconds matter, and whatever the solution is it enforcement, and incentivization could further
should not add to that, or people just won’t adopt it.” speed adoption. They noted that intellectual prop-
Recent research on adoption of AES suggested erty claims on cryptography protocols had hindered
that industry perception of high switching costs was adoption of promising technologies in the past and
a significant factor delaying adoption in that transi- were hopeful that the NIST PQC standardization
tion (Leech, Ferris, and Scott, 2018), and the concern activity was explicitly favoring algorithms whose
over high transition costs for infrastructure and owners were committed to licensing them without
security systems in the PQC transition was echoed compensation (NIST, 2017). It was also expected that
by many of the experts we interviewed. Particularly if a strong, cascading increase in adoption might be
transition involved the development and acquisition observed if a few key players in various industries
of new hardware required to alleviate challenges due adopted early, as others followed suit due to compet-
to increased complexity, demanding cryptographic itive pressure. In particular, if a few large financial
requirements, and increased processing times, institutions or defense contractors moved to adopt,
experts thought that transition costs could be signifi- experts expected that it would cause something of
cant. Finally, experts suspected there may be a collec- a “phase transition” in their industries, in which
tive lack of urgency to mitigate the threat, especially many others would follow suit. One said, “You don't
if cryptographically relevant quantum computers need everybody to do it. You just need enough of the
key players. . . . Everyone else can cut and paste, but

26
you do need a critical mass of serious people to do it each step in the framework (NIST, 2018a). Updates to
right.” Others also noted the possibility that better this framework and its references would be a key step
security adoption could be incentivized by agree- in broadly shifting priorities and strategies toward
ments that hold partners responsible for security protecting our infrastructure from vulnerabilities to
failures if they failed to adopt PQC. Experts pointed quantum computers. NIST FIPS 140-3, which details
to examples such as agreements between payment security requirements for cryptographic modules, is
processors and merchants such that payment proces- also a critical document defining relevant standards
sors are responsible for fraudulent transactions, but (NIST, 2019). The GSA, in support of its mission to
merchants are instead held financially responsible deliver value and savings in acquisition, technology,
if they have not used the most secure authentication and other services across the government, regu-
methods. Finding similar creative ways to incentivize larly publishes an IT Strategic Plan. This document
partners and suppliers to adopt PQC could speed outlines the vision and mission of the organization
more widespread adoption. pertaining to IT and defines strategic goals and
The U.S. government has organizations that can objectives in this space. One of these goals in the
be instrumental in driving change in our commu- latest IT Strategic Plan is strengthening cybersecu-
nication and IT infrastructure, and action by these rity by improving awareness and understanding of
organizations will likely be critical in motivating cybersecurity compliance, threats, and impacts and
changes associated with PQC adoption in response enhancing cybersecurity controls and tools (GSA,
to central coordination. NIST (with support from 2018). As the centralized procurement body for the
the NSA), the Department of Homeland Security's federal government’s IT infrastructure, the GSA
Cybersecurity and Infrastructure Security Agency could have a critical role in driving change in cyber-
(CISA), the National Telecommunications and security posture and priorities needed to prepare for
Information Administration (NTIA), the General PQC adoption if directed appropriately. Finally, the
Services Administration (GSA), and the Office of OMB’s mission is to implement and enforce the U.S.
Management and Budget (OMB) all have had key President’s policy across the government. It carries
convening roles or standard-setting authorities in out key management processes, having oversight
this space. of agency performance, federal procurement, and
NIST and CISA, in particular, have critical IT, which includes privacy and security concerns.
roles in convening stakeholders in government and In addition, it is tasked with coordinating and
industry to provide leadership, share information, reviewing significant federal legislation to ensure
and collaboratively address IT-related security issues. impacts reflect presidential priorities (OMB, 2018).
CISA is responsible for broadly coordinating gov- Historically, tasks within the Office’s purview have
ernment and private sector organizations to provide included relevant actions like giving guidance on
comprehensive cyber protection, infrastructure implementation of legislation modernizing govern-
resilience, and national risk management (CISA, ment IT (Mulvaney, 2018) and laying out key respon-
undated) and will likely be a key player in any efforts sibilities and authorities of agency chief information
to respond to IT security risks from quantum com- officers (CIOs) (Lew, 2011). CIOs, in particular,
puters at a national level. In addition to its convening would likely be responsible for directing changes to
role, NIST provides an abundance of documentation agency IT systems to accommodate PQC transitions.
detailing standards and guidance for implementing CIOs drive the investment process for IT and are
information security. The standards it produces responsible for assuring information security for
are for the U.S. government, but they are often also information systems supporting the agency’s mission.
adopted and used by the private sector. A primary Ultimately, we identified multiple suggestions
example is NIST’s Framework for Improving Critical from the experts we interviewed on actions that
Infrastructure Security, which gives guidance on could potentially be effective in spurring faster, more
establishing good cybersecurity and points to many widespread, more robust adoption of PQC.
other informative references and publications on

27
Take actions to make PQC standardization as cloud service providers, and waivers for the provision
broadly interoperable as possible. Experts were con- were granted too often. For critical infrastructure
cerned that any factor that hindered broad interop- that is already heavily regulated, this may be a matter
erability of a PQC standard would ultimately slow of designating PQC is a priority for those already
adoption. They noted that NIST’s ongoing standard- assuring compliance with regulation. Finally, experts
ization activity allows it to choose multiple algo- pointed out the difference between mandating the
rithms that are allowable in the final standard. They transition and assuring adequate implementation
worried that allowing too many algorithms would and suggested the additional need for legislation that
introduce variability in implementation that would would provide a certification scheme for implemen-
make it difficult to coalesce on a common, interop- tations of PQC. This could also help to counteract
erable implementation. While releasing a single algo- the potential for vulnerabilities from added complex-
rithm each for public key encryption and signatures ity due to parallel efforts to increase cryptographic
in the standard was preferred, experts thought gener- agility.
ally minimizing the number of allowable algorithms Industry should take proactive steps to pre-
would be beneficial. Once the standard was released, pare itself for the PQC transition and promote
experts also noted the need to follow through on tak- cryptographic agility. NIST has recently published
ing the standard to the ISO to create an international a cybersecurity framework that is intended to help
standard. Experts hoped that an effective interna- organizations identify, assess, and manage cyber-
tionally interoperable standard would further serve security risk, and risk from quantum computers
to promote adoption. Finally, experts were concerned should be included in any organizational activities
that the standardization activity might be under- applying this framework (NIST, 2018a). At the least,
funded and advocated continued, sufficient funding organizations should consider making efforts to
to finish the activity well and on time. inventory their own use of PKC that will need to be
Create effective regulation and enforcement transitioned. For organizations that rely on many
to compel and incentivize widespread adoption. partners, suppliers, and other third parties, uses of
Experts frequently suggested the need for effective PKC external to the organization should be assessed
regulation to promote adoption once a standard was as well, because if externally controlled products
released. They suggested beginning with regulation and applications are vulnerable, it is likely that the
mandating quick deployment of PQC for govern- prime organization’s are too. NIST’s framework
mental organizations and critical infrastructure. pays special attention to supply chain risk manage-
They also suggested that government lead the effort ment, and assessment of supply chain risk must take
by requiring PQC to be the default for all companies quantum risk into account. Where unacceptable risk
that sell hardware or software to government custom- is assessed to networks using public key cryptogra-
ers, eventually requiring they swap out any products phy, organizations may need to consider temporarily
that use current public key cryptography algorithms. moving some communication or information to
They pointed out that relying on market forces to trusted networks that do not use PKC. Organizations
push commercial organizations to adopt would often with extensive supply chains and partners should
result in companies not adopting until they were create a plan to push partners to transition to PQC
breached, whereas a government-led transition could as well, once a standard is released, and may need to
force more proactive measures. Experts were quick to consider shortening the supply chain and creating
note, however, that this would also require consistent, more products “in-house” for a time if partners do
effective enforcement. They cited the example of the not transition. Many of the experts frequently dis-
recently halted government-led transition to elliptic cussed the PQC transition as a unique opportunity
curve cryptography, noting that the mandate that to collectively move toward greater cryptographic
governmental organizations and partners use elliptic agility. They suggested that how applications “con-
curve cryptography was not sufficiently enforced on sume” cryptography has not changed for decades.
all parties, including software companies, CAs, and Moreover, the transition to PQC will likely involve

28
some large, complicated, and widespread systemic
changes to cryptographic implementations and will
therefore present an opportunity to make broader
Industry should take
changes that will make future transitions easier. One proactive steps to
expert summarized this saying, “We have the oppor-
tunity with this quantum threat and the fact that prepare itself for the
people have to transition. We have the opportunity to
look at how we take that crypto agility step, because PQC transition and
that’s the step that people won’t take without some-
thing like this pushing them.” If industry can create promote cryptographic
systems that need only conform to cryptographic
policy approaches such that they use cryptography by
agility.
making calls to cryptographic libraries that meet cer-
tain requirements and can be quickly swapped in or will slow it down. Everything will cost time and
out as necessary, they can be made to be agnostic to money, including creating the standard, embedding
the underlying cryptographic algorithms and spec- new protocols into hardware and software, actively
ifications. A recent National Academies workshop adopting the new standard, and assuring adequate
on cryptographic agility and interoperability exam- implementation. Without action that mandates or
ined more details and guidance on such approaches. incentivizes these steps, adoption will likely take
While more agile cryptographic systems can carry decades, leaving significant vulnerabilities through-
additional risk due to greater complexity, in general, out the national infrastructure. There is a need for
proper implementation of more agile cryptographic policies that mandate adoption for government and
systems was thought to be critical in making systems government customers, provide adequate budget and
more cyber resilient and in preparing for quantum priority for standardization and transitions, create
computers (NAS, 2018a). NIST has also been encour- incentives for nongovernment organizations, and
aging a focus on greater organizational cryptographic create a certification scheme for adequate implemen-
agility in recent communications on the upcoming tation. Further, guidance on assessing and addressing
PQC transition (Chen et al., 2016). Pushes for sys- cybersecurity risk from quantum computers should
temic changes that lead to better cryptographic agil- be created and referenced in existing, appropriate
ity have also been made elsewhere recently (Ashford, guidance documents such as the NIST Framework
2018), and experts noted that the intrinsic complexity for Improving Critical Infrastructure Cybersecurity
of this transition could be a push that motivates (2018a). Ultimately, a federal response similar to
industry to collectively make much-needed changes either the National Security Telecommunications
to cryptography use generally. Accompanying steps Advisory Committee (NSTAC) recommendation on a
must be taken, however, to assure adequate imple- Cybersecurity Moonshot Initiative or Y2K prepared-
mentation of more agile approaches, lest the added ness is probably required, and an initiative mod-
complexity result in other vulnerabilities. eled after the NSTAC recommendations or lessons
Key takeaways for policymakers: Like the NAS learned from the Y2K response could be useful in
report on quantum computing progress (NAS, coordinating federal leadership in PQC adoption.
2018b), we note there is little to no margin of safety Key takeaways for individual organizations:
for beginning the migration to PQC. In the most Organizations must take inventory of where PKI
likely scenario, our communications infrastructure is used internally and with suppliers and other
is likely to exhibit significant risk from quantum partners. When feasible, organizations should
computing, even if preparations are begun immedi- demand PQC in any applications or components
ately, and the United States will incur greater risk the used. Preparatory work should be begun to under-
longer it delays. There are likely to be “pain points” stand what the PQC transition in organizational
at many points in the PQC adoption process that

29
toward cybersecurity breaches. Ablon et al. (2016)
We also fielded a examined consumer perspectives and found higher
levels of awareness than we show but similar low
consumer survey levels of extreme responses like halted dealings with
the affected companies.
because the risks to Furthermore, our results suggest that consumers
place little value on or have little power to control
encryption posed by their digital privacy, and that only when the threat
is proximate will consumers change their behaviors.
quantum computing Some changes to behaviors include threats to com-

extend to the modern panies that do not act proactively to protect their
customers’ privacy, such as changes in brand loyalty.
global economy. However, the results also demonstrate that compa-
nies may be able to predict which consumers are
likely to cease transactions with the company in the
infrastructure will require: Do test deployments, run face of cybersecurity threats by understanding how
them on internal infrastructure, upgrade customers’ the customers have responded to previous cybersecu-
machines, and ultimately decommission the previous rity breaches. Our results indicate that any consumer
vulnerable cryptosystems as soon as practicable. Note response to previous cybersecurity breaches (e.g., the
especially where third parties are using PKI and con- Target 2013 and Equifax 2017 breaches) is generally
sider options to incentivize PQC adoption by these positively and significantly associated with active
third parties and suppliers. responses to the varying levels of quantum comput-
ing threats we examined. In other words, consumer
responses to previous cybersecurity breaches are
Consumer Responses and Implications indicative of a consumer’s level of privacy concern
We also fielded a consumer survey because the risks and predictors of future responses. Consumer atti-
to encryption posed by quantum computing extend tudes and expectations toward cybersecurity and
to the modern global economy. If consumers reduce privacy are likely to evolve with a changing security
or redirect their online presence because of fears for environment in the intervening years between today
the security of their personal, financial, and other and the creation of a quantum computer, warranting
private information involved in digital interactions, further such assessments over time.
it may have large effects, both on organizations that Key takeaways for policymakers: The lack of
do not take the necessary precautionary steps, and on consumer awareness, concern, and response to the
the modern global economy. Alternatively, the effects risks posed by the development of a cryptograph-
could be minimal because consumers place little ically relevant quantum computer suggests that
value on the privacy of their digital information or consumers either place less value on the privacy of
have no power to control their privacy. their information than they do on the services they
The results of our consumer survey show that receive in exchange, or that they feel little power to
awareness of quantum computing and its risks are control the privacy of their information. While these
low, the plurality of consumers have been uncon- results indicate that major breakdowns in consum-
cerned with previous cybersecurity incidents, and er-corporation trust may be avoided, they also are
the majority of consumers did nothing to respond to not commensurate with the magnitude of the risks
previous cybersecurity incidents. A detailed account- identified and described by the experts. Ultimately,
ing of the results of the consumer survey is included this discrepancy between consumer awareness and
in Appendix B (p. 55). These results roughly corre- the magnitude of the risks indicates the need for
spond to previous studies of consumer perspectives proactive policymaker leadership. While the risks are
not impossible to understand, the technical nature

