Cryptographically Relevant Quantum Computers (CRQCs) & The Quantum Threat

Key Takeaways

  • Cryptographically relevant quantum computers (CRQCs) are those capable of running Shor's algorithm at sufficient scale‚on the order of thousands of fault-tolerant logical qubits (backed by millions of physical qubits)‚ to break widely used public-key systems like RSA and ECC.
  • While today's quantum devices remain in the NISQ (Noisy Intermediate-Scale Quantum) era and can't yet threaten classical cryptography, industry roadmaps project CRQCs within the next one to two decades, introducing a "harvest now, decrypt later" risk for intercepted data.
  • To prepare, organizations should inventory and classify all crypto-vulnerable assets, begin hybrid deployments of NIST-approved post-quantum algorithms, and leverage analytics platforms (e.g., Splunk) to monitor certificate lifecycles and track compliance with emerging quantum-safe standards.

What is the quantum threat, and is it real?
The boy who cried (quantum) wolf: being honest about the threat and what it means for you

A cryptographically-relevant quantum computer (CRQC) is a quantum computer that can run algorithms to crack or weaken existing (so-called “classical”) cryptography.

Today, I’ll explain when — or if — this CRQC is likely to exist, what the real threat is, and how it might affect your data and assets. After reading this, you should get 100% on these quantum quiz questions:

What is a cryptographically relevant quantum computer (CRQC)?

Yes, you are hearing a lot about quantum computers (QCs) existing today, and that’s true — they do exist! But there is a critical distinction missing: none of today’s quantum computers are “cryptographically relevant”. That means they don’t yet have enough stability, enough qubits, or the right code to be able to crack even the weakest classical cryptography by quantum means (here’s looking at you, 256-bit RSA).

I hear you ask, “OK, so when will we have a cryptographically-relevant quantum computer?” Those are known as CRQCs, and that’s what I’m here to answer for you.

(Read all about quantum-safe cryptography & the NIST post-quantum process.)

On cryptography and being quantum-annoying

There are two important points to make here:

Put simply: not all cryptography is equally vulnerable to quantum attack.

Which means we can prioritise! In the same way you should prioritise patching systems — by threat, severity of impact, and criticality of vulnerability — you should also prioritise which cryptographic assets to migrate first, if you need to migrate at all. In fact, here’s two very clear recommendations for you:

(Side note: One of my favourite latest innovations is the concept of being “quantum-annoying”: not quantum-safe, but ‘annoying’ enough that it’s not worth the work for an adversary to crack it.)

When will a cryptographically relevant quantum computer (CRQC) exist?

The truth is this: quantum computers already exist, but today they don’t have enough qubits (quantum bits) or the stability to be CRQCs.

So, your next question might be when CRQCs will exist? No-one knows for certain, and it may actually never come to exist. But we can have a decent guess. An annual estimate, using the latest research and industry developments, has found that since the 1980s, a CRQC has been estimated to be 15 years away. Most recently, at an annual quantum conference run by ETSI in winter 2022, Professor Michele Mosca shared a presentation on this topic:

(Source: Slide 25 of Mosca's PDF.)

At this point, someone usually points out Moore’s Law, but remember: Moore’s Law applies to classical computers. We cannot say if the same rate of advancement will apply to quantum computing.

Importantly, it’s not just about how many qubits you have — quantum computers also need stability to be cryptographically-relevant. Today, they lack the necessary stability. We also don’t know how stability will be affected as the number of qubits increases.

However, there was a now discredited Chinese academic paper published in late 2022 that claimed to lower the number of qubits needed to run relevant attacks. Advances like this, even if they aren’t real, spook people at the very least. And if the paper had been true, it would have suddenly brought the quantum threat horizon much closer.

How and when will the quantum threat affect my data and assets?

So, the quantum threat is a way off right now, but you might want to start preparing. You might wonder how this will all affect your data and your assets. And it’s a great question.

I promise I will give some crunchy answers to that question now, but first — this will take a while. Like all things, the answer depends on your context, threat model, and real problems. Let’s start with the theory and work up from there.

CRQCs will be able to run two algorithms that impact cryptography:

So you can already see that different types of cryptography are impacted differently, but timelines also matter!

You need to work out the lifetime of your data that needs to be secret or signed, and this will vary for every single organisation. If you’re developing a product or you make embedded hardware that lasts for decades, your answer will be different to a large retailer handling transactions and some customer data, where the security requirements for that data diminish over time.

Luckily for you, here is the rubric to follow:

  1. Work out the lifetime of your data that needs to be secret or signed. This is because data is vulnerable to the “harvest-and-decrypt” threat, so you need to work out what data you have that needs to remain secret and for how long.
  2. Understand how long it would take you to migrate to post-quantum cryptography.
  3. Work out when you think a CRQC will exist.

Now time for some (simple) maths! This is known as Mosca’s inequality. Essentially, you’re fine for as long as:

Required Security Lifetime of Data + Time to Migrate < Time to Develop a CRQC

Perhaps some data, like telemetry, you just won’t care about in 15 years. Some data, like medical or financial records, you likely will. Your range of influence varies too. You can’t do much about when a CRQC will exist, but you can minimise the time it would take to migrate your systems, by preparing for it.

