Cryptographically Relevant Quantum Computers (CRQCs) & The Quantum Threat

Key Takeaways

  • Cryptographically relevant quantum computers (CRQCs) are those capable of running Shor's algorithm at sufficient scale‚on the order of thousands of fault-tolerant logical qubits (backed by millions of physical qubits)‚ to break widely used public-key systems like RSA and ECC.
  • While today's quantum devices remain in the NISQ (Noisy Intermediate-Scale Quantum) era and can't yet threaten classical cryptography, industry roadmaps project CRQCs within the next one to two decades, introducing a "harvest now, decrypt later" risk for intercepted data.
  • To prepare, organizations should inventory and classify all crypto-vulnerable assets, begin hybrid deployments of NIST-approved post-quantum algorithms, and leverage analytics platforms (e.g., Splunk) to monitor certificate lifecycles and track compliance with emerging quantum-safe standards.

What is the quantum threat, and is it real?
The boy who cried (quantum) wolf: being honest about the threat and what it means for you

A cryptographically-relevant quantum computer (CRQC) is a quantum computer that can run algorithms to crack or weaken existing (so-called “classical”) cryptography.

Today, I’ll explain when — or if — this CRQC is likely to exist, what the real threat is, and how it might affect your data and assets. After reading this, you should get 100% on these quantum quiz questions:

What is a cryptographically relevant quantum computer (CRQC)?

Yes, you are hearing a lot about quantum computers (QCs) existing today, and that’s true — they do exist! But there is a critical distinction missing: none of today’s quantum computers are “cryptographically relevant”. That means they don’t yet have enough stability, enough qubits, or the right code to be able to crack even the weakest classical cryptography by quantum means (here’s looking at you, 256-bit RSA).

I hear you ask, “OK, so when will we have a cryptographically-relevant quantum computer?” Those are known as CRQCs, and that’s what I’m here to answer for you.

(Read all about quantum-safe cryptography & the NIST post-quantum process.)

On cryptography and being quantum-annoying

There are two important points to make here:

Put simply: not all cryptography is equally vulnerable to quantum attack.

Which means we can prioritise! In the same way you should prioritise patching systems — by threat, severity of impact, and criticality of vulnerability — you should also prioritise which cryptographic assets to migrate first, if you need to migrate at all. In fact, here’s two very clear recommendations for you:

(Side note: One of my favourite latest innovations is the concept of being “quantum-annoying”: not quantum-safe, but ‘annoying’ enough that it’s not worth the work for an adversary to crack it.)

When will a cryptographically relevant quantum computer (CRQC) exist?

The truth is this: quantum computers already exist, but today they don’t have enough qubits (quantum bits) or the stability to be CRQCs.

So, your next question might be when CRQCs will exist? No-one knows for certain, and it may actually never come to exist. But we can have a decent guess. An annual estimate, using the latest research and industry developments, has found that since the 1980s, a CRQC has been estimated to be 15 years away. Most recently, at an annual quantum conference run by ETSI in winter 2022, Professor Michele Mosca shared a presentation on this topic:

(Source: Slide 25 of Mosca's PDF.)

At this point, someone usually points out Moore’s Law, but remember: Moore’s Law applies to classical computers. We cannot say if the same rate of advancement will apply to quantum computing.

Importantly, it’s not just about how many qubits you have — quantum computers also need stability to be cryptographically-relevant. Today, they lack the necessary stability. We also don’t know how stability will be affected as the number of qubits increases.

However, there was a now discredited Chinese academic paper published in late 2022 that claimed to lower the number of qubits needed to run relevant attacks. Advances like this, even if they aren’t real, spook people at the very least. And if the paper had been true, it would have suddenly brought the quantum threat horizon much closer.

How and when will the quantum threat affect my data and assets?

So, the quantum threat is a way off right now, but you might want to start preparing. You might wonder how this will all affect your data and your assets. And it’s a great question.

I promise I will give some crunchy answers to that question now, but first — this will take a while. Like all things, the answer depends on your context, threat model, and real problems. Let’s start with the theory and work up from there.

CRQCs will be able to run two algorithms that impact cryptography:

So you can already see that different types of cryptography are impacted differently, but timelines also matter!

You need to work out the lifetime of your data that needs to be secret or signed, and this will vary for every single organisation. If you’re developing a product or you make embedded hardware that lasts for decades, your answer will be different to a large retailer handling transactions and some customer data, where the security requirements for that data diminish over time.

Luckily for you, here is the rubric to follow:

  1. Work out the lifetime of your data that needs to be secret or signed. This is because data is vulnerable to the “harvest-and-decrypt” threat, so you need to work out what data you have that needs to remain secret and for how long.
  2. Understand how long it would take you to migrate to post-quantum cryptography.
  3. Work out when you think a CRQC will exist.

