Security

Post-Quantum Encryption for Business Data

Quantum computers will break the encryption that protects most business data today. The timeline is closer than most people think, and harvest-now-decrypt-later attacks are already happening. Here is what businesses need to know and what to do about it.

March 2026·10 min read

What Quantum Computing Threatens

The encryption that protects your business data today relies on mathematical problems that are extremely difficult for classical computers to solve. RSA encryption depends on the difficulty of factoring large numbers. Elliptic Curve Cryptography (ECDSA/ECDH) depends on the difficulty of the discrete logarithm problem on elliptic curves. These problems would take classical computers billions of years to solve with current key sizes.

Quantum computers change that equation. Shor's algorithm, running on a sufficiently powerful quantum computer, can factor large numbers and solve the discrete logarithm problem exponentially faster than any classical algorithm. RSA-2048, which is considered secure against classical attacks for the foreseeable future, would fall to a quantum computer with approximately 4,000 logical qubits. ECDSA with a 256-bit key would require roughly 2,500 logical qubits.

The impact on business encryption would be comprehensive:

RSA (all key sizes): Broken by Shor's algorithm. Used in TLS certificates, email encryption, VPNs, digital signatures.

ECDSA / ECDH: Broken by Shor's algorithm. Used in TLS 1.3, SSH keys, cryptocurrency wallets, code signing.

AES-128: Weakened by Grover's algorithm (effective security reduced to 64 bits). No longer sufficient.

AES-256: Weakened to effective 128-bit security by Grover's algorithm. Still considered safe.

SHA-256 / SHA-3: Collision resistance reduced but still considered safe with larger output sizes.

The distinction between "broken" and "weakened" is important. RSA and ECDSA would be completely broken, meaning an attacker could decrypt any data protected by these algorithms and forge any digital signature. AES-256 would be weakened but not broken, meaning it still provides adequate security if you are already using the 256-bit variant. Businesses currently using AES-128 need to upgrade to AES-256, but those already on AES-256 are protected against the symmetric-key aspect of the quantum threat.

The Timeline: Closer Than You Think

The common response to the quantum threat is "quantum computers are decades away." This may be true for general-purpose, fault-tolerant quantum computing. But there are two reasons why businesses need to act now, not in a decade.

NIST standards are already finalized. The National Institute of Standards and Technology published its first three post-quantum cryptographic standards in August 2024: ML-KEM (based on Kyber) for key encapsulation, ML-DSA (based on Dilithium) for digital signatures, and SLH-DSA (based on SPHINCS+) for hash-based signatures. A fourth standard, FN-DSA (based on FALCON), followed shortly after. The standardization process is complete. The algorithms are ready for deployment. The only thing missing is adoption.

Harvest-now-decrypt-later attacks are happening today. Nation-state actors and sophisticated criminal organizations are intercepting and storing encrypted data with the explicit intention of decrypting it once quantum computers become available. If your encrypted data is intercepted today and a quantum computer becomes available in 2035, every piece of data you transmitted will be retroactively exposed. For data that must remain confidential for 10+ years, including healthcare records, financial data, trade secrets, legal communications, and government documents, the threat is immediate even though the quantum computer is not.

The intelligence community takes this seriously. The NSA's Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) requires post-quantum algorithms for national security systems starting in 2025 for software and firmware signing, with full transition by 2033 for web-facing applications. The federal government's timeline for civilian systems is similar, driven by the 2022 Quantum Computing Cybersecurity Preparedness Act.

What Post-Quantum Encryption Actually Means

Post-quantum encryption refers to cryptographic algorithms that are secure against both classical and quantum computers. These algorithms are based on mathematical problems that quantum computers cannot solve efficiently. The dominant approaches are:

Lattice-Based Cryptography

Lattice-based cryptography relies on the difficulty of finding short vectors in high-dimensional lattices. This is the foundation for the two most important NIST post-quantum standards. ML-KEM (Kyber) is a key encapsulation mechanism used to establish shared secrets for symmetric encryption. When your browser connects to a website, ML-KEM can replace the RSA or ECDH key exchange that currently negotiates the session key. ML-DSA (Dilithium) is a digital signature algorithm that replaces RSA and ECDSA signatures for authenticating identities and signing data.

Lattice-based algorithms are favored because they offer strong security margins, fast performance, and relatively compact key sizes. ML-KEM key encapsulation takes microseconds. ML-DSA signing and verification are similarly fast. These are not exotic research algorithms; they are practical, deployable, and already being integrated into production systems.

Hash-Based Signatures

Hash-based signatures (SLH-DSA/SPHINCS+) rely only on the security of hash functions, which are well-understood and resistant to quantum attacks. They are slower and produce larger signatures than lattice-based alternatives, but their security assumptions are more conservative. Hash-based signatures are recommended for use cases where long-term security assurance is critical, such as code signing and root certificate authorities, because their security model is the simplest and most studied.

Hybrid Approaches

During the transition period, many implementations use hybrid encryption that combines a traditional algorithm (like ECDH) with a post-quantum algorithm (like ML-KEM). The idea is that even if the post-quantum algorithm turns out to have an unforeseen weakness, the traditional algorithm still provides protection against classical attacks. And if a quantum computer breaks the traditional algorithm, the post-quantum algorithm protects against that. The system is secure as long as at least one of the two algorithms holds.