30
of quantum computers and PKC imply that some transmitting information that relies on the quan-
consumers will opt to not pay the costs required to tum mechanical properties of the communication
familiarize themselves with the issues or advocate for medium to make it impossible for an eavesdropper
policy change. Consequently, to avoid the risks posed to intercept the communication without the com-
by the development of a cryptographically relevant municators’ awareness. It would create a means of
quantum computer, policymakers must act proac- exchanging symmetric keys without fear of intercep-
tively to protect consumers. Works such as that by tion that would then enable encrypted communica-
Yerukhimovich et al. (2016) that seek to guide policy- tions with security that is not vulnerable to quantum
makers in creating effective regulation for consumer computers. While this technology is interesting
protection may be instructive in this regard. and is being used in several real-world applications
Key takeaways for individual organizations: Our already today, including in a Chinese satellite system
results show that responses to previous cybersecurity (“Chinese Satellite Uses Quantum Cryptography
breaches indicate consumers’ level of privacy concern for Secure Video Conference Between Continents,”
and predict their future responses, which suggests 2018) and potentially in 5G communication infra-
a way for private sector companies to potentially structure (Quantum Xchange, 2018), many do not
improve their calculations of the benefits of proac- see this as a feasible alternative to PQC. In particu-
tive, early adoption of PQC. While the costs of early lar, the National Cyber Security Centre, part of the
adoption of PQC are easy to calculate, the benefits United Kingdom’s Government Communications
are generally less clear and likely undervalued. By Headquarters, considers the practical limitations
incorporating previous consumer responses to cyber- of QKD, especially challenges with scalability and
security breaches, private sector companies may be flexibility, to currently make it unsuitable as an
able to better predict consumer responses associated alternative to PQC for broadly securing communi-
with proactive, early adoption of PQC. This suggests cations against quantum computers (National Cyber
two benefits that may be currently undervalued: (1) Security Centre, 2016). Much more could be said of
the benefit from losing fewer customers, and (2) the the usefulness of QKD and quantum cryptography
benefit from attracting the customers of less proac- generally in this context, but further discussion is out
tive, less secure competitors. While the majority of of scope for this report.
consumers did not report an active response to any of
the three hypothetical scenarios we posed, 18 percent
Actions Across the U.S. Government
reported an active response to the “nearly developed”
threat, 23 percent reported an active response to Bodies across the U.S. government have recently
the “available” threat, and 43 percent reported an taken a number of actions that pertain to the risk
active response to the “imminent” threat. The active from quantum computing, though the primary
responses are defined as those that affect customer focus of these actions to date has been on assuring
spending decisions and would immediately affect and maintaining U.S. global leadership on quantum
company revenue. technologies. As of yet, the national security risk
from quantum computing is mentioned in only a few
specific places in directives and plans. These actions
Other Notable Concerns are relatively recent, however, and in most cases new
Some issues were left out of our study, but their bodies have not yet had the opportunity to go into
relevance to the subject matter still requires mention great detail on their priorities or plans of action,
here. The most significant such issue that was deter- so additional prioritization of the national security
mined to be out of scope for this report is quantum implications of quantum computing may yet emerge.
key distribution (QKD). QKD has been discussed as Most government actions were spurred by the
an effective future solution for securing communi- passage of the National Quantum Initiative Act
cations in a manner that is not vulnerable to quan- (NQIA) in December 2018 (15 U.S.C. § 8801–8852).
tum computers. Briefly, QKD refers to a means of The NQIA had the explicit purpose to “ensure the

31
continued leadership of the United States in quantum activities by requiring the SCQIS to regularly report
information science and its technology applications.” to Congress.
It did this by requiring new coordinating activities, The OSTP sponsored a QIST summit in
funding, human capital, and Congressional oversight September 2018 (NIST, 2018b) where the SCQIS
on issues related to quantum information science and released its National Strategic Overview. Among
technology (QIST). It created four new requirements other things, this document identifies policy oppor-
for the executive branch, namely that the President tunities related to maintaining national security and
create the National Quantum Initiative Program economic growth. This subsection calls for the com-
(NQIP), establish a National Quantum Coordination mittee to maintain an understanding of the security
Office (NQCO), establish the Subcommittee on implications of the changing science and technology
Quantum Information Science (SCQIS) under the (S&T) landscape in QIS and provide mechanisms
Committee on Science of the National Science and for all government agencies to stay abreast of defense
Technology Council (NSTC), and establish the and security implications and help balance benefits
National Quantum Initiative Advisory Committee. against new risks. It explicitly mentions the risk to
Later sections of the NQIA also included require- public key cryptography and states a need to move to
ments and resources specifically for NIST, NSF, PQC, though no additional details are provided. It
and the Department of Energy. In addition to other mentions a key next step of developing agency-level
requirements, NIST was required to convene a plans that may include “transformative cyber security
“Quantum Consortium” of stakeholders to “identify systems including quantum-resistant cryptography
the future measurement, standards, cybersecurity, in response to developments in QIS.” Finally, it states
and other appropriate needs” for supporting QIST. that government agencies have been asked to create
In anticipation of the passage of the NQIA, the detailed execution plans in support of the commit-
White House and NIST took action to meet these tee’s activities, including convening stakeholders “in
requirements. In response to executive orders and consultation with OSTP and the SCQIS to identify
other direction, the White House Office of Science grand challenges in specific sub-fields,” including
and Technology Policy (OSTP) established the SCQIS development of quantum-resistant cryptographic
in the NSTC, the National Quantum Initiative standards and systems (Subcommittee on Quantum
Advisory Committee, and the NQCO. The NQCO Information Science, 2018).
and the SCQIS both have membership from multi- All of these actions suggest that the federal
ple federal agencies, while the National Quantum government is aware of the potential opportuni-
Initiative Advisory Committee is composed of mem- ties of QIST and that the bodies newly established
bers from industry, universities, federal laboratories, to centrally coordinate government action on the
and other federal agencies. The NQCO has multiple subject are at least nominally aware of the need to
explicit purposes, but of particular note are its roles also transform our communication infrastructure
in overseeing interagency coordination, serving as in response to the risk from quantum computing.
a point of contact for the exchange of information The scope of the challenge in transitioning to PQC
between the federal government, industry, univer- likely requires the kind of central coordination the
sities, and other partners, and conducting public NQIP is intended to provide, rather than an agency-
outreach. Similarly, the SCQIS has multiple pur- by-agency, incremental approach, though it is not
poses, but those of interest are related to its roles in clear yet whether the NQIP is adequately focused on
coordinating QIST research, sharing information the threat. The focus of the NQIA and the resulting
about international standards development and use, coordinating bodies appears to be firmly on estab-
assessing federal government infrastructure needs, lishing U.S. leadership in quantum technology, with
and assessing the global outlook for QIST research only brief references to the response to the national
and development efforts. Importantly, the NQIA security threat, where it is included at all. These bod-
also establishes oversight over QIST-related federal ies may yet give the threat the attention it requires,
but it may be the case that efforts to transform our

32
information and communication infrastructure in was initiated. The President’s Council was composed
the transition to PQC belong with a different body of more than 40 senior federal officials, including
that can have a more singular focus on the cyberse- deputy secretaries, CIOs, and other senior lead-
curity concerns and information technology transi- ership in nearly every executive department and
tion efforts. major government agency. In the years from then
The NSTAC has recently issued a recommen- until 2000, there was sustained, coordinated fed-
dation for a broader initiative, a Cybersecurity eral leadership on national preparedness for Y2K.
Moonshot, noting that the incremental approaches More than 100 hearings were held by Congressional
that the U.S. government has taken to cybersecu- committees on the topic, major federal agencies and
rity generally are insufficient and that a new tra- departments reported progress to the OMB quar-
jectory needs to be conceptualized. It recommends terly, and sector-based working groups were created
a Cybersecurity Moonshot, a “whole-of-nation” to establish partnerships with industry groups and
approach to cybersecurity that demands the high- critical infrastructure. Bipartisan legislation, the
est level of national leadership and coordination to Year 2000 Information and Readiness Disclosure
address the nation’s urgent current and future cyber- Act, was also passed to create oversight, regulation,
security challenges. Incorporation of and incentives to prepare. Efforts were focused on
quantum-resistant cryptography is explicitly men- advocacy and raising awareness first, then aid in
tioned in the report. NSTAC gives recommendations guidance in performing risk assessments, followed
for actions the U.S. government should take, includ- finally by preparedness and contingency planning.
ing setting aspirational goals, establishing inter- Ultimately, these efforts led to coordinated, sus-
agency and nongovernmental councils to address tained, and nationwide risk mitigation efforts across
challenges, and defining a strategic framework for the federal government and major industries, and the
national cybersecurity research and development feared disruptions from Y2K never materialized. The
priorities (NSTAC, 2018). While many organiza- GAO later reported major lessons learned from the
tions have issued calls to action on cybersecurity, federal government’s efforts. Foremost among them
NSTAC is unique because it is a Federal Advisory was that federal leadership and partnerships were
Committee associated with the President, operated key to success, particularly central leadership and
through the Department of Homeland Security, and coordination and bipartisan congressional oversight.
it contains members from industry. Consequently, These, in turn, led to successful partnerships with
recommendations from NSTAC are potentially more states, cities, and industry groups, useful legisla-
influential and effective than recommendations tion, and allocation of human capital and resources
from other organizations. Incorporation of the PQC needed to help entities prepare. While there are
transition into such a centrally coordinated approach notable differences between the threat from Y2K and
to cybersecurity, rather than quantum science and the threat from quantum computers, especially the
technology, may be a better alternative approach to well-defined date of vulnerability and the presence of
addressing the potential risks. a technically capable adversary, such efforts never-
The federal government’s response to the Year theless provide a useful template that can be adapted
2000 challenge and lessons learned from the efforts for the next nationwide risk-mitigation effort that
to mitigate associated risk are also instructive in must take place with the transition to PQC (GAO,
identifying effective ways to spur nationwide action 2000). Congress has already demonstrated its will-
on an IT transition. Federal action was essential in ingness to similarly tackle the risks from quantum
motivating effective action on that problem. The computing in a bipartisan fashion, and many of the
Government Accountability Office (GAO) designated bodies created as a result of the NQIP appear to be
Y2K as a high-risk area for the federal government well-positioned to effect the kind of interagency and
in 1997, and shortly thereafter House and Senate federal-civilian coordination on PQC that was so
committees began holding hearings on the issue, and effective in response to Y2K. It remains to be seen,
the President’s Council on Year 2000 Conversion however, whether executive branch priorities and

33
congressional oversight will adequately focus NQIP Develop information security preparedness plans
efforts on IT changes using these bodies explicitly for an uncertain future. The possibilities in the
focused more on U.S. leadership in quantum science progression of the timelines for development of a
and technology. cryptographically relevant quantum computer and
PQC adoption introduce uncertainty for those tasked
with preparing for future security threats. There is
Recommendations uncertainty in when quantum computers will arrive,
how quickly adoption of PQC will proceed, in what it
Key Findings
will take for individual organizations and the United
This section begins with summaries of the key find- States as a whole to prepare, and in how great the risk
ings of this study, based on a synthesis of the expert will be collectively and individually. Surprises in the
interviews, literature review, and consumer survey. timelines in the early or late extremes are possible,
Broadly, we find that the U.S. response requires three but unlikely. An uncertain future need not be a less
broad and overlapping approaches: secure future, however.
Spur a robust adoption of PQC as soon as possi- Communications to the public on risk from
ble. The single best course of action in mitigating risk quantum computers should seek to find a middle
from quantum computers will be adoption of PQC in ground between exaggeration of the threat and a
a timely, robust, and complete manner. PQC is likely reckless disregard of the real risk. The United States
to be an effective means of securing systems against has solutions to mitigate the risk, and even the worst-
a threat from quantum computers, but complete case scenarios will not result in the end of digital
cryptographic transitions take many years, and some information security. In best-case scenarios, world-
organizations with long-lived sensitive information wide cybersecurity could improve. It is necessary to
are already incurring risk. The sooner an interopera- encourage reasonable risk assessments of the threat
ble standard for PQC can be widely implemented, the leading to appropriate action. Such an approach
more the eventual risk will be diminished. would avoid unnecessarily alarming statements.
Build cyber-resilience and cryptographic agility For example, quantum computing is not “the end
into the digital infrastructure. As security implemen- of privacy” (Campbell, 2018), and in all likelihood
tations are adapted in response both to constantly it will not “instantly break encryption of sensitive
evolving current threats to our critical infrastructure data protected by today’s strongest security . . . in
and to future threats such as quantum computing, we little more than five years” (Foremski, 2018). It is,
should consider how to make new security imple- however, a real threat that can and must be prepared
mentations more agile. Specifically, new systems for. Uncertainties should be reduced when and where
should aim for (1) future-compatibility with the possible and risk management activities updated
expected evolution of standards and more demand- accordingly.
ing requirements of PQC, and (2) modularity that
would allow rapid and inexpensive cryptographic
adaptation as new threats or vulnerabilities are dis- Top Recommendations
covered. The systemic changes needed to transition Executive Branch
to PQC offer an opportunity to implement structural If the White House wishes to minimize risk from
improvements in the use of cryptography in commu- quantum computing, it should consider the following
nication and information systems that could improve four recommendations:
our ability to respond to both current and future
cyber threats. The efforts to promote PQC adoption 1. Consider whether the bodies created as part
and quantum computing preparedness should have of the National Quantum Initiative can ade-
the tandem goal of restructuring systems to enable quately prioritize a whole-of-nation response to
greater cyber-resilience and cryptographic agility. the threat from quantum computing.

34
Mitigating the risk to our communication the activity should take care to minimize the total
infrastructure from quantum computing will require number of each algorithm type selected to avoid mar-
sustained leadership, coordination, and oversight ket fragmentation. Finally, given that the release of
from the executive branch, beginning immediately the PQC standard is likely to act as the “starting gun”
and continuing until well after cryptographically for the global transition to PQC, it is imperative that
relevant quantum computers have been realized. The the effort be afforded adequate funding and priority
NQCO of OSTP, the National Quantum Initiative to finish the standardization activity on schedule.
Advisory Committee, and the NSTC SCQIS appear 3. The NSA should consider mandating and
to initially be well-positioned to provide leadership, robustly enforcing PQC transition for the
foster interagency coordination, assess risk, and federal government, critical infrastructure,
form necessary partnerships between the federal and organizations that provide products to the
government and other actors, following the lessons government.
learned from the successes of the President’s Council We expect that the NSA Cybersecurity
on Y2K Conversion. What is still not clear, how- Directorate and NIST will continue to work together
ever, is whether these organizations are adequately upon the release of the final PQC standard to drive
focused on responding to the risk to our information a transition to PQC across the federal government.
and communication infrastructure from quan- NSA IAD already suggested that it would be pre-
tum computing. The White House should consider paring to do so when it recommended a halt to
whether these bodies, formed for the explicit purpose an ongoing transition effort toward elliptic curve
of assuring U.S. leadership in quantum information cryptography in 2016. As part of this effort, NSA
S&T, are the most appropriate entities to manage this should consider mandating a transition to PQC for
risk, rather than similarly positioned bodies with a government and critical infrastructure. The man-
more singular focus on cybersecurity, IT transforma- date could further require that PQC be the default
tion, and/or national security. for all companies that sell hardware or software to
2. Ensure the final PQC standard is released on government customers, eventually requiring they
schedule and continues to prioritize the facili- swap out any products that use current public key
tation of widespread adoption. cryptography algorithms. For these mandates to be
The final state of the PQC standard released by effective, however, there must be consistent, robust
NIST will affect the eventual adoption rate for the enforcement. Expert opinion suggests the recent gov-
standard. The NIST PQC standardization activity ernment-led transition to elliptic curve cryptography
appears to already show a strong preference in its was not sufficiently enforced on all parties, including
evaluation criteria for features of the final standard software companies, certificate authorities, and cloud
that will facilitate widespread adoption. Among service providers, and waivers for the provision were
other things, they explicitly mention a preference for granted too often. Therefore, mandates for PQC must
factors such as smaller key sizes and computational be adequately enforced on all stakeholders, with as
efficiency of the algorithms that will minimize over- few waivers granted as possible.
all cost. The criteria also note a strong preference for 4. Initiate and expand interagency coordination
algorithms that can be licensed without compensa- and public-private partnerships focused on
tion. All of these will be important factors in facilitat- driving and monitoring change to mitigate risk
ing eventual adoption of the standard. from quantum computing nationwide.
Announcements regarding the standardization Whether or not the bodies formed as part of the
activity note that the standard is intended to be NQIP are deemed adequate to focus and prioritize
available worldwide, and we recommend that NIST the national effort on mitigating the risk from quan-
follow through on this intention by bringing it to the tum computers, it is urgent that a chosen body begin
ISO to make it an international standard. Moreover, taking action soon to initiate and expand interagency
while documentation notes that NIST may need to action and form public-private partnerships. For
standardize more than one kind of each algorithm, simplicity, we assume here that the NQCO will be

