For how long must your data remain protected?

Sensitive data must be kept private for as long as it is in use and often for some time afterwards. Examples include medical, legal and financial data, as well as intellectual property and survey data.

Image

Shelf life

Sensitive data must be kept private for as long as it is in use and often for some time afterwards. Examples include medical, legal and financial data, as well as intellectual property and survey data.

The relationship between time-dependent sensitivity, the time until cryptographically relevant quantum computers become available and the time left to prepare for them are described by Mosca's theorem.

Image

Mosca's theorem

If the combined transition time for your system and sensitivity span of your data is greater than the time until the quantum computer threat arrives then the privacy of your data will be in danger

Image

Q-day is unknowable, even after it arrives:

We won't know when cryptographically relevant quantum computers do become available to malicious actors because they will just quietly use them without announcement!

Q-day is unknowable, even after it arrives: We won't know when cryptographically relevant quantum computers do become available to malicious actors because they will just quietly use them without announcement!

CONTACT

Dr Michael Walker

Email: [email protected]

Phone: +61 4 5735 3331

Keywords: #cyber security, #post-quantum cybersecurity

Copyrights 2025 | Schrocat Security™ | Terms & Conditions