Consider your vulnerability and impact, too

We know that the threat is not real today, and won’t be for a while. But the risk is not just decided by threat: it’s a combination of the vulnerability and impact too.

At least at first, CRQCs will only be accessible to sophisticated adversaries who can harvest and store lots of your data today, i.e. nation states. And if these threat actors are currently stealing your data with ease — because your systems have been unpatched for months or years — they aren’t going to suddenly switch TTPs and start using expensive CRQCs.

So fix those vulnerabilities first! (And with that, I’ll leave you with something fun…)

How to identify a quantum time-waster

Armed with this knowledge, here’s my short guide to find a quantum time-waster! Despite all the people pushing snake oil and telling you that you should have moved to quantum like yesterday, we now know that’s not the case.

So how can we identify those quantum time-wasters? Simply state these two facts and if there’s disagreement, you’re best off politely excusing yourself to take a call:

Quantum quiz time

Test time! You should be able to tell me now:

  1. When a cryptographically-relevant quantum computer (CRQC) will be ready.
  2. How and when will the quantum threat affect your data and assets.
  3. How you can identify a quantum time-waster.

FAQs about Cryptographically Relevant Quantum Computers (CRQCs) & The Quantum Threat

What is a cryptographically relevant quantum computer (CRQC)?
A cryptographically relevant quantum computer (CRQC) is a quantum computer powerful enough to break widely used public-key cryptographic systems, such as RSA and ECC, by running algorithms like Shor's algorithm.
Why are CRQCs important to cybersecurity?
CRQCs are important to cybersecurity because they could render current public-key cryptography insecure, threatening the confidentiality and integrity of digital communications and data.
How soon could CRQCs become a reality?
Estimates vary, but experts believe that CRQCs could become a reality within the next decade or two, though there is uncertainty about the exact timeline.
What should organizations do to prepare for CRQCs?
Organizations should begin assessing their cryptographic assets, understand their exposure to quantum threats, and develop a migration plan to quantum-resistant cryptography.
What is 'harvest now, decrypt later'?
'Harvest now, decrypt later' is a threat scenario where attackers collect encrypted data today with the intention of decrypting it in the future when quantum computers become available.

Related Articles

Knowledge Graphs: What They Are and Why They Matter
Learn
7 Minute Read

Knowledge Graphs: What They Are and Why They Matter

Knowledge graphs can make organizing and understanding information much easier. Learn how they work and what benefits they provide in this comprehensive guide.
Artificial Intelligence as a Service (AIaaS): What is Cloud AI & How Does it Work?
Learn
5 Minute Read

Artificial Intelligence as a Service (AIaaS): What is Cloud AI & How Does it Work?

Learn what Artificial Intelligence as a Service (AIaaS) and cloud AI are, including their key benefits, challenges, technology layers, and core features.
Understanding Application Lifecycle Management (ALM): Stages, Strategies, and Benefits
Learn
7 Minute Read

Understanding Application Lifecycle Management (ALM): Stages, Strategies, and Benefits

Comprehensive guide to Application Lifecycle Management (ALM): key stages, best practices, and benefits for managing software from planning to retirement.
Top AI Trends for 2026: Key Technologies and Challenges and What They Mean
Learn
5 Minute Read

Top AI Trends for 2026: Key Technologies and Challenges and What They Mean

Discover the top AI trends for 2026 — and learn how businesses can leverage these advancements, overcome new challenges, and stay ahead in a rapidly evolving landscape.
Hashing in Cryptography Explained: How It Works, Algorithms, and Real-World Uses
Learn
8 Minute Read

Hashing in Cryptography Explained: How It Works, Algorithms, and Real-World Uses

Learn what hashing in cryptography is, how it works, key algorithms like SHA-256, real-world uses, and best practices to keep your data secure.
Understanding Network Traffic & Network Congestion: Metrics, Measurement, and Optimization
Learn
8 Minute Read

Understanding Network Traffic & Network Congestion: Metrics, Measurement, and Optimization

Network traffic is critical for businesses today. Read on to learn how network traffic works, and how to stop traffic congestion.
How To Monitor Data Storage Systems: Metrics, Tools, & Best Practices
Learn
9 Minute Read

How To Monitor Data Storage Systems: Metrics, Tools, & Best Practices

Learn how to monitor data storage systems. Discover key metrics, tools, and strategies to prevent outages, reduce costs, and maintain reliable performance.
Data Enrichment Strategies: How to Enhance Your Business Data for Better Insights
Learn
5 Minute Read

Data Enrichment Strategies: How to Enhance Your Business Data for Better Insights

Unlock business growth with data enrichment. Discover key strategies, tools, and best practices to enhance data quality, drive insights, and improve decision-making.
Load Balancing in Microservices: How It Works, Algorithms, and Modern Best Practices
Learn
6 Minute Read

Load Balancing in Microservices: How It Works, Algorithms, and Modern Best Practices

Learn how load balancing works in microservices architecture: key algorithms, container-aware routing, and modern approaches for scalability, resilience, and performance.