35
the chosen coordinating body, though another body the Securities and Exchange Commission (SEC)
may be better suited to this role, in keeping with the partnered with the Securities Industry Association,
first recommendation here. While the NQIA spec- the Investment Company Institute, and the National
ifies a number of agencies and departments to be Association of Securities Dealers and issued interpre-
represented in the NQCO and the SCQIS, this list is tive releases outlining how companies should meet
too limited, and coordination should be expanded to disclosure obligations (SEC, 1999). Similar types of
include representatives from many more agencies and outreach and actions should take place in response
organizations across the federal government. CISA to the PQC transition, across all departments and
is a notable absence in the list of required member agencies, as the GAO report on Y2K noted that the
organizations, given its convening role and respon- partnerships formed and the many methods of com-
sibility for broadly coordinating government and munication between them were important factors in
private-sector organizations to provide comprehen- the overall success.
sive cyber protection, infrastructure resilience, and As the release of standard PQC protocols nears,
national risk management. Staff from other organi- reports should become more frequent, and the mis-
zations can and should be represented, including but sion should expand to also include monitoring and
not limited to staff from each major executive branch assessment of PQC transition progress. Finally, as
department and from organizations with purviews quantum computing capability improves, the NQCO
over specific sectors or critical infrastructure such as, should consider a move toward a focus on contin-
e.g., the NTIA, SEC, and FTC. A group like the CIO gency planning and response. These efforts will be
Council, consisting of CIOs and deputy CIOs from invaluable in providing a focal point for interagency
many federal departments and agencies, were noted coordination, private sector collaboration, and sus-
as a particularly valuable body in coordinating Y2K tained focus on the issue for as long as necessary, and
response, and the involvement of such a group should messaging throughout the effort should focus on the
be strongly considered as well. opportunity to use the challenging reconfiguration
Each member department or agency should plan required by a transition to PQC to intentionally move
to report regularly on the progress in preparing their toward a more sustainable, secure future state.
own infrastructure for quantum computers and share
how they are addressing important issues like moves Legislative Branch
to greater cryptographic agility. The NQCO should Sustained, bipartisan congressional action is likely
establish working groups that regularly provide status critical to the success of the government’s response
updates on the actions of the member departments to the risk from quantum computing. Congress has
and agencies to establish partnerships and advocate taken an excellent first step with the passage of the
on the issue with the organizations, trade groups, and NQIA, but additional action and oversight is likely
other stakeholders within their purview. Sector-based needed to address the risk as the development of
working groups and individual organizations should cryptographically relevant quantum computers
be given autonomy sufficient to determine the most nears. If Congress wishes to boost awareness of the
appropriate way to perform their broader missions risk from quantum computing and increase over-
with their particular stakeholders, as strategies will sight over preparation efforts, it should consider the
differ between organizations. Agencies may need to following two recommendations:
create their own task forces, sponsor funding, and 5. Hold hearings to improve awareness and
create industry partnerships. For example, in 1998, oversight.
the FTC began a special business and consumer Congressional hearings could promote aware-
outreach effort that sought public comment on the ness of the risk from quantum computing, establish
impact of Y2K on financial services and consumer oversight, and monitor progress toward preparing
products. The commission met regularly with indus- for quantum computers. Congressional committees,
try and consumer groups and created business alerts particularly the House Committee on Oversight
with guidelines on industry preparation. Similarly,

36
and Government Reform, its subcommittees on designating PQC as a priority for those individuals or
Information Technology and National Security, organizations already assuring compliance with reg-
the Senate Committee on Homeland Security and ulation. There is also a difference between mandating
Governmental Affairs, and its subcommittee on a transition and assuring adequate implementation
Regulatory Affairs and Federal Management should of new systems, and Congress should eventually
consider immediately holding hearings on the sub- consider legislation that would provide a certification
ject. The immediate focus should be on which orga- scheme for implementations of PQC.
nizations face the most risk from catch-and-exploit Depending on the scope of the changes ulti-
vulnerabilities and on agency preparedness mately required, the transition to PQC may be much
to transition to PQC and greater cryptographic more challenging and costly for some governmental
agility. In particular, committees should pay spe- organizations than others. Congress allocated fund-
cial attention to the blurring line between national ing and human capital in support of the National
security and non–national security organizations, as Quantum Initiative Program, but the focus of the
attackers going after potentially softer targets that NQIA was on U.S. leadership in quantum infor-
perform vital functions like payment processing mation science and technology broadly. Congress
and records management can still cause consider- should consider whether it is necessary to allocate
able disruption and damage to national security if funds and human capital specifically for quantum
they are not protected. The outputs of the House computer preparedness (i.e., promotion of moves to
Subcommittee on Government Management, cryptographic agility and transition to PQC) across
Information and Technology of the Committee the government. Finally, for commercial sectors or
on Government Reform, especially high-visibility businesses that are not affected by the NSA mandate,
metrics on agency responses, were noted as excel- Congress should consider what business incentives
lent motivators in the Y2K response (GAO, 2000). could be provided to further promote PQC adoption
Congressional committees should continue to hold across the nation.
regular hearings over time and require agency
reports to monitor progress on efforts and provide Individual Organizations
oversight. If organizations wish to minimize risk, they should
6. Regulate, incentivize, and support cryp- consider the following three recommendations:
tographic transition in public and private 7. Assess future and retroactive risk from quan-
sectors. tum computers.
Once standard PQC protocols are available, there Individual organizations should currently be
are a number of additional actions that Congress assessing their own risks from quantum computing
should consider taking to create effective regulation and making plans to incorporate PQC into their
and enforcement and to compel and incentivize lifecycle security management, where appropriate.
widespread adoption. Relying on market forces to What this entails will vary considerably from one
push commercial organizations to adopt may result organization to another. Organizations need to assess
in companies not adopting until they are breached, current and future vulnerabilities, including from
whereas a government-led transition could force information that has already been captured or that
more proactive measures. Assuming the NSA creates may be captured now and exploited years later. Many
a mandate for PQC transition for government, criti- organizations may already be facing risk from the lat-
cal infrastructure, and commercial providers to gov- ter vulnerability, and it will only grow the longer they
ernment (see recommendation 3), Congress should take to transition to PQC. Risk from quantum com-
monitor progress and be ready to create additional puters should become part of the organizational risk
regulation or mandates for government or critical assessment, and assessments should take into account
infrastructure as needed to promote quick, robust details such as what communicated information is
adoption of PQC. For critical infrastructure that is currently protected by public key cryptography, how
already heavily regulated, this may be a matter of

37
long that information must stay secret, and who the potential benefits and approaches to cryptographic
threat actors are who might use that information to agility, but also recommendations for avoiding the
harm the organization. Finally, assessments should potential pitfalls, with special attention to potential
include regular updates based on new development issues related to increased complexity and ossifi-
milestones toward the creation of a cryptographically cation. In larger businesses, this would principally
relevant quantum computer. involve the CIO, Chief Security Officer, Chief
8. Inventory public key cryptography use. Information Security Officer, cryptographers, or
Organizations should consider beginning to developers of applications that use cryptography.
take inventory of every place that public key cryp- Smaller business, too, will benefit from individuals
tography is used. They should consider taking stock who perform similar roles using NIST reports and
of where they interact with public key cryptography, other guidance documents to become more knowl-
especially where responsibility or control is in the edgeable on the topic.
hands of third parties, partners, or suppliers. Each Those developing new applications should spe-
node will eventually need to be transitioned to PQC cifically plan products with agility, ease of transition,
once standards are available. The transition may be and future compatibility in mind. Implementers
as simple as a software update for some organizations should plan for the next transitions when they are
or as complex as replacing hundreds or thousands implementing the changes for PQC, in terms of
of pieces of hardware or updating as many applica- how hardware and software interact with cryptog-
tions, and the more complex the need, the sooner the raphy. Planners and implementers, in general, need
organization should begin to address it to ensure they to consider how to make the next transition, what-
are prepared. ever it might be, more like a drop-in replacement of
9. Build cyber-resilience and cryptographic the current system. We expect, however, that those
agility. tasked with planning and implementing security are
The threat from quantum computing will neces- often already aware of these issues, but other orga-
sitate a complex, challenging, systemic change to nizational leadership and budget controllers must
cryptographic infrastructure, but this also provides first be convinced of the potential benefits and the
an opportunity. It should allow, if not require, the opportunity afforded by strategic, long-term think-
United States to collectively make changes that will ing on security during this particular transition. The
ease future cryptographic developments, improve imperative to make these changes must therefore be
performance, and build in greater agility and cyber raised in each organization.
resilience. Industry groups should consider studies
and publications that quantify and explain to their
Synthesis
constituents the industrywide benefits to security
and performance that may be expected with greater The most likely scenario, given current informa-
cryptographic agility. Communications on the tran- tion and expert opinion of development progress
sition to PQC and the inevitability of future transi- on quantum computers, PQC standardization, and
tions should point out the opportunity this transition historical adoption patterns, is one where a cryp-
provides to incorporate changes to the general use tographically relevant quantum computer is devel-
of cryptography that could benefit the industry as a oped many years after a PQC standard is released.
whole. Industry groups should consider partnering If the averages of expert estimates are used, a cryp-
with federal departments and agencies tasked with tographically relevant quantum computer would be
promoting cyber resiliency and risk management, created approximately ten years after the release of a
especially related to quantum computing. draft PQC standard, which would be a scenario very
Developers and planners in charge of organiza- similar to that defined for Scenario 3 in our expert
tional security implementation in many cases will elicitation.
need to become more knowledgeable about cryp- In this scenario, it is very likely that cryp-
tographic agility. This should include not just the tographically relevant quantum computers will

38
arrive after we have begun a transition to PQC but and organizations should consider the blurring line
before that transition is complete. Vulnerabilities between national security–related and non–national
could remain in several forms. Many organizations security organizations. Attackers going after softer
may lag in transitioning to PQC, failing to prioritize targets that perform vital functions like payment
PQC in their life-cycle security management or the processing and records management can still cause
new security products they procure. Even those who considerable disruption and damage to national secu-
have begun the transition could likely retain vul- rity if they are not protected, and they should receive
nerabilities in systems, components, or applications appropriate priority in national preparedness efforts.
they neglected to transition to new cryptography. Furthermore, PQC implementation for key exchange
More broadly speaking, old standards would likely should be prioritized for sensitive targets as soon as
still be in use to ensure interoperability until the practicable to mitigate risk from captured encrypted
transition has finished. Long-lived products and communications, with PQC for authentication
systems that are expensive to replace and hard to allowed to come later. In communications, unneces-
update may retain vulnerable cryptography for many sarily alarming statements should be avoided while
years, perhaps decades. Finally, those organizations realistic risk assessment and mitigation is promoted.
possessing sensitive information that must stay Finally, efforts to promote and invest in quan-
secret for years or decades, especially those that may tum information science and technology, specifically
present a high-value target to the likely first users quantum computing, should continue, as once PQC
of a cryptographically relevant quantum computer, is in place it is likely that quantum computing can be
will face consequences from communications that primarily viewed as an opportunity for great techno-
were captured prior to the transition to PQC to await logical advancement rather than a security risk.
decryption by a quantum computer. This risk will be
greater for those who waited longer to transition to
Conclusion
PQC. These vulnerabilities together would project
additional, significant cybersecurity risk far into the The development of cryptographically relevant
future, even in this likely scenario. quantum computers presents a threat to the security
Fortunately, the overall risk may be mitigated of our communications infrastructure. This security
both by proactive measures to prepare our com- threat differs from many cybersecurity threats we
munication infrastructure for quantum computers face today, in which a clever attacker finds the means
and risk management policies and controls that can to bypass cryptographic systems meant to protect
exploit the likely capability limitations for quantum information; rather, the attacker will use a device that
computers with early cryptographic relevance. The strikes those cryptographic systems directly, break-
long lead time in the likely scenario, where a PQC ing a foundational element of information security.
standard is released and cryptographically relevant This is a significant, urgent security issue, and conse-
quantum computers have not yet been developed, quences of failing to act to solve it would be devas-
would leave us with opportunity to take these proac- tating. PQC algorithms are expected to be effective
tive measures. in defending against attacks by quantum computers,
Mitigating the risk to our communication however, if they are robustly implemented in time.
infrastructure from quantum computing will require Cryptographically relevant quantum comput-
sustained leadership, coordination, and oversight ers are not expected to be developed for another 15
from the executive and legislative branches of the years, though experts assess that there is significant
federal government, beginning immediately and uncertainty in that timeline, and they could come
continuing until well after cryptographically relevant much sooner or much later than this. The transition
quantum computers have been realized. Quantum to PQC will be challenging and long, however, poten-
computing needs to be viewed as an urgent secu- tially leaving us with significant vulnerabilities even
rity threat, and preparatory actions need to receive if cryptographically relevant computers are not devel-
national priority. In particular, national leaders oped for decades. If we act in time with appropriate

39
policies, risk reduction measures, and a collective need to just solve the problem and work on it hard,
urgency to prepare for the threat, then we have an and we need to fund them, and then we can focus on
opportunity for a future communications infrastruc- actually using a quantum computer to help humanity
ture that is as safe as or more safe than the current instead of breaking the world. . . . I’m not interested in
status quo, despite overlapping cyber threats from breaking the internet. If [we] solve the problem, there’s
conventional and quantum computers. Moreover, we hopefully lots of other things we can do with a quan-
would be able to pursue quantum computing simply tum computer.” The United States has the solutions,
as a foundational new computing capability, with all the means, and very likely sufficient time to avoid the
the associated opportunities and promise for society, worst consequences from quantum computing, but
without trepidation due to an accompanying threat. only if it begins to prepare with adequate urgency now.
As one of the experts we interviewed said, “People

40
Appendix A: Detailed Results . . . I’d be surprised, but it wouldn’t completely
disrupt my perception of reality.
Interview Results
Five other experts gave 2023 as the earliest possi-
Estimated Timeline for Arrival of Quantum ble year. Approximately half of the experts said that
Computing it still remains a possibility that a cryptographically
We asked experts to provide their best estimated year relevant quantum computer will never be developed.
of arrival of a cryptographically relevant quantum This view is famously espoused by Gil Kalai, pro-
computer along with the earliest and latest years this fessor at the Institute of Mathematics at the Hebrew
could occur. Figure A.1 shows the results for each University of Jerusalem. Kalai has argued that, from
of the 15 interviews that we conducted and shows the perspective of computational complexity and,
the expertise weighted average across all the expert critically, the issue of noise, keeping qubits in highly
judgments.20 If no estimates are shown, the experts sensitive superpositions will inevitably involve
declined to provide estimates. Years are displayed corruption by any interaction with the outside
along the vertical axis, while the horizontal axis is world. Kalai argues that reducing the noise would
numbered 1 to 15 corresponding to the 15 interviews violate certain fundamental theorems of computa-
we conducted.21 tion (Moskvitch, 2018). Similarly, one of our experts
The earliest estimate of when a cryptographically stated, “If you listen to some cryptographers, they’ll
relevant quantum computer will be developed is tell you that you’re going to have cold fusion before
2022, offered by only one expert, who explained: you ever get a quantum computer.” Another expert
You need to get scalable error correction first. adds, “It [could] turn out . . . that we cannot string
. . . Look, if [we] wanted to put 10,000 qubits enough qubits together with whatever technology.
on a chip, [we] could. [We’re] just not doing it That all the work they’re doing on these . . . qubits,
because they’re not good yet. . . . [The scaling] they can’t find a parameter region for their physical
technology hasn’t been figured out yet because systems to get that working.”
we haven’t hit the roadblocks yet. . . . [2022] Weighting by expertise, the average best estimate
would be hugely unlikely but not completely for the year that a cryptographically relevant quan-
implausible. . . . There’s always a chance some tum computer is created is 2033, or 15 years from the
of the state actors are a little ahead of the game.