How NoSheet Uses Post-Quantum Encryption

NoSheet integrates post-quantum encryption through H33, a cryptographic infrastructure that implements the full NIST post-quantum standard suite. Here is how it protects your data:

ML-KEM (Kyber) for key exchange. When your data is uploaded to NoSheet, the session key is negotiated using ML-KEM, ensuring that the encrypted channel cannot be broken by a future quantum computer. Even if someone intercepts the encrypted upload today, they cannot decrypt it with a quantum computer tomorrow.

ML-DSA (Dilithium) for authentication. Every data operation in NoSheet is cryptographically signed using ML-DSA. This provides tamper-proof audit trails that remain valid even in a post-quantum world. A Dilithium signature created today will still be verifiable and trustworthy in 2040, unlike an ECDSA signature that could be forged by a quantum computer.

Lattice-based FHE for encrypted processing. NoSheet's fully homomorphic encryption is inherently post-quantum because it is built on lattice-based mathematics, the same family of hard problems that underlies ML-KEM and ML-DSA. The FHE scheme used for encrypted data cleaning does not rely on RSA or elliptic curves at any point in its operation. Your data is quantum-safe from encryption through processing through decryption.

For more on how NoSheet's encrypted processing works, see our guide on what encrypted data cleaning is and how it works.

Which Industries Need to Act First

Healthcare

Healthcare data has an exceptionally long confidentiality requirement. A patient's medical records must remain private for their entire lifetime plus a period after death. Records created today may need to remain confidential for 80+ years. Any healthcare data encrypted with RSA or ECDSA today is vulnerable to harvest-now-decrypt-later attacks with a decrypt window that stretches well into the quantum computing era. Healthcare organizations should be prioritizing post-quantum encryption for all patient data, especially data in transit and data stored in long-term archives. For more on protecting healthcare data, read our guide on HIPAA compliant data cleaning tools.

Financial Services

Financial data has both regulatory and competitive sensitivity that demands quantum resistance. Transaction records, account information, trading algorithms, and merger and acquisition communications all represent data that adversaries would target for harvest-now-decrypt-later attacks. Regulatory bodies including the Federal Reserve and the SEC have issued guidance encouraging financial institutions to begin quantum readiness assessments.

Government Contractors

Any organization handling Controlled Unclassified Information (CUI) or working under CMMC requirements should already be planning their post-quantum transition. CNSA 2.0 mandates are flowing down from defense agencies to contractors, and compliance timelines are accelerating. Organizations that wait until the mandates are strictly enforced will face rushed, expensive transitions.

Legal and Professional Services

Attorney-client privilege, audit workpapers, and consulting deliverables contain information that must remain confidential indefinitely. Law firms and accounting firms that transmit sensitive client data using only classical encryption are creating a future exposure risk for their clients.

Practical Steps for Any Business

You do not need to rip out your entire cryptographic infrastructure tomorrow. Post-quantum migration is a multi-year process, but it should start now with these concrete steps:

1. Inventory your cryptographic dependencies. Identify every system that uses encryption: TLS certificates, VPN connections, email encryption, file encryption, database encryption, API authentication, digital signatures, and data backup encryption. Document which algorithms each system uses (RSA, ECDSA, ECDH, AES-128, AES-256).

2. Classify your data by confidentiality lifetime. Data that needs to remain confidential for 5+ years is at risk from harvest-now-decrypt-later attacks and should be prioritized for post-quantum protection. This includes healthcare records, financial data, trade secrets, legal communications, and long-lived credentials.

3. Upgrade to AES-256 everywhere. If any of your systems still use AES-128, upgrade to AES-256. This is the simplest quantum readiness step because AES-256 is already widely supported and provides adequate symmetric security against quantum attacks.

4. Enable post-quantum TLS where available. Chrome, Firefox, and other major browsers already support hybrid post-quantum key exchange (X25519Kyber768). Cloudflare, AWS, and other major cloud providers support post-quantum TLS. If your infrastructure is behind these providers, you may already have partial post-quantum protection for data in transit without any configuration changes.

5. Choose vendors with post-quantum capabilities. When evaluating new software, cloud services, and data processing tools, post-quantum encryption support should be a selection criterion. Tools like NoSheet that already implement post-quantum encryption protect your data against both current and future threats without requiring any special configuration on your part.

6. Plan your certificate and key migration. RSA and ECDSA certificates will need to be replaced with post-quantum or hybrid certificates. Work with your certificate authorities and IT teams to develop a migration timeline that aligns with NIST and industry guidance.

The Bottom Line: Prepare Now, Transition Gradually

The quantum threat to business encryption is real, but it is manageable. The algorithms are standardized. The tools are available. The migration path is well-defined. The organizations that start preparing now will transition smoothly over the next several years. The organizations that wait will face a compressed, expensive, and risky transition when quantum computing milestones start making headlines.

For data cleaning specifically, the choice is straightforward. Tools that process your sensitive data using only classical encryption create a future vulnerability every time you use them. Tools that use post-quantum encryption, like NoSheet, protect your data against both present and future threats. The data you clean today should still be safe in 2040. Post-quantum encryption makes that possible.

Future-Proof Your Data Processing

NoSheet uses post-quantum encryption powered by H33 to protect your data against both classical and quantum attacks. Clean sensitive data with confidence.

Start Cleaning Securely