Now time for some (simple) maths! This is known as Mosca’s inequality. Essentially, you’re fine for as long as:

Required Security Lifetime of Data + Time to Migrate < Time to Develop a CRQC

Perhaps some data, like telemetry, you just won’t care about in 15 years. Some data, like medical or financial records, you likely will. Your range of influence varies too. You can’t do much about when a CRQC will exist, but you can minimise the time it would take to migrate your systems, by preparing for it.

Consider your vulnerability and impact, too

We know that the threat is not real today, and won’t be for a while. But the risk is not just decided by threat: it’s a combination of the vulnerability and impact too.

At least at first, CRQCs will only be accessible to sophisticated adversaries who can harvest and store lots of your data today, i.e. nation states. And if these threat actors are currently stealing your data with ease — because your systems have been unpatched for months or years — they aren’t going to suddenly switch TTPs and start using expensive CRQCs.

So fix those vulnerabilities first! (And with that, I’ll leave you with something fun…)

How to identify a quantum time-waster

Armed with this knowledge, here’s my short guide to find a quantum time-waster! Despite all the people pushing snake oil and telling you that you should have moved to quantum like yesterday, we now know that’s not the case.

So how can we identify those quantum time-wasters? Simply state these two facts and if there’s disagreement, you’re best off politely excusing yourself to take a call:

Quantum quiz time

Test time! You should be able to tell me now:

  1. When a cryptographically-relevant quantum computer (CRQC) will be ready.
  2. How and when will the quantum threat affect your data and assets.
  3. How you can identify a quantum time-waster.

FAQs about Cryptographically Relevant Quantum Computers (CRQCs) & The Quantum Threat

What is a cryptographically relevant quantum computer (CRQC)?
A cryptographically relevant quantum computer (CRQC) is a quantum computer powerful enough to break widely used public-key cryptographic systems, such as RSA and ECC, by running algorithms like Shor's algorithm.
Why are CRQCs important to cybersecurity?
CRQCs are important to cybersecurity because they could render current public-key cryptography insecure, threatening the confidentiality and integrity of digital communications and data.
How soon could CRQCs become a reality?
Estimates vary, but experts believe that CRQCs could become a reality within the next decade or two, though there is uncertainty about the exact timeline.
What should organizations do to prepare for CRQCs?
Organizations should begin assessing their cryptographic assets, understand their exposure to quantum threats, and develop a migration plan to quantum-resistant cryptography.
What is 'harvest now, decrypt later'?
'Harvest now, decrypt later' is a threat scenario where attackers collect encrypted data today with the intention of decrypting it in the future when quantum computers become available.

Related Articles

How to Use LLMs for Log File Analysis: Examples, Workflows, and Best Practices
Learn
7 Minute Read

How to Use LLMs for Log File Analysis: Examples, Workflows, and Best Practices

Learn how to use LLMs for log file analysis, from parsing unstructured logs to detecting anomalies, summarizing incidents, and accelerating root cause analysis.
Beyond Deepfakes: Why Digital Provenance is Critical Now
Learn
5 Minute Read

Beyond Deepfakes: Why Digital Provenance is Critical Now

Combat AI misinformation with digital provenance. Learn how this essential concept tracks digital asset lifecycles, ensuring content authenticity.
The Best IT/Tech Conferences & Events of 2026
Learn
5 Minute Read

The Best IT/Tech Conferences & Events of 2026

Discover the top IT and tech conferences of 2026! Network, learn about the latest trends, and connect with industry leaders at must-attend events worldwide.
The Best Artificial Intelligence Conferences & Events of 2026
Learn
4 Minute Read

The Best Artificial Intelligence Conferences & Events of 2026

Discover the top AI and machine learning conferences of 2026, featuring global events, expert speakers, and networking opportunities to advance your AI knowledge and career.
The Best Blockchain & Crypto Conferences in 2026
Learn
5 Minute Read

The Best Blockchain & Crypto Conferences in 2026

Explore the top blockchain and crypto conferences of 2026 for insights, networking, and the latest trends in Web3, DeFi, NFTs, and digital assets worldwide.
Log Analytics: How To Turn Log Data into Actionable Insights
Learn
11 Minute Read

Log Analytics: How To Turn Log Data into Actionable Insights

Breaking news: Log data can provide a ton of value, if you know how to do it right. Read on to get everything you need to know to maximize value from logs.
The Best Security Conferences & Events 2026
Learn
6 Minute Read

The Best Security Conferences & Events 2026

Discover the top security conferences and events for 2026 to network, learn the latest trends, and stay ahead in cybersecurity — virtual and in-person options included.
Top Ransomware Attack Types in 2026 and How to Defend
Learn
9 Minute Read

Top Ransomware Attack Types in 2026 and How to Defend

Learn about ransomware and its various attack types. Take a look at ransomware examples and statistics and learn how you can stop attacks.
How to Build an AI First Organization: Strategy, Culture, and Governance
Learn
6 Minute Read

How to Build an AI First Organization: Strategy, Culture, and Governance

Adopting an AI First approach transforms organizations by embedding intelligence into strategy, operations, and culture for lasting innovation and agility.