FIGURE A.1
Best Estimate, Range and Expertise Weighted Average for the Timeline of the
Development of a Cryptographically Relevant Quantum Computer

Never

Best estimate
Range
Weighted
average
2040

2030

2020

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

41
interview year, 2018. This estimate is consistent with Estimated Timeline for Arrival of Postquantum
the various literature estimates noted above that pre- Cryptography
dict likely dates in the mid-2030s. While none of our We asked experts to provide their best estimated year
experts exactly estimated 2033, some estimated 2032. of arrival of a full security suite that is secure against
One of those stated, quantum attack via the use of postquantum public
There’s many moving parts here, but roughly, key encryption methods and their estimates of the
if you get the scalable qubits by 2022, [it’ll take earliest and latest years this could occur. Working
another ten years] to think you’ll scale it to algorithms exist now for select applications and
be a threat [to break public key encryption, or systems, but broad interoperability and adoption will
Rivest-Shamir-Adleman (RSA)]. And further- not be feasible until a standard is released. NIST is
more, we’re still working out the algorithms. making a standard that is scheduled, but not guaran-
It’s not like the half a billion or billion physical teed, to be completed between 2022 and 2024.
qubits people have estimated, . . . but we’re
Figure A.2 shows the range and best estimates of
working on the theory to maybe bring that
the PQC timeline for each of the 15 interviews that
down.
we conducted and the expertise weighted average
Experts affiliated with private-sector industries across all the expert judgments. If no estimates are
were more bullish than their academic counterparts shown, the experts declined to provide estimates.
on the timeline for the development of a cryp- Years are displayed along the vertical axis, while the
tographically relevant quantum computer. Academic horizontal axis corresponds to the 15 interviews.
experts more often reported that a cryptographically Two experts estimated that the earliest a PQC
relevant quantum may never be realized. Academic security suite would be created was 2018. One of
experts reported 2035 as their best estimate, while them explained,
private-sector experts reported 2031 as their best
Technically, [we] have this today. . . . [We] have
estimate. stuff that [we] can deploy today for both public
key encryption and digital signature. They’re
usable. They’re practical, and we’ve done
demonstrations with these.

FIGURE A.2
Best Estimate, Range and Expertise Weighted Average for the Timeline of the Creation
of a PQC Security Suite

Never

Best estimate
Range
Weighted
average
2040

2030

2020

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

42
On the other end of the spectrum, one expert be adopted. We asked experts to provide their best
said it is possible that a suite that is secure against estimated year of adoption and defined adoption
quantum attack will never be developed: as “greater than 95 percent adoption [by the sector]
Up until the moment it’s broken, you think it’s
of PQC into [the sector’s] security.” We also asked
quantum safe. [So], the [latest] possible year for their estimates of the earliest and latest years of
again is never, because . . . 30 years or 40 years adoption for different sectors: the U.S. defense and
down the line, someone figures out how to intelligence base, other U.S. government agencies,
break it. private-sector advanced technologies industries
(specifically, information services, financial services,
Generally, experts thought that the development
and the nongovernmental defense industries), and
of PQC would proceed along the schedule of NIST.
private-sector less-advanced technologies industries
Weighting by expertise, the average best estimate for
(specifically, telecommunications, health care, and
the creation of a PQC security suite was 2023. In con-
manufacturing). Obviously, these broad-brush cate-
trast to the quantum computing timeline, opinions
gorizations may misrepresent the technological status
about the creation of a PQC security suite did not
of many corporations that fall within either grouping
differ by affiliation. The expertise weighted aver-
(e.g., some financial service firms may be less tech-
age estimate for academic experts is 2023, while the
nologically advanced, and some telecommunications
expertise weighted average estimate for private sector
firms may be at the forefront of PQC adoption), but
experts is 2024—roughly a decade before the average
it was an intuitive and useful delineation that the
estimate for the development of a quantum computer.
experts generally agreed was illustrative.
Figure A.3 shows aggregate estimates for each
Estimated Timeline for Adoption of
sector: the expertise weighted averages and the
Postquantum Cryptography
complete range (the earliest of the estimates for the
Because working algorithms exist now and NIST is earliest year, the latest of the estimates for the latest
scheduled to complete a standard between 2022 and year). As before, years are displayed along the vertical
2024, the critical issue is when and how PQC will

FIGURE A.3
Expertise Weighted Average and Range Among All Experts for the Timeline of
the Adoption of PQC Among the U.S. Defense and Intelligence Base, Other U.S.
Government Agencies, Private-Sector Advanced Technology Industries, and Less-
Advanced Technology Industries

Never

Weighted
average
Range
2060

2050

2040

2030

2020
Defense Other government Advanced technology Mid technology

43
axis, while the sectors are given along the horizontal 2. a cryptographically relevant quantum com-
axis. puter is created when adoption or the recently
The experts believe that the U.S. defense and standardized PQC is just beginning
intelligence base and the private-sector advanced 3. a cryptographically relevant quantum com-
technology industries will be rapid adopters of puter is created ten years after the standard-
PQC. For other U.S. government agencies and ization of PQC.
less-advanced technology industries, the experts Experts were asked to assess the consequences
believe adoption will come later and possibly may of each scenario for the U.S. defense and intelligence
never occur. For the U.S. defense and intelligence base, other U.S. government agencies, private-sector
base and the private-sector advanced technology advanced technologies industries, and private-sector
industries, the earliest estimates are 2021 and 2022. less-advanced technologies industries, assuming that
In describing the reasoning behind the 2018 estimate, no additional measures were taken to address any
one expert stated that this assumes using the non- security vulnerability presented by quantum comput-
standardized postquantum cryptographic solutions ers other than eventual adoption of PQC.
available today and employing “a crash course to For each scenario and sector, the experts pro-
adopt.” While advanced technology industry orga- vided a probability distribution over three levels
nizations may have an easier time adopting new of consequences. The first level was that malicious
PQC because they have “fewer legacy systems, [it’s] actors are occasionally able to obtain sensitive
easier to upgrade the infrastructure, [and] you can information. The second level was that malicious
force patches on more people,” the need for the U.S. actors are frequently able to access sensitive infor-
defense and intelligence base is so high that adoption mation. The third level was that malicious actors
will be rapid. have complete control of information systems. The
Some of the variation is due to the breadth of the reported probabilities were required to sum to 100
sectoral definitions. While the U.S. defense and intel- for each scenario and sector. As an example, for the
ligence base is relatively narrow, each of the other U.S. defense and intelligence establishment under
sectors can include a wide variety of organizations. scenario 1, experts could report that they expect
One expert said that other U.S. government agen- malicious actors to only occasionally obtain sensitive
cies (which include state, local, and federal agencies) information 60 percent of the time, have frequent
may never adopt PQC if not mandated to do so. access to sensitive information 30 percent of the
Many advanced technology organizations will adopt time, and obtain complete control of the information
quickly, but there may be some that have less need or systems 10 percent of the time. If the experts reported
have pressing financial constraints and therefore are probabilities that did not sum to 100, we asked them
less quick to adopt. Small businesses may be espe- to revise their estimates.
cially focused on simply shipping products on time Using the reported probabilities, we derive a
and may focus less on adopting the best security. score of the magnitude of consequences based on an
Less-advanced technology organizations have been even, ordinal ranking of the consequences. Let p1, p2,
historically slow to adopt new cybersecurity stan- p3 denote the probabilities reported by the experts of
dards, and many still have legacy systems with out- each of the three levels of consequences, and let v1, v2,
dated security, so it would follow historical patterns if v3 denote the values associated with the three levels
some never adopted. of consequences. We also define a simple relation-
ship between the values of the three levels of con-
Scenarios
sequences, specifically that v2 = 2v1 and v3 = 3v1. We
We asked experts to consider three hypothetical
derived the scores using the following formula:
scenarios:
1. a cryptographically relevant quantum com- 3

puter is created before PQC is standardized Score = ∑ vc pc .


c =1

44
To calculate the scores using this formula and hardware module through the crypto module
the specified relationships, all that is needed is to verification program and all those things,
choose a value for v1. Any value of v1 can be chosen; that’s just not going to happen until the
it simply provides a base quantity to all for relative, standardization already takes place. . . . Then
quantitative comparisons between the consequences. there’s a purchasing cycle. . . . So I think three
years . . . is really the time that people are basi-
In the figures that follow, we specified that v1 = 25,
cally turning the very first updated system on.
and, as a result, v2 = 50, and v3 = 75. We then calculate
the scores of the consequences using the probabili- As we would expect, experts generally deemed
ties reported by each of the experts. Then, using the the consequences of Scenario 1 to be the most severe.
expertise ratings, we generate expertise weighted Even more interesting, the experts believed that the
averages to aggregate the results. Figure A.4 shows consequences of each scenario will be least severe in
these aggregated results, allowing for comparison the U.S. defense and intelligence establishment. This
across the three scenarios and each of the sectors. result is not a priori obvious because the U.S. defense
These results demonstrate, unsurprisingly, that and intelligence establishment is a high-value and
for each sector, Scenario 1 will yield the most dire obvious target of malicious actors.
consequences. However, not all experts agreed with However, experts argued that first, the U.S.
this. Some believed that there would be no difference defense and intelligence establishment is aware of
between the consequences under Scenario 1 and the potential threat and has already pledged to work
Scenario 2. While Scenario 2 allows for adoption proactively and preemptively to address any security
efforts to take place for three years following the vulnerabilities. The NSA announced in 2015 that it
standardization of PQC, “standardization is like the was planning a move to quantum-safe cryptography,
starting gun.” The main driver of this opinion was and other leadership in cybersecurity organizations
the time scale of adoption. As one expert put it, within the Department of Defense has made pub-
lic statements recognizing the need to prepare for
People will probably be implementing various
algorithms optimistically before the stan- the threat from quantum computing (Friedman,
dardization process finishes, but in terms 2018). Second, experts believed the U.S. defense and
of actually putting something through the intelligence establishment has built in fail-safes and
product testing and release cycle and putting a countermeasures. As one put it,

FIGURE A.4
Expertise Weighted Average Scores of the Consequences, by Sector, for Each
Hypothetical Scenario

100

Scenario 1
80 Scenario 2
Consequence score

Scenario 3
60

40

20

0
Defense Other government Advanced technology Mid technology

45
[Attackers] would require access to infra- because in Scenario 2, PQC has been available for
structures, which are air-gapped . . . and also, three years prior to the arrival of a cryptographi-
presumably, some which are based on cryptog- cally relevant quantum computer. The key issue is
raphy whose characteristics aren’t in the public adoption. For a variety of reasons, organizations in
domain because they’ve been developed in less-advanced technology industries are likely to less
classified settings. Additionally, . . . the defense
quickly adopt PQC. One reason is awareness. Because
sector . . . [has] the capability to switch to non-
less-advanced technology industries are likely to
vulnerable mechanisms.
derive less value from quantum computing, they are
Countermeasures and fail-safes they may adopt also likely to be less aware of the risks. One expert
are not likely to be panaceas but would offer some noted that in spite of the need for immediate action
protection. Moreover, one of the fail-safes for the U.S. to test postquantum cryptographic solutions, “I can
defense and intelligence establishment is the hier- count on my hand [the number of companies] that
archical structure that facilitates coordination and are already deploying [post-quantum] cryptography.”
last-resort communication. As one expert put it, Less awareness of the risks means less likelihood to
In the worst case, the defense agencies have invest in mitigation. Even when awareness is high,
a mechanism that probably isn’t open to there are still financial constraints. Early actions are
most commercial enterprises, namely [the more costly than later ones because the technology
Defense Secretary] can just go on TV and say, is newer. And the benefits to security are always
“Attention all units, stop using the various weighed against the costs.
encrypted communications channels, and Adoption of PQC in less-advanced technology
instead of that, designate a second lieutenant industries will involve product cycles. Organizations
from your units to carry things around on in less-advanced technology industries are not likely
paper in a briefcase.” to invest in home-grown postquantum cryptographic
Third, nondefense government agencies and solutions. Instead, they will buy off-the-shelf solu-
private-sector entities may be more vulnerable to tions from suppliers. This means that their suppliers
attack than government agencies, because they will first have to develop, test, produce, and offer
hold data of high value to attackers but may be less the solutions for sale. Each organization also has
well-defended than classified defense and intelli- a supply and technology refresh cycle. Computing
gence information. U.S. agencies such as the Internal resources in less-advanced technology industries
Revenue Service or Social Security Administration are not replaced every year or even every few years.
maintain aging, obsolete legacy systems (GAO, 2016). This means that it will take time or additional money
They may also have less flexibility in reacting to a to replace existing computing resources with new
perceived threat: products that have incorporated postquantum cryp-
tographic solutions.
The alternative is basically just to turn every-
Finally, experts believed that the consequences of
thing off, and, I think, in most nondefense
agencies, that just isn’t an option. Certainly, each scenario will be comparable between other U.S.
in the Department of Energy, you couldn’t government agencies and private-sector advanced
do that. You couldn’t do it in any of the state technology industries. Part of this similarity is due to
agencies that have to deliver social benefits, the grouping. Each of these sectors is broadly defined
or there would be massive civil unrest. You and includes some entities that will take many steps
certainly couldn’t do it at the [Federal Aviation to ensure the security of the information they hold,
Administration], and so on. as well as other entities that will not take sufficient
In the less-advanced technology private sector, steps. Additionally, in sectors where regulations do
experts believe that the consequences of Scenario 1 not mandate the proactive implementation of new
will be the greatest, but the consequences of Scenario and advanced security procedures, the implementa-
2 will not be much less severe. This is interesting tion will be slow because of the high cost:

46
Even at Google, which I think is probably the C, available online at www.rand.org/pubs/research_
best in the industry, there’s just so much infra- reports/RR3102.html.
structure, and the agility required to ensure
that nobody ever applies a software update Awareness
that was maliciously signed, or something like
that, is just so much beyond the day-to-day We used a consumer survey of 1,100 respondents, as
vigilance which is built into business practices described, to explore awareness of quantum comput-
that it would require really an extraordinary ing, how encryption is used online, and how quan-
effort of hygiene to reliably prevent that from tum computing may affect cybersecurity. As shown
happening. in Figure A.5, about 80 percent of consumers report
that they are not at all aware of quantum computing
or its potential threats to cybersecurity. Moreover,
Consumer Survey most who report any awareness have low awareness.
Awareness of how encryption is used on the internet
We used a consumer survey because the risks to
is relatively higher; however, the majority (60 percent)
encryption posed by quantum computing extend to
of consumers report that they are not at all aware of
the modern global economy. If consumers reduce or
encryption on the internet.
redirect their online presence because of fears for the
By age, the results unsurprisingly show that
security of their personal, financial, and other private
awareness of quantum computing is highest among
information involved in digital interactions, it may
those 18-to-34 years old, but even among this group
have large effects on organizations that do not take
awareness is still low, with 76 percent not at all aware
the necessary precautionary steps and on the mod-
of quantum computing. Meanwhile, 81 percent of
ern global economy. Alternately, the effects could
people 35–54 years old and 82 percent of people aged
be minimal because consumers place little value on
55 and older are not at all aware of quantum com-
the privacy of their information or have no power to
puting. Moreover, even among the youngest survey
control their privacy.
respondents, there was little awareness of the poten-
Details of the consumer survey, including the
tial threats posed by quantum computing, with
exact questions asked, are included in Appendix

FIGURE A.5
Awareness of Quantum Computing, Encryption, and the Threats to Encryption Posed
by Quantum Computing

80

Quantum
computing
60 Quantum
computing
threats
Percentage

Encryption
40

20

0
Not at all Low Average Somewhat Extremely

NOTE: Bars represent weighted average; whisker lines indicate range.

47
77 percent of people 18-to-34 years old reporting (21 percent) than the Target breach (12 percent). Given
they were not at all aware. Men were more likely than the difference in the amount of personal information
women to report awareness of quantum comput- held by Equifax and Target, the results indicate that
ing, how encryption is used on the internet, and the consumers understand the difference in the conse-
potential threats to encryption posed by quantum quences between the two cybersecurity incidents.
computing. While there are no significant differences by sex
in the level of concern following these two cybersecu-
Previous Cybersecurity Breaches rity incidents, there are significant differences by age,
Because understanding how people have responded with older adults generally more concerned about
to cybersecurity incidents in the past is key to both cybersecurity incidents. The left side of Figure
predicting how they may respond in the future, our A.7 shows the level of concern by age about the
survey probed consumer attitudes toward previous Target breach, and the righthand side shows the level
breaches. of concern by age about the Equifax breach. Among
Figure A.6 shows the level of concern regarding the 18-to-34 age group, approximately 40 percent
the Target breach of 2013 and the Equifax breach of expressed no concern about each of the breaches,
2017. Overall, the level of concern regarding the two but while only 10 percent expressed extreme con-
breaches was similar, though concern was slightly cern about the Target breach, 17 percent expressed
greater for the Equifax breach. Because Equifax extreme concern about the Equifax breach. People
collects sensitive financial information about all aged 55 and older expressed significantly more
U.S. residents, while Target has information only on extreme concern than younger age groups about
its shoppers, the level of concern about the Equifax both the Target breach (17 percent to 10 percent) and
breach should, logically, be the greater of the two. Equifax breach (27 percent to 18 percent). And while
Results conformed to this expectation, with 66 percent the plurality (29 percent) of the 55+ age group was
reporting some level of concern (from low to extremely unconcerned about the Target breach, the plurality
concerned) following the 2013 Target breach, and (27 percent) of the 55+ age group was extremely con-
70 percent reporting concern following the Equifax cerned about the Equifax breach.
breach. A significantly greater percentage reported We also asked respondents to report any actions
being “extremely concerned” about the Equifax breach they took following the Target and Equifax breaches.
Figure A.8 shows how consumers reportedly

FIGURE A.6
Level of Concern Regarding the Target and Equifax Breaches

50

Target

40 Equifax
Percentage

30

20

10

0
Unconcerned Low Average Somewhat Extremely

48
FIGURE A.7
Level of Concern, by Age, Regarding the Target (top) and Equifax (bottom) Breaches

50

18–34

40 35–54
55+
Percentage

30

20

10

0
Unconcerned Low Average Somewhat Extremely

50

40
Percentage

30

20

10

0
Unconcerned Low Average Somewhat Extremely

responded to the Target and Equifax breaches. While demonstrate that older adults were more likely to
the majority took no action in response to either respond than younger adults. For the Target breach,
breach, significantly more people acted in response to the main, statistically significant difference is that
the 2017 Equifax breach than in response to the 2013 adults 55+ were more likely than the younger age
Target breach. While an equal proportion of respon- groups to limit or completely stop shopping at Target
dents checked the security of their information following the breach. Twelve percent of the 55+ age
following each breach, a significantly greater percent group limited or stopped shopping at Target, while 7
of respondents froze all or just their Equifax credit percent of the younger age groups limited or stopped
reports following the Equifax breach. shopping at Target. Following the Equifax breach,
While the reported responses to the Target and 5 percent of the 18-to-34 age group, 9 percent of the
Equifax breaches do not differ by sex, the results 35-to-54 age group, and 12 percent of the 55+ age

49
FIGURE A.8
Responses to the Target and Equifax Breaches

60

Target
50
Equifax

40
Percentage

30

20

10

0
Nothing Checked info Froze credit reports Identity protection

group froze their credit reports. Similarly, 4 percent The results, as shown in Figure A.9, are logically
of the 18-to-34 age group, 8 percent of the 35-to-54 consistent—the more proximate the threat, the greater
age group, and 12 percent of the 55+ age group pur- the response. While a portion of consumers will
chased and began using an identity protection service proactively take concrete steps to limit their vulner-
following the Equifax breach. ability, only when the threat is most pressing will
consumers purchase a new smartphone or stop using
Hypothetical Threats their smartphones. The most common response to the
Finally, we used the consumer survey to assess how first two scenarios is to keep the same smartphone but
consumers may respond to the potential threats posed remove private information from it. The second most
by a quantum computer capable of breaking current common response to the first two scenarios is to keep
public key encryption. To do this, we presented three the same smartphone and use it in the same way. Only
hypothetical scenarios regarding a technology that approximately 10 percent of respondents said they
would allow hackers to control the respondents’ smart- would purchase a new, more secure phone under the
phones. The first scenario describes the technology first two scenarios, and another 10 percent of respon-
as nearly developed but states that the respondent’s dents said they would stop using smartphones entirely.
phone maker has not installed new security to prevent In contrast, the most common response to the third
breaches. In the second scenario, hackers have the new scenario is to stop using smartphones. Compared to
technology, some phones have been hacked, and still the first two scenarios, respondents are significantly
the smartphone maker has not installed new security. more likely to either stop using smartphones or to
Finally, in the third scenario, the respondents’ smart- buy a new, more secure smartphone in response to
phone maker has been hacked and the hackers could scenario 3. Similarly, respondents are significantly less
now see and control everything on the respondents’ likely to keep their smartphone (either to use the same
smartphones. For each of these scenarios, respondents way, remove private information, or with the plan to
selected from the following options: Keep the phone buy a new phone in the future) in response to scenario
and use it the same way; keep the phone but remove 3 than the other scenarios.
private things; plan to buy a new, more secure phone; There are a few interesting differences in the
immediately buy a new, more secure phone; or com- responses by age. For the first scenario, the 18-to-34
pletely stop using smartphones. age group is relatively more likely to keep and use their

50
FIGURE A.9
Reported Responses to Hypothetical Scenarios

40

Nearly
developed
30 Available
Imminent
Percentage

20

10

0
Keep, same use Keep, remove Plan to buy new Buy new now Stop using
private

smartphones the same way (32 percent compared to For women, the most common response to each
26 percent of older age groups). However, the most scenario is to keep their phones but remove private
common response among the 18-to-34 age group is to information. In response to scenarios 1 and 2, 40
keep but remove private information (36 percent). This percent of women would keep their smartphones and
is also the most common response among older age remove private information, while only 27 percent
groups. In this scenario, respondents in the 35-to-54 of men report the same response. In response to
and 55+ age groups are significantly more likely than scenarios 1 and 2, men are more likely to either plan
their younger counterparts to stop using smartphones, to buy a new phone, actually buy a new phone, or
but only 11 percent of 55+ and 9 percent of 35-to- completely stop using their smartphones. However,
54 would take that step. Among 18-to-34-year-old in response to scenario 3, women are more likely to
respondents, the main change in the second scenario is remove private information, plan to buy a new phone,
that the likelihood of buying a new phone or stopping or actually buy a new phone. Men are more likely to
use of any smartphones increases, while the percentage pursue the extreme courses of action: either keep and
that keeps but removes private information decreases. use their smartphones the same way, or completely
Among 35-to-54 and 55+ respondents, the main stop using smartphones.
change is that users who keep and use their phones the In addition to the aforementioned descriptive
same way decreases, while more respondents keep and analysis, we also used the consumer survey data to
remove private information. In the third scenario, the explore the association between active responses
results show that the most common response among to the hypothetical scenarios and how consumers
the 18-to-34 age group is to do nothing, keeping their reacted to the Target and Equifax breaches. To do
smartphones and using them the same way (23 per- this, we first defined an active response as immedi-
cent), but the percentage that would purchase a new, ately purchasing a new, more secure phone or com-
more secure smartphone increases to nearly as large pletely stopping use of smartphones. Let Ai denote
(22 percent). In contrast, the most common response a binary variable indicating an active response by
to this scenario among the older age groups is to stop individual i. Next, let Ti denote the response to the
using smartphones (about 27 percent). Target breach; this is also a binary variable, equal to
0 if individual i did nothing and 1 if individual i did

51
anything (checked the security of their information, purchasing a new, more secure phone, or completely
froze credit reports, began using identity protection, stopping use of smartphones) to the first two hypo-
or limited/stopped shopping at Target). Also let Ei thetical scenarios. Additionally, any response to the
be a binary variable indicating any response to the Target breach is positively, but not significantly, associ-
Equifax breach. Finally, let Xi denote individual ated with an active response to the third hypothetical
characteristics. We include Xi to control for differ- scenario. Overall, these results indicate that responses
ential responses by age, sex, and state of residence. to the Target breach are indicators of a consumer’s
Estimating the following equation shows the asso- level of privacy concern. Additionally, the results
ciation between responses to the Target or Equifax suggest that responses to the Target breach potentially
breaches and an active response to the hypothetical identify first movers, or consumers who will be among
scenarios holding individual characteristics constant: those who respond first to cybersecurity threats posed
Ai = α + γTi + δEi + θXi + εi . by the development of a quantum computer. On the
other hand, the positive but insignificant association
We first examine the associations between
between any response to the Target breach and an
responses to the hypothetical scenarios and the
active response to the third hypothetical scenario indi-
Target breach. The estimated associations seen in
cates that, for imminent threats of the highest magni-
Figure A.10 are the result of logit estimations of the
tude, many more people will actively respond, so prior
previous equation for each of the three hypothetical
actions are less informative predictors.
scenarios. These results indicate that any response
Next, in Figure A.11 we examine the associations
to the Target breach is positively and significantly
between responses to the hypothetical scenarios and
associated with an active response (either immediately

FIGURE A.11
FIGURE A.10
Estimated Association Between Active
Estimated Association Between Active
Responses to Hypothetical Scenarios
Responses to Hypothetical Scenarios
and Reactions to Equifax Breaches
and Reactions to Target Breaches

Nearly
Nearly developed
developed 30
30
Available
Available
Imminent
Imminent 25
25

20
20
Percentage
Percentage

15
15

10
10

5
5

0
0

52
the Equifax breach. These results indicate that any weighted, nationally representative sample of con-
response to the Equifax breach is positively and sig- sumers. The survey was designed to assess consumer
nificantly associated with an active response (either awareness of quantum computing and encryption,
immediately purchasing a new, more secure phone or how consumers have responded to previous cyber
completely stopping use of smartphones) to all of the incidents, and how consumers may respond to the
hypothetical scenarios. Similar to the Target results, threat posed by a quantum computer capable of
these results indicate that responses to the Equifax breaking current public key encryption. The method-
breach are indicators of a consumer’s level of pri- ologies employed for this mixed-methods approach,
vacy concern. Just as responses to the Target breach and the details of the findings, are described below.
potentially identify first mover consumers, so too do
the responses to the Equifax breach identify consum-
Expert Elicitation
ers who will be among those who respond first to
cybersecurity threats posed by the development of a Expert elicitation is a formalized, documented
quantum computer. procedure for obtaining and combining the probabi-
listic judgments of experts (Colson and Cooke, 2018).
While the method is not appropriate to examine
Appendix B: Methodology empirically observable quantities, it has been suc-
The development of a quantum computer, the threat cessfully employed to explore questions with limited
to current PKC posed by a quantum computer, and empirical support that are measurable in theory but
the development of cryptographic solutions are each not in practice (Cooke and Goossens, 2008). For
events that carry uncertainty regarding whether they instance, environmental health studies have often
will be realized and when. Nevertheless, to avoid the demonstrated the negative effects of particulate
potentially disastrous effects of a cryptographically matter (PM10—10 to 2.5 micrometers in diameter)
relevant quantum computer in the hands of mali- and fine particulate matter (PM2.5—2.5 microme-
cious actors before the cryptographic solutions have ters or less in diameter) exposure using monitored
been adequately adopted, policymakers must design measures of both types of pollution. In contrast,
and implement effective remedies as soon as possible. the health effects of ultrafine particulate matter
Unfortunately, existing data and modeling tools can- (PM0.1—0.1 micrometers or less in diameter) can-
not provide decisionmakers with all of the informa- not be ascertained by empirical research because of
tion required to understand the timeline of the threat the lack of measures of ultrafine particulate matter.
and the expected security risks. Lacking empirical measures, researchers have used
Due to the inadequacy of available data and expert elicitation to assess the evidence for a causal
tools, we opted to employ a mixed-methods approach relationship between ultrafine particulate matter
to perform this research. The first step was an exten- and health (Knol et al., 2009). Perhaps a more apt
sive literature review that provided a baseline under- comparison to the security risks of quantum com-
standing of historical patterns, current issues, and puting is climate change. As with computing power
recent progress in quantum computing development, and speed, we can observe the effects of mild to
PQC research, and cryptographic transitions. Using moderate changes in climate, but the empirical basis
the insights gained, we developed and implemented for judging the effects of passing major thresholds
an elicitation of expert opinion on the security risks in both climate and computing power and speed are
that may result from the future realization of a quan- limited. Expert elicitation has been used to examine
tum computer capable of breaking current public various potential impacts of climate change, includ-
key encryption. The literature review also helped ing the effects to Atlantic Meridional Overturning
identify an initial set of experts and provided a basis Circulation (Zickfield et al., 2007) and forest ecosys-
for the questions we posed. The final step in our tems (Morgan, Pitelka, and Shevliakova, 2001).
mixed-methods approach was to field a survey to a The best practice is for expert elicitations to
guide future data collection, modeling, and analysis.

53
However, it is not always possible to wait for the referenced in the literature, and we included each
empirical measures before designing policy. This is of these names that we encountered as potential
the niche that expert elicitations are best suited to interviewees. Additionally, to gain access to certain
address. In this vein, expert elicitations have been private-sector companies of interest, we relied on the
used in a range of fields for a variety of questions authors’ connections, which generally led to a referral
ranging from nuclear safety to economic growth of an employee whom we could interview. Finally,
(Colson and Cooke, 2018). Well-executed expert we also attempted to contact a number of experts in
elicitation can compensate for gaps of knowledge the private sector using their descriptions on their
that data and analysis cannot address and inform companies’ websites.
the design of policies like those involving the uncer- These efforts gave us the initial list of potential
tain realization of quantum computing (Colson and interviewees, but we did not select everyone from this
Cooke, 2018). Expert elicitations require careful list for an interview. After identifying and contacting
design and pilot testing of the interview protocol, potential interviewees, we ultimately selected experts
expert selection, and conducting interviews, followed following reviews of their qualifications and/or
by analysis (Morgan and Henrion, 1990). preliminary conversations about the project and their
suitability. This was particularly true for private-
Expert Selection sector experts because their backgrounds and suit-
In contrast to most sampling efforts, the objective ability were more difficult to assess than those of
of expert elicitations is not to obtain a statistically academics who have publicly listed publications.
representative sample but rather to understand the The final step that we took in identifying and
range of responsible expert judgments (Morgan, selecting experts was snowball sampling. In per-
2014). Consequently, experts must be carefully forming snowball sampling, we solicited recommen-
selected. Typically, experts should be selected to dations from the interviewees as we conducted the
represent a diversity of knowledge, background, interviews. When individuals were identified via
and opinion (Colson and Cooke, 2018). We used the snowball sampling, we also reviewed their quali-
literature review to identify the major perspectives fications and/or had preliminary conversations to
and interpretations within the relevant fields and assess how appropriate their expertise was for the
ensure that each were represented. We primarily study. Again, we did not select every referral to be
sought experts in three fields: quantum computing interviewed.
development, PQC and cryptographic standards Ultimately, we reached out to 30 academic and
development, and commercial industry cybersecu- industry experts in quantum computing develop-
rity. The literature review gave us the names of many ment, PQC and cryptographic standards devel-
experts who have published in the fields of quantum opment, and commercial industry cybersecurity.
computing development, as well as PQC and cryp- Because there is no “right answer” to the question
tographic standards development. In addition to “How many experts are needed for a good elici-
experts identified in the literature review, we also tation?” we started out targeting a range that we
initially reached out to members of the National wanted to interview, specifically 12 to 21. We sought
Academy of Sciences, Engineering, and Medicine a diversity of experts from quantum computing and
Committee on the Technical Assessment of the cryptography, and from academic and private-sector
Feasibility and Implications of Quantum Computing backgrounds. Following the identification of suitable
to form our initial list of interviewees. While aca- potential interviewees, the final number of interviews
demic experts are appropriately selected from the was determined by the number of responses overall,
literature review and consultation with the national as well as the number of responses from academic
academies, quantum computing is an area of large experts and from private-sector experts. Ultimately,
private-sector investments and research. At times, 17 of these experts agreed to be interviewed. Four of
experts from the private sector are mentioned or the experts we contacted never responded, and nine
declined for various reasons, including scheduling

54
conflicts. We conducted a total of 15 interviews List of Interviewees
because among the 17 experts who agreed to be Dustin Moody
interviewed, two groups of two were from the same
Mathematician, Cryptographic Technology Group,
organization and desired to be interviewed together.
NIST
Importantly, experts agreed to be interviewed either
without attribution or anonymously, and they were John Martinis
able to decline to answer any question. We erred on Quantum Hardware Lead, Google
the side of nonattribution, as opposed to anonymity, Craig Mundie
in an attempt to meet the recommendations of M. G.
Owner, Mundie & Associates, LLC
Morgan (2014)—specifically, that “too much ano-
nymity may result in their taking those judgments Lily Chen
less seriously.” However, because we were interview- Project Leader, Cryptographic Technology Group,
ing experts from the private sector about sensitive NIST
topics, we also offered anonymity if preferred. The Michele Mosca
experts also occasionally declined to answer for Professor, University of Waterloo
reasons ranging from no opinion to having sensitive
information. Susan Coppersmith

The text box on this page gives the interview- Professor, University of Wisconsin-Madison
ees’ names and positions (when the experts agreed Robert Blakley
to attribution) or just their positions (when they Global Head of Information Security Innovation,
requested anonymity). Citigroup

Brian LaMacchia
Design of the Interview Protocol
Security and Cryptography Lead, Microsoft
Reviews of the best practices in expert elicitation dis-
Research
cuss the need to carefully structure questions and the
overall flow of the elicitation to accurately capture Bruce Schneier
experts’ beliefs expressed as probabilities (Colson and Chief Technology Officer, IBM Resilient
Cooke, 2018). The protocol that we designed followed Mark Jackson
the example of Curtright, Morgan, and Keith (2008),
Scientific Lead, Cambridge Quantum Computing
as referenced in Morgan (2014).
The protocol was developed through multi- Toby Joyce
ple iterations, consultation with expert elicitation Cambridge Quantum Computing
practitioners, and piloting. The goals of the protocol Charles Tahan
were to elicit structured responses to the timeline
Physicist, Laboratory for Physical Sciences
of the development of a cryptographically relevant
quantum computer, the timeline of the standardiza- Research Manager
tion and adoption of PQC, and the magnitude of the Computing Technology Company
security risks under hypothetical future scenarios. Cryptographer
Additionally, we wanted to involve less structured
Computing Technology Company
components of the interviews in which the experts
would discuss any issues regarding the security Information Security Officer
risks of quantum computing on their minds, as well Financial Services Sector
as issues, factors, or consequences that we had not Information Security Officer
discussed within the structured component of the
Telecommunications Sector
protocol. Following multiple iterations of the pro-
tocol between the authors, we consulted with other Cyber-Security Engineer
Network Hardware Company

55
practitioners of expert elicitation. Finally, we piloted relevant quantum computer by a malicious state
the protocol to assess wording, clarity, and timing. actor, and the adoption of a cryptographically rel-
The protocol that we developed had six sections. evant quantum computer by a malicious nonstate
First, we provided an introduction to the goals of actor. Finally, we elicited timelines for the creation of
the project. Second, we provided background infor- a quantum safe security suite and for the adoption of
mation on the potential cybersecurity threats posed the quantum safe security suite by the U.S. defense
by quantum computers. While we were questioning and intelligence establishment, other U.S. govern-
experts, there were components of our research ment agencies, advanced tech private-sector indus-
that not all experts were versed in. Experts in the tries, and less technologically advanced private-sector
engineering issues of quantum computers were less industries. In the final section of the protocol,
versed in the security implications, security experts we conclude with various open-ended discussion
were less versed in the timeline of the development questions about issues not addressed in the protocol,
of quantum computing, and so on. The third section other areas of interest that we identified in the litera-
of the protocol asked one open-ended question about ture review, and any thoughts that the expert wished
the expert’s expectations of the security risks posed to express regarding our research questions. The full
by a cryptographically relevant quantum computer. protocol can be seen in Appendix C.
With this question, we aimed to understand what Among the key issues that we addressed in the
were some main issues on the minds of the experts, development of the protocol were cognitive heuris-
as well as promote discussion that would aid in better tics, uncertainty, and scale. Because people are prone
understanding the reasoning behind the quantitative to the cognitive heuristic of “anchoring and adjust-
estimates we elicited in subsequent sections. In the ment,” or to anchor with the first value and then
fourth section, we posed three hypothetical scenarios adjust up or down from there, we minimized the
and asked the experts to assess the magnitudes of the influence of this heuristic by eliciting extreme values
consequences. The first scenario we posed described prior to the best estimate (Tversky and Kahneman,
a future where a cryptographically relevant quantum 1974; Morgan, 2014). This issue is particularly rele-
computer is created before PQC is standardized. The vant for the timelines of the development of quantum
second scenario we posed described a future where computing and the standardization and adoption
a cryptographically relevant quantum computer is of PQC. In these cases, we asked the experts to first
created shortly after the standardization of PQC, “report the earliest possible year that the technology
when adoption is just beginning. The third scenario could be developed or the event could occur.” Then
we posed described a future in which a cryptographi- we asked about the “latest possible year” followed by
cally relevant quantum computer is created ten years the “best estimated year.” The issue of uncertainty
after the standardization of PQC. For each of these is related to the order of the questions. Because it is
scenarios, we asked experts to separately assess the difficult to think probabilistically, particularly about
consequences for the U.S. defense and intelligence infrequent or future events, estimates are generally
establishment, other government agencies, advanced subject to overconfidence, which minimizes uncer-
tech private-sector industries, and less technologi- tainty. To address this, we followed up elicitations of
cally advanced private-sector industries. In the fifth extreme values with questions about anything that
section, we asked experts about the likely timelines could alter these values (Morgan, 2014). Specifically,
for the creation and adoption of quantum computing, after asking about the “earliest possible year” and
PQC, and some associated technologies. We elicited the “latest possible year” for the timeline questions,
timelines for a cryptographically relevant quantum we asked experts to “imagine any possible circum-
computer, or a quantum computer capable of break- stance under which the event could occur earlier
ing current public key encryption. Additionally, we [later]. If you can think of such a circumstance, then
asked about the timelines for the U.S. government please revise your estimate accordingly.” Finally,
adoption of a cryptographically relevant quan- because there is uncertainty regarding the scale of
tum computer, the adoption of a cryptographically current cybersecurity threats, there is difficulty in

56
ascertaining an appropriate scale to describe the In addition to describing the elicited estimates
magnitudes of future cybersecurity threats that may for each expert, we generated aggregated estimates.
be posed by quantum computing. The issue of scale Aggregated parameters that combine the judgments
is problematic for our assessment of the magnitude of of small, unrepresentative samples must be inter-
the security risks under hypothetical future scenar- preted with caution. There are different methods to
ios. To address this issue, we aimed to create simple reach aggregated methods. Our expert elicitation did
scales incorporating the most direct consequences of not involve behavioral methods to combine expert
the potential threats. Specifically, we asked experts to opinions, like the Delphi method (Rowe and Wright,
place the consequences of the hypothetical scenarios 1999). Instead, we used mathematical methods to
on scales from 1 to 3, 1 describing occasional access combine expert opinions. The classical method to
to sensitive information, 2 describing frequent access mathematically aggregate expert opinions involves
to sensitive information, and 3 describing complete also asking calibration questions about values that
control of information systems. are uncertain to the experts but known to the ana-
The experts were identified, contacted, and lysts (Clemen and Winkler, 2007). Because of the
selected by the authors of this report. Following quickly evolving nature of quantum computing and
institutional review board approval, the authors PQC research, the uncertainty surrounding each,
scheduled and conducted the interviews during an and the proprietary and/or secretive research and
approximately three-month period between May 11, advances being made, we judged that calibration
2018, and August 16, 2018. Before the interviews, the questions would not be feasible. Instead, we asked the
experts were sent the interview protocol, a consent experts to provide a self-rating of their expertise in
form, and a form to self-report their expertise in the quantum computing development and adoption, as
areas of quantum computing development and adop- well as PQC development and adoption. Additionally,
tion and also PQC development and adoption on we asked the experts to provide a self-rating of their
scales from 1 to 5. At the beginning of each interview, expertise in the various sectors we examine: U.S.
the authors checked whether the consent form had defense and intelligence establishment, U.S. other
been filled out; if it had not, they read them aloud government agencies, private-sector advanced tech
and received consent prior to beginning the inter- industries, and less technologically advanced pri-
view. Included within the consent form was consent vate-sector industries. The ratings were given on
to be audio-recorded. If the experts consented to be scales from 1 to 5. The interviewing authors also
recorded, the authors began the recording and then provided independent ratings of the expertise of each
proceeded with the interview. After the interviews, expert on scales from 1 to 5. Eighty-five percent of
the recordings were transcribed. the experts’ self-ratings and the interviewers’ inde-
pendent ratings were equal or within 1 point of each
Elicitation Analysis Plan other on this scale. Following the authors’ indepen-
Our general plan to analyze the data that we elic- dent ratings, disagreements were resolved through
ited from our selected and interviewed experts was iterative revision until consensus was reached.
descriptive. We described the elicited timelines for The expertise ratings enabled us to generate
the development of a cryptographically relevant aggregated estimates by expertise weighted average.
quantum computer and the elicited timelines for Consequently, in addition to showing the elicited
the standardization and adoption of PQC, and we estimates from each expert, we showed expertise
described the elicited magnitudes of the security weighted averages of the timelines for the develop-
risks under hypothetical future scenarios. We com- ment of quantum computing and PQC and the mag-
pared these elicited estimates across experts grouped nitudes of security risks from hypothetical scenarios.
by their affiliation: general or academic expert, and Additionally, each of these was disaggregated by
industry expert. affiliation: general or academic expert, and industry
expert.

57
Consumer Survey either place less value on the privacy of their infor-
mation than they do on the services they receive in
Subsequent to the literature review and expert
exchange, or that consumers feel little power to con-
elicitation, we designed a survey to explore aware-
trol the privacy of their information. In this instance,
ness of quantum computing and encryption, the
major negative effects to the global economy may be
responses to previous cyber incidents, and poten-
mitigated.
tial responses to the threat posed by a quantum
computer capable of breaking current public key
Design of the Google Consumer Survey
encryption. These questions go beyond the purview
of the experts whom we interviewed. Expert aware- We used Google Consumer Surveys (GCS) to col-
ness and responses to the complex risks posed by a lect a weighted, nationally representative sample of
cryptographically relevant quantum computer will consumers to explore awareness of quantum comput-
naturally not be representative of the broader pop- ing and encryption, the responses to previous cyber
ulation. Consequently, we explored these questions incidents, and potential responses to the threat posed
with a sample of active digital consumers who are the by a quantum computer capable of breaking current
most at risk for the potential future negative effects public key encryption. We surveyed 1,100 respon-
of a cryptographically relevant quantum computer. dents with ten questions designed to build off the
Active digital consumers describes the vast majority knowledge we gathered through the literature review
of Americans in 2018. In 2018, the percentage of U.S. and the expert elicitation.
adults who use the internet reached 89 percent, with GCS are probability-based internet surveys that
high rates of use among all demographic groups are new to the expanding market for online survey-
(Smith and Anderson, 2018). ing. Survey research has evolved from face-to-face
This consumer survey and the subsequent anal- interviews, to telephone surveys beginning in the
ysis add to the small number of studies like Ablon et 1970s, and now to internet surveys in the past ten
al. (2016) that have examined the consumer perspec- years (McDonald, Mohebbi, and Slatkin, 2012). GCS
tive on cybersecurity breaches. While previous stud- generates a probability-based representative sample
ies have examined consumer attitudes toward data using demographic characteristics inferred from
breaches and the subsequent corporate responses, information about the types of websites respondents
we aimed to understand the range of actions that have visited. The target population for U.S. adults is
consumers might take in reaction to different levels obtained from the most recent Current Population
of breaches, and how those actions might translate to Survey and is formed from the joint distribution of
the unique risks that quantum computing poses to age group, gender and location (McDonald, Mohebbi,
public key encryption. and Slatkin, 2012). GCS also use post-stratification
Our questions about awareness and responses to weighting to compensate for sample deficiencies
risk have implications that extend from individual and reduce sample bias (McDonald, Mohebbi, and
organizations to the modern global economy. On the Slatkin, 2012). In a comparison of the inferred demo-
one hand, if consumers fear for the security of their graphics to reported demographics, Pew Research
personal, financial, and other private information demonstrated that although there are errors at the
involved in digital interactions, they may reduce or individual respondent level, correlations between
eliminate their online presence. Given the migra- substantive questions and demographics are consis-
tion from analog to digital of so many interactions, tent with those found in surveys with reported demo-
ranging from social to banking to health care, this graphics (Keeter and Christian, 2012). Chang and
possibility would be a major blow to specific organi- Krosnick (2009) compared random digit dialing to
zations that do not take the necessary precautionary a probability-based internet survey and a non–prob-
steps and to the modern global economy as a whole. ability based internet survey over the course of the
On the other hand, the evidence from recent cyber- 2000 presidential election. The results suggest that
security breakdowns may suggest that consumers probability-based internet surveys can produce more

58
accurate results than random digit dialing and non– and understandability among the respondents,
probability based surveying (McDonald, Mohebbi, we designed the hypothetical scenarios around
and Slatkin, 2012). The representativeness of GCS is the breaching of mobile devices. In other words,
key to our results, but even if the GCS are most rep- we designed the scenarios around the previously
resentative of the portion of the population that uses described “just-in-time” risk that a quantum com-
the internet, that is appropriate for our study. puter could obtain the private key for a root certif-
Additionally, GCS are designed to be cheap, icate authority and issue digital certificates falsely
have a low response burden, and provide rapid identifying itself to upload malicious software and
turnarounds. The cost of a GCS survey is $0.10 per gain control of mobile devices. The first hypothetical
response to each question. The GCS surveys are scenario posits that a technology is “nearly devel-
limited to ten questions, which, combined with the oped” that would allow hackers to “control smart-
low click burden, leads to an average response rate phones” and “your smartphone maker . . . has not
of 16.75 percent compared to less than 1 percent for installed new security but others have.” The second
most internet surveys (Lavrakas, 2010), and 7 percent hypothetical scenario increases the proximity of the
to 14 percent for telephone surveys (Pew Research threat and posits that “hackers have the tech to con-
Center, 2011). GCS also offer the benefits of rapid trol smartphones” and “your smartphone maker has
turnarounds: Surveys are typically completed within not installed new security.” The final hypothetical
one week (Santoso, Stein, and Stevenson, 2016). scenario posits that the “hackers have used the new
We designed our survey through multiple itera- tech” and “now can see and control everything on
tions and multiple pilot tests. Following multiple iter- your smartphone.” The range of potential responses
ations of the survey between the authors, we piloted to each of these scenarios extends from keeping the
the survey to assess wording, clarity, and timing. We smartphone and using it the same way to
conducted pilots with colleagues who are experts in stopping use of smartphones altogether. See
survey methodologies as well as with multiple poten- Appendix D, available online at www.rand.org/pubs/
tial nonexpert respondents. The full survey can be research_reports/RR3102.html, for the text of the
seen online in Appendix C. consumer survey.
The survey that we designed had a total of ten
questions divided into three sections designed to Consumer Survey Analysis Plan
address three different goals. In the first section, the Our analysis plan of the consumer survey is descrip-
goal was to understand awareness. We asked ques- tive. As a first step, we will show overall awareness of
tions to assess awareness of quantum computing, quantum computing, concern and responses to pre-
encryption, and the potential cybersecurity effects vious cybersecurity breaches, and reported responses
of quantum computing. In the second section, the to hypothetical scenarios involving different levels
goal was to assess how consumers responded and felt of cybersecurity threats. Following this, we will use
about previous cybersecurity breaches. We briefly the demographic information collected as part of the
discussed the two recent breaches of Target (Wallace, consumer survey to show how the responses vary by
2013) and Equifax (Bernard et al., 2017). These inci- gender, age, and region. And finally, we use descrip-
dences were selected because they are well-known tive regression analysis to show how responses to the
and affected a broad array of consumers but, because hypothetical scenarios are associated with responses
of the differences in the information held by each, to past cybersecurity incidents, controlling for demo-
could have elicited rationally different responses. For graphics. The estimates from this descriptive regres-
each of these breaches, we ask how concerned con- sion analysis may have financial implications for the
sumers were and how they responded. In the third organizations that currently hold consumer private
and final section, the goal was to understand how information.
consumers might respond to hypothetical scenarios
involving different levels of threats to the security
of their information. For the greatest applicability

59
Notes Telecommunications Standards Institute (ETSI) (2015) and
Shenk (2018).
1
Practically speaking, key generation and sharing in networks is
now often accomplished by performing a public key exchange,
12
Note that, contrary to popular belief, quantum computers do
such as the Diffie-Helman key exchange protocol, where short- not do this by “testing every potential solution simultaneously,”
lived public keys are often used to securely establish a shared as it is commonly described. Rather, they use a computational
symmetric key between two entities on a network. operation called a “quantum Fourier transform” to identify a
pattern in the key, enabling further conventional computing
2
While cryptographic applications are the focus of this report, it operations to derive the private key.
should be noted that a significant amount of effort on develop-
ment of quantum computers is motivated by expected com- Note that this is sometimes called catch now, decrypt later, but
13

mercial applications that are unrelated to cryptography. These we adopted this term after discussion with Brian LaMacchia
applications include advancements in simulation, optimization, because it more fully encompasses the threat.
and quantum sampling, just to name a few. See Mohseni et al., 14
The protocol stack refers to the different layers of protocols,
2017, for more detail on other commercial applications driving governing different network activities, that interact with each
investment in quantum computing. other to form our communication infrastructure (MacMichael,
3
A fundamental theory of physics that describes the way matter 2017).
behaves at the atomic and subatomic length scales. 15
Note that in some systems, ephemeral keys are generated for
4
Some notable standards bodies working on this include the each individual message, not just for a new session, which would
European Telecommunications Standards Institute, Interna- provide additional protection.
tional Telecommunications Union Telecommunication Sector, 16
Certificate transparency refers to frameworks intended to mon-
the Internet Engineering Task Force, and the American National itor and audit how some certificates are issued or used (Google,
Standards Institute. As of September 2018, a useful summary of undated).
these efforts by the ISARA Corporation can be found in Pecen
(2018).
17
Except where otherwise referenced, portrayed timelines are
notional and based on plausible, approximate development
5
All information captured before that transition, though, would cycles, adoption rates, and product lifetimes, as assessed by the
remain vulnerable to post-hoc compromise when quantum com- authors. The figure further optimistically assumes fast adoption
puting capability becomes available to attack the PKC protecting of PQC into product design life cycles across industries.
the stored data.
18
Note that this figure is meant to portray vulnerability in these
6
We note that this definition includes at least two consequential, products over time, not risk. That is, we do not discuss how likely
related concepts that are deliberately left ambiguous: the key it is that any vulnerability would be exploited or what the conse-
length of the cryptographic implementation, and the definition quences would be in such a case.
of a useful time frame. The time to reach a solution will naturally
increase with increasing key length and decrease with advancing
19
While many organizations have issued calls to action on cyber-
computing capability. We assume that there is enough uncer- security, NSTAC is a Federal Advisory Committee associated
tainty in predicting the timeline for some future capability that with the President, as few such committees are; its members are
more rigorously defining these concepts would not be more from industry; and it is run through the Department of Home-
instructive. land Security, potentially making such an effort more influential
and effective.
7
It is necessary to distinguish between logical qubits and physical
qubits or gates. Resource estimates usually find that thousands of
20
Occasionally, experts will report that their latest estimate is
logical qubits will be needed to perform these computations, and “never” or an indeterminate “long time.” Obviously, because this
these logical qubits will be composed of hundreds of millions of estimate is nonnumeric it cannot be directly incorporated into a
physical qubits or gates. weighted average. To calculate expertise weighted averages in the
presence of these nonnumeric estimates, we coded long time as
8
The NSA recently reorganized, disestablishing the IAD and 2080 and never as 2100.
placing many of its activities under the newly established Cyber-
security Directorate.
21
Note that the interview numbers in this and other figures
shown throughout this chapter do not correspond to the same
9
Key agreement algorithms and digital signature algorithms interview. The interview numbers were randomly and inde-
could also be mentioned here. They are functionally distinct pendently generated for each figure to preserve nonattribution
from the other methods discussed, and they are often used in and anonymity of the expert judgments.
concert with these other methods in modern communications
over the internet.
10
An alternative way to describe this would be to say that a cer-
tificate verifies that one user, and only that user, holds the private
key associated with its public key.
For a more thorough discussion of the effect of quantum com-
11

puting on current cryptography, see the works by the European

60
References “Chinese Satellite Uses Quantum Cryptography for Secure Video
Conference Between Continents.” (2018, January 30). Technology
Ablon, L., P. Heaton, D. C. Lavery, and S. Romanosky. (2016). Review. As of August 28, 2019:
Consumer Attitudes Toward Data Breach Notifications and https://www.technologyreview.com/s/610106/chinese-satellite-
Loss of Personal Information. Santa Monica, Calif.: RAND uses-quantum-cryptography-for-secure-video-conference-
Corporation, RR-1187-ICJ. As of August 27, 2019: between-continents/
https://www.rand.org/pubs/research_reports/RR1187.html
CISA­—See Cybersecurity and Infrastructure Security Agency.
Anschuetz, E. R., J. P. Olson, A. Aspuru-Guzik, and Y. Cao.
(2018, August 27). “Variational Quantum Factoring.” Cornell Clemen, R. T., and R. L. Winkler. (2007). “Aggregating
University. ArXiv Preprint. Probability Distributions.” In W. Edwards, R. F. Miles, Jr., and
D. von Winterfeldt, eds., Advances in Decision Analysis: From
Arute, Frank, et al. (2019, October). "Quantum Supremacy Using Foundations to Applications, Cambridge, UK: Cambridge
a Programmable Superconducting Processor." Nature, Vol. 574, University Press, pp. 154–176.
pp. 505–510.
Colson, A. R., and R. M. Cooke. (2018, February 2). “Expert
Ashford, W. (2018, August 23). “Cryptographic Agility Is Key Elicitation: Using the Classical Model to Validate Experts’
to Post-Quantum Security.” Computer Weekly. As of August 27, Judgments.” Review of Environmental Economics and Policy,
2019: Vol. 12, No. 1, pp. 113–132.
https://www.computerweekly.com/news/252447430/
Cryptographic-agility-is-key-to-post-quantum-security Committee on National Security Systems. (2015). “Use of
Public Standards for the Secure Sharing of Information Among
Aysu, A. (2018). “Post-Quantum Cryptography: From National Security Systems.” Advisory Memorandum 02-15. Ft.
Theoretical Foundations to Practical Deployments.” Meade, Md.
Cryptography Special Issue. As of August 27, 2019:
https://www.mdpi.com/journal/cryptography/special_issues/ Cooke, R. M., and Goossens, L. L. (2008, May). “TU Delft Expert
Post_Quantum_Cryptography Judgment Data Base.” Reliability Engineering and System Safety,
Vol. 93, No. 5, pp. 657–674.
Bernard, T. S., T. Hsu, N. Perlroth, and R. Lieber. (2017,
September 7). “Equifax Says Cyberattack May Have Affected 143 Curtright, A. E., M. G. Morgan, and D. W. Keith. (2008,
Million in the U.S.” New York Times. As of August 27, 2019: November 14). “Expert Assessments of Future Photovoltaic
https://www.nytimes.com/2017/09/07/business/equifax- Technologies.” Environmental Science and Technology, Vol. 42,
cyberattack.html No. 24, pp. 9031–9038.

Beurdouche, B., K. Bhargavan, A. Delignat-Lavaud, C. Fournet, Cybersecurity and Infrastructure Security Agency. (Undated).
M. Kohlweiss, A. Pironti, P.-Y. Strub, and J. K. Zinzindohoue. "What Does CISA Do?" Homepage. U.S. Department of
(2015). “A Messy State of the Union: Taming the Composite State Homeland Security. As of February 11, 2020:
Machines of TLS.” Proceedings of the 2015 IEEE Symposium on https://www.cisa.gov/
Security and Privacy, San Jose, Calif., May 17–21, 2015, Encryption Working Group. (2019). Implications of Quantum
pp. 535–552. Computing for Encryption Policy. Center for Information
Bishop, L. S., S. Bravyi, A. Cross, J. M. Gambetta, and J. Smolin. Technology Policy. Washington, D.C.: Carnegie Endowment for
(2017). Quantum Volume. Technical report. International Peace.

Bleicher, A. (2018, February 1). “Quantum Algorithms Struggle European Telecommunications Standards Institute. (2015, June).
Against Old Foe: Clever Computers.” Quanta Magazine. “Quantum Safe Cryptography and Security.” White paper.
Sophia Antipolis, France.
Bright, P. (2018, October 16). “Apple, Google, Microsoft, and
Mozilla Come Together to End TLS 1.0.” Ars Technica blog. As of ETSI—See European Telecommunications Standards Institute.
August 28, 2019: Foremski, T. (2018, May 18). "IBM Warns of Instant Breaking of
https://arstechnica.com/gadgets/2018/10/browser-vendors-unite- Encryption by Quantum Computers: 'Move Your Data Today.'”
to-end-support-for-20-year-old-tls-1-0/ ZDNet. As of September 3, 2019:
Campbell, L. (2018, April 18). “Worse than Y2K: Quantum https://www.zdnet.com/article/ibm-warns-of-instant-breaking-
Computing and the End of Privacy.” Forbes. As of August 28, of-encryption-by-quantum-computers-move-your-data-today/
2019: Friedman, S. (2018, March 1). “DoD’s Growing Interest in
https://www.forbes.com/sites/forbestechcouncil/2018/04/18/ Quantum and Blockchain.” GCN. As of September 4, 2019:
worse-than-y2k-quantum-computing-and-the-end-of-privacy/ https://gcn.com/Articles/2018/03/01/
Campbell, P., M. Groves, and D. Shepherd. (2014). Soliloquy: DOD-quantum-blockchain.aspx
A Cautionary Tale. Cheltenham, UK: Government GAO—See U.S. Government Accountability Office.
Communications Headquarters.
General Services Administration. (2018). “Information
Chang, L., and J. A. Krosnick. (2009, Winter). “National Technology Strategic Plan: FY2018–2020.” Washington, D.C.
Surveys via RDD Telephone Interviewing Versus the Internet:
Comparing Sample Representativeness and Response Quality.” Google. (Undated.) “Certificate Transparency.” Webpage. As of
Public Opinion Quarterly, Vol. 73, No. 4, pp. 641–678. August 29, 2019:
https://www.certificate-transparency.org/
Chen, L., S. Jordan, Y.-K. Liu, D. Moody, R. Peralta, R.
Perlner, and D. Smith-Tone. (2016). Report on Post-Quantum Grover, L. K. (1996). “A Fast Quantum Mechanical Algorithm for
Cryptography. NISTIR 8105. Gaithersburg, Md.: National Database Search.” Proceedings of the Twenty-Eighth Annual ACM
Institute of Standards and Technology. Symposium on Theory of Computing, Philadelphia, Pa.,
May 22–24, 1996, pp. 212–219.

61
GSA—See General Services Administration. Morgan, M. G., and M. Henrion. (1990). Uncertainty: A Guide
to Dealing with Uncertainty in Quantitative Risk and Policy
IAD—See Information Assurance Directorate. Analysis. New York: Cambridge University Press.
IETF—See Internet Engineering Task Force. Morgan, M. G., L. F. Pitelka, and E. Shevliakova. (2001).
Information Assurance Directorate. (2016). “Commercial “Elicitation of Expert Judgments of Climate Change Impacts on
National Security Algorithm Suite and Quantum Computing Forest Ecosystems.” Climatic Change, Vol. 49, No. 3, pp. 279–307.
FAQ”. Fact sheet. National Security Agency, Washington, D.C. Mosca, M. (2015). “Cybersecurity in an Era with Quantum
Internet Engineering Task Force. (1999). “The TLS Protocol: Computers: Will We Be Ready?” IACR Cryptology ePrint
Version 1.0.” Memorandum. Archive, p. 1075.

Internet Society. (2018, June 6). “State of IPv6 Deployment 2018.” Mosca, M., and J. Mulholland. (2017). A Methodology for
Webpage. As of August 28, 2019: Quantum Risk Assessment. Toronto: Global Risk Institute.
https://www.internetsociety.org/resources/2018/state-of-ipv6- Moses, T. (2009). “Quantum Computing and Cryptography.”
deployment-2018/ Entrust, Inc., Addison, Texas.
Kalai, G. (2016). “The Quantum Computer Puzzle.” Notices of the Moskvitch, K. (2018, February 7). “The Argument Against
AMS, Vol. 63, No. 5, pp. 508–516. Quantum Computers.” Quanta Magazine.
Keeter, S., and L. Christian. (2012, November 7.) A Comparison Mulvaney, M. (2018). "Implementation of the Modernizing
of Results from Surveys by the Pew Research Center and Google Government Technology Act." Memorandum M-18-12.
Consumer Surveys. Washington, D.C.: Pew Research Center. Washington, D.C.: Office of Management and Budget.
Knol, A. B., J. J. de Hartog, H. Boogaard, P. Slottje, J. P. van NAS—See National Academies of Sciences, Engineering, and
der Sluijs, E. Lebret, F. R. Cassee, J. A. Wardekker, J. G. Ayers, Medicine..
P. J. Borm, B. Brunekreef, K. Donaldson, F. Forastiere, S. T.
Holgate, W. G. Kreyling, B. Nemery, J Pekkanen, V. Stone, National Academies of Sciences, Engineering, and Medicine.
H.-E. Wichmann, and G. Hoek. (2009). “Expert Elicitation on (2018a). “Cryptographic Agility and Interoperability:
Ultrafine Particles: Likelihood of Health Effects and Causal Proceedings of a Workshop.” Proceedings of the Forum on Cyber
Pathways.” Particle and Fibre Toxicology, Vol. 6, No. 19. Resilience Workshop. Washington, D.C.: National Academies
Press, p. 90.
Lavrakas, P. J. (2010). An Evaluation of Methods Used to Assess
the Effectiveness of Advertising on the Internet. New York: ———. (2018b). Quantum Computing: Progress and Prospects.
Interactive Advertising Bureau. Washington, D.C.: National Academies Press.
Lee, T. B. (2017, May 15). “The WannaCry Ransomware Attack National Cyber Security Centre. (2016, November 30). “Quantum
Was Temporarily Halted. But It’s Not over Yet." Vox. As of Key Distribution.” White paper. As of August 28, 2019:
August 28, 2019: https://www.ncsc.gov.uk/whitepaper/quantum-key-distribution
https://www.vox.com/new-money/2017/5/15/15641196/
wannacry-ransomware-windows-xp National Institute of Standards and Technology. (2001).
“Announcing the Advanced Encryption Standard.” FIPS Pub 197.
Leech, D. P., S. Ferris, and J. T. Scott. (2018). The Economic Gaithersburg, Md.
Impacts of the Advanced Encryption Standard,1996–2017. NIST
GCR 18-017. Gaithersburg, Md.: National Institute of Standards ———. (2002). “Secure Hash Standard.” FIPS Pub 180-2.
and Technology. Gaithersburg, Md.

Lew, J. J. (2011). “Chief Information Officer Authorities.” ———. (2016a). "NIST Cryptographic Standards and Guidelines
Memorandum M-11-29. Office of Management and Budget, Development Process." NISTIR 7977. Gaithersburg, Md.
Washington, D.C. ———. (2016b, December 20). “Announcing Request for
Leyden, J. (2017, September 5). “Bazinga! Social Network Taringa Nominations for Public-Key Post-Quantum Cryptographic
’Fesses up to Data Breach.” The Register. As of August 28, 2019: Algorithms.” Press release. As of August 28, 2019:
https://www.theregister.co.uk/2017/09/05/taringa_data_breach/ https://csrc.nist.gov/news/2016/public-key-post-quantum-
cryptographic-algorithms
MacMichael, D. (2017, April 19). “Windows Network
Architecture and the OSI Model.” Webpage. Microsoft. As of ———. (2017, January 3). “Post-Quantum Cryptography.”
August 28, 2019: Webpage. As of August 28, 2019:
https://docs.microsoft.com/en-us/windows-hardware/drivers/ https://csrc.nist.gov/Projects/Post-Quantum-Cryptography
network/windows-network-architecture-and-the-osi-model ———. (2018a). “Framework for Improving Critical
McDonald, P., M. Mohebbi, and B. Slatkin. (2012). Comparing Infrastructure Security.” Gaithersburg, Md. As of February 11,
Google Consumer Surveys to Existing Probability and Non- 2020:
Probability Based Internet Surveys. Mountain View, Calif.: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.
Google Inc. pdf

Mohseni, M., P. Read, H. Neven, S. Boixo, V. Denchev, R. ———. (2018b, September 4). “Post-Quantum Cryptography:
Babbush, A. Fowler, V. Smelyanskiy, and J. Martinis. (2017). Workshops and Timeline.” As of August 28, 2019:
“Commercialize Quantum Technologies in Five Years.” Nature, https://csrc.nist.gov/projects/post-quantum-cryptography/
Vol. 543, No. 7644, pp. 171–175. workshops-and-timeline

Morgan, M. G. (2014). “Use (and Abuse) of Expert Elicitation in


Support of Decision Making for Public Policy.” Proceedings of the
National Academies of Sciences, pp. 7176–7184.

62
———, (2018c, September 28). IST Launches Consortium to Shor, P. W. (1994). “Algorithms for Quantum Computation:
Support Development of Quantum Industry. As of February 24, Discrete Logarithms and Factoring.” Proceedings of the 35th
2020: Annual Symposium on Foundations of Computer Science, Santa
https://www.nist.gov/news-events/news/2018/09/nist-launches- Fe, N.M. , November 22–24, 1994, pp. 124–134.
consortium-support-development-quantum-industry Smith, Aaron, and Monica Anderson. (2018, March 1). Social
———. (2019). “Security Requirements for Cryptographic Media Use in 2018. Washington, D.C.: Pew Research Center.
Modules.” FIPS Pub 140-3. Gaithersburg, Md. Sotirov, A., M. Stevens, J. Appelbaum, A. Lenstra, D. Molnar,
National Security Agency. (2016, April 12). “About IAD.” D. A. Osvik, and B. D. Weger. (2008, December 30). “MD5
Webpage. As of August 28, 2019: Considered Harmful Today: Creating a Rogue CA Certificate.”
https://apps.nsa.gov/iad/about/ Presented at 25th Annual Chaos Communication Congress,
Berlin, 2008. As of August 28, 2019:
National Security Telecommunications Advisory Committee. http://www.win.tue.nl/hashclash/rogue-ca/
(2018). NSTAC Report to the President on a Cybersecurity
Moonshot. Washington, D.C.: U.S. Department of Homeland Stiennon, R. (2012, June 14). “Flame’s MD5 Collision Is the Most
Security. Worrisome Security Discovery of 2012.” Forbes. As of August 28,
2019:
NIST—See National Institute of Standards and Technology. https://www.forbes.com/sites/richardstiennon/2012/06/14/
flames-md5-collision-is-the-most-worrisome-security-
NSA—See National Security Agency.
discovery-of-2012/
NSTAC—See National Security Telecommunications Advisory
Subcommittee on Quantum Information Science. (2018).
Committee.
National Strategic Overview for Quantum Information Science.
Office of Management and Budget. (2018). “Office of Washington, D.C.: National Science and Technology Council.
Management and Budget.” Webpage. As of August 28, 2019:
Sullivan, N. (2017, December 26). “Why TLS 1.3 Isn’t in Browsers
https://www.whitehouse.gov/omb/
Yet.” Cloudflare blog. As of August 28, 2019:
OMB—See Office of Management and Budget. https://blog.cloudflare.com/why-tls-1-3-isnt-in-browsers-yet/
Pecen, M. (updated 2019, May 29). “Standards Update: Quantum- Thales eSecurity. (2018). “FAQ.” Webpage. As of August 28, 2019:
Safe Cryptography.” Webpage. ISARA Corporation. As of August https://www.thalesesecurity.com/faq
28, 2019:
Touzalin, A. (2016, May). “Quantum Manifesto: A New Area of
https://www.isara.com/standards/
Technology.”
Pew Research Center. (2011). “Collecting Survey Data.” Webpage.
Tversky, A., and D. Kahneman. (1974). “Judgment Under
As of September 11, 2019:
Uncertainty: Heuristics and Biases.” Science, Vol. 185, No. 4157,
https://www.pewresearch.org/methods/u-s-survey-research/
pp. 1124–1131.
collecting-survey-data/#the-problem-of-declining-response-
rates U.S. Code, Title 15, Sections 8801–8852, National Quantum
Initiative Act.
Porges, S. (2015, December 6). “How to Design a New Car in 7
Steps.” Forbes. As of August 28, 2019: U.S. Government Accountability Office. (2000). “Year 2000
https://www.forbes.com/sites/sethporges/2015/12/06/these-are- Computing Challenge: Lessons Learned Can Be Applied to Other
the-7-steps-it-takes-to-design-a-new-auto-product/ Management Challenges.” Washington, D.C.
PQCrypto. (2018). “PQCrypto 2019.” Webpage. As of August 28, ———. (2016). “Federal Agencies Need to Address Aging Legacy
2019: Systems.” Washington, D.C.
http://pqcrypto2019.org/
U.S. Securities and Exchange Commission. (1999, September 17).
Quantum Xchange. (2018). “Quantum Safe Security in a 5G Speech by SEC Chairman: Remarks to the President’s Council on
World.” Webpage. As of August 28, 2019: Year 2000 Conversion. Washington, D.C. As of August 28, 2019:
https://quantumxc.com/quantum-safe-security-in-a-5g-world/ https://www.sec.gov/news/speech/speecharchive/1999/
spch297.htm
Roetteler, M., M. Naehrig, K. M. Svore, and K. Lauter. (2017).
“Quantum Resource Estimates for Computing Elliptic “Venafi Research: 35 Percent of Websites Are Still Using
Curve Discrete Logarithms.” Proceedings of the International Insecure SHA-1 Certificates and Putting Users at Risk.” (2016,
Conference on the Theory and Application of Cryptology and November 17). Business Wire. As of August 28, 2019:
Information Security, Hong Kong, December 3–7, 2017. https://www.businesswire.com/news/home/20161117005247/en/
Venafi-Research-35-Percent-Websites-Insecure-SHA-1
Rowe, G., and G. Wright. (1999). “The Delphi Technique As a
Forecasting Tool: Issues and Analysis.” International Journal of Wallace, G. (2013, December 23). “Target Credit Hack: What You
Forecasting, Vol. 15, No. 4, pp. 353–375. Need to Know.” CNN Business. As of August 28, 2019:
https://money.cnn.com/2013/12/22/news/companies/
Santoso, L. P., R. Stein, and R. Stevenson. (2016, Summer).
target-credit-card-hack/index.html
“Survey Experiments with Google Consumer Surveys: Promise
and Pitfalls for Academic Research in Social Science.” Political Weber, R. E. (2013). Masked Dispatches: Cryptograms and
Analysis, Vol. 24, No. 3, pp. 356–373. Cryptology in American History, 1775–1900. Fort Meade, Md:
National Security Agency Center for Cryptologic History.
SEC—See U.S. Securities and Exchange Commission.
Wolchover, N. (2015, September 8). “A Tricky Path to Quantum-
Shenk, M. (2018). The Quantum Countdown: Quantum
Safe Encryption.” Quanta Magazine. As of August 28, 2019:
Computing and the Future of Smart Ledger Encryption. Zug,
https://www.quantamagazine.org/quantum-secure-
Switzerland: Cardano Foundation.
cryptography-crosses-red-line-20150908

63
Wolf, M., and T. Gendrullis. (2011). “Design, Implementation,
and Evaluation of a Vehicular Hardware Security Module.”
Proceedings of the International Conference on Information
Security and Cryptology, Seoul, South Korea, November 30–
December 2, 2011, pp. 302–318.
Yerukhimovich, A., R. Balebako, A. Boustead, R. K.
Cunningham, W. Welser IV, R. Housley, R. Shay, C. Spensky,
K. D. Stanley, J. Stewart, A. Trachtenberg, and Z. Winkelman.
(2016). Can Smartphones and Privacy Coexist? Assessing
Technologies and Regulations Protecting Personal Data
on Android and IOS Devices. Santa Monica, Calif: RAND
Corporation, RR-1393-DARPA. As of August 28, 2019:
https://www.rand.org/pubs/research_reports/RR1393.html
Zalka, C. (1999, October 1). “Grover’s Quantum Searching
Algorithm Is Optimal.” Physical Review A, pp. 2746–2751.
Zickfield, K., A. Levermann, M. G. Morgan, T. Kuhlbrodt, S.
Rahmstorf, and D. W. Keith. (2007). “Expert Judgments on the
Response of the Atlantic Merdional Overturning Circulation to
Climate Change.” Climatic Change, Vol. 82, No. 3–4,
pp. 235–265.

64
About the RAND Center for Smith for their support in creating this report. Finally,
Global Risk and Security we thank Edward (Teddy) Parker and Chad Ohlandt
of the RAND Corporation and Nicholas Sullivan of
The Center for Global Risk and Security (CGRS) Cloudflare, Inc., for serving as reviewers.
works across the RAND Corporation to develop
multidisciplinary research and policy analysis deal-
ing with systemic risks to global security. The cen- About the Authors
ter draws on RAND’s expertise to complement and
Michael J. D. Vermeer is a physical scientist at the
expand RAND research in many fields, including
RAND Corporation. His research focuses on science
security, economics, health, and technology. A board
and technology policy, criminal justice, national
of distinguished business leaders, philanthropists, and
security, and emerging technologies and innovation.
former policymakers advises and supports the center
His recent research involves the policy, procedure,
activities, which are increasingly focused on global
and technology needs of criminal justice agencies,
security trends and the impact of disruptive technolo-
development planning and program evaluation in the
gies on risk and security. For more information about
armed services, and the national security implications
the RAND Center for Global Risk and Security, visit
of various emerging technologies. He received a B.S.
www.rand.org/international/cgrs.
from Calvin College and a Ph.D. from Northwestern
University.
Acknowledgments
Evan D. Peet is an economist at the RAND
We would like to thank our senior advisors, Brian Corporation. His research focuses on applied micro-
Jackson, Marjory Blumenthal, and Rebecca Balebako economics covering the areas of health, human capital,
for their guidance in this research project. Their and security. In his research, he has developed novel
insight was invaluable to its successful completion. methods leveraging big data to predict risk of poor
We are very grateful to each of the individuals we health outcomes, and identify interventions that
interviewed throughout this effort for the time they reduce risk. Additionally, he has modeled the costs and
gave to inform our work. We would also like to thank benefits of actions to prevent security conflicts which
the RAND Corporation Center for Global Risk and has been applied in a wide variety of contexts. He
Security for their support of this research. Specifically, received his Ph.D. in Economics from Duke University
we thank Andrew Parasiliti and Robin Meili. We in 2013 and completed a postdoctoral fellowship at
also thank Sonni Efron, Gregory Baumann, and Erin Harvard University prior to joining RAND in 2015.

65
About This Report Program is an important first step, but additional action is
Quantum computing, a nascent technology that promises to needed from the U.S. government. The authors recommend
provide powerful new computing capabilities, also presents that the executive branch ensure adequate priority is given
a potential threat to our communication infrastructure. In to this issue and that the chosen coordinating body begin
its current form, our means of securing communications organizing action across the federal government. Congress
across the internet—public key cryptography—is widely should also consider beginning to hold hearings to estab-
expected to possess weaknesses that could be exploited by lish oversight over standardization and transition efforts.
quantum computing. New forms of public key cryptogra- Finally, individual organizations should take steps to
phy are being developed that are expected to be secure, but prepare for the coming cryptographic transition and adapt
if they are not widely used by the time quantum comput- their systems to incorporate greater cryptographic agility.
ers arrive, wide-scale, we would expect disruptive cyber
vulnerabilities. Security 2040
A mixed-method research approach was employed to eval- This report is part of a RAND initiative to envision critical
uate the risks and create policy recommendations. While security challenges in the world of 2040, considering the
significant variation exists in expert assessments, it is likely effects of political, technological, social, and demographic
quantum computers capable of breaking current encryption trends that will shape those security challenges in the com-
will exist before the U.S. communication infrastructure ing decades. The research was conducted within the RAND
has completely prepared. Moreover, the risk will grow the Center for Global Risk and Security.
longer organizations wait to transition to new cryptography.
Overall, it was assessed that the threat from quantum com-
puting is urgent, and swift action is necessary to mitigate Funding
the risk. The recently begun National Quantum Initiative Funding for this project was provided by gifts from RAND
supporters and income from operations.
C O R P O R AT I O N

Quantum computing, a nascent technology that promises to provide powerful


new computing capabilities, also presents a potential threat to our com-
munication infrastructure. In its current form, our means of securing
communications across the internet—public key cryptography—is widely
expected to possess weaknesses that could be exploited by quantum computing.
New forms of public key cryptography are being developed that are expected
to be secure, but if they are not widely used by the time quantum computers
arrive, wide-scale, we would expect disruptive cyber vulnerabilities.

A mixed-method research approach was employed to evaluate the risks and


create policy recommendations. While significant variation exists in expert
assessments, it is likely quantum computers capable of breaking current
encryption will exist before the U.S. communication infrastructure has completely
prepared. Moreover, the risk will grow the longer organizations wait to transition
to new cryptography. Overall, it was assessed that the threat from quantum
computing is urgent, and swift action is necessary to mitigate the risk. The
recently begun National Quantum Initiative Program is an important first step,
but additional action is needed from the U.S. government. The authors
recommend that the executive branch ensure adequate priority is given to this
issue and that the chosen coordinating body begin organizing action across
the federal government. Congress should also consider beginning to hold
hearings to establish oversight over standardization and transition efforts.
Finally, individual organizations should take steps to prepare for the coming
cryptographic transition and adapt their systems to incorporate greater
cryptographic agility.

$33.00

ISBN-10 1-9774-04618
ISBN-13 978-1-9774-0461-9
53300

www.rand.org 9 781977 404619

RR-3102-RC

You might also like