The Risk of Starting Quantum Migration Without
Cryptographic Discovery
By QuAi Security Labs
| 8 min read |
Post-Quantum Cryptography · Crypto Agility · Migration Strategy
|
Most
organisations underestimate the size of their cryptographic footprint. Starting
a quantum migration without a complete cryptographic inventory is the single
most expensive mistake an enterprise can make — and the most common one. |
The migration problem no one wants to discuss
Post-quantum
cryptography migration has reached the top of virtually every enterprise
security roadmap. NIST finalised its first three PQC standards in August 2024.
Governments have issued mandates. Analysts are publishing timelines. Boards are
asking questions.
And
in response, many organisations are doing exactly the wrong thing: they are
picking a PQC algorithm, buying a vendor's migration toolkit, and starting to
migrate without first understanding what they are actually migrating.
Cryptography
is not centralised in the way most security teams assume. It is not sitting in
one PKI server waiting to be upgraded. It is embedded in APIs, hardcoded into
application code, baked into firmware, negotiated dynamically by TLS libraries,
used by databases for at-rest encryption, leveraged by DevOps pipelines for
code signing, and referenced by dozens of third-party integrations many of
which the security team has never audited.
|
Many organizations are not
prepared to achieve migration because of the lack of visibility and not
having the right technologies. (Ponemon Institute, 2024) |
What cryptographic discovery actually reveals
When
organisations deploy comprehensive cryptographic discovery tools for the first
time, the results are almost always a surprise. A typical enterprise with 5,000
employees and a moderately complex cloud environment will discover:
•
Thousands of TLS
certificates across internal and external services, many approaching expiration
•
SSH keys distributed across
servers with no centralised inventory or rotation policy
•
Hardcoded cryptographic
keys and secrets in application source code repositories
•
Legacy cryptographic
algorithms (MD5, SHA-1, RSA-1024) still in active use in production systems
•
Third-party dependencies
using outdated cryptographic libraries that will not support PQC standards
•
Cloud storage encryption
configurations that vary wildly across business units
•
API endpoints using weak or
misconfigured TLS that would be exploitable by a sufficiently resourced
adversary
None
of these items appear on a standard asset inventory. None are caught by
conventional vulnerability scanners. And every single one of them represents a
migration task that must be completed before quantum migration can be declared
finished.
The harvest-now-decrypt-later threat changes the timeline
The
conventional wisdom on quantum timelines suggests that cryptographically
relevant quantum computers are 5-8 years away. This has led many security
leaders to treat PQC migration as a medium-term planning exercise rather than
an urgent priority.
The
harvest-now-decrypt-later (HNDL) attack model invalidates this reasoning
entirely. Nation-state adversaries and sophisticated criminal organisations do
not need quantum computers to be a present threat, they need only to capture
and store encrypted data today, then decrypt it when the quantum hardware
arrives. For any data whose confidentiality needs to extend 10 or more years
into the future, eg. patient health records, classified government
communications, intellectual property, long-term financial contracts, the
window for protection is already closed if encryption has not been upgraded.
|
If your
data is sensitive for more than 10 years, you are already in the harvest
window. The migration deadline is not when quantum computers arrive, it is NOW. |
Why migration without discovery fails in practice
Unknown assets create hidden gaps
A
migration project that does not begin with comprehensive discovery will
invariably leave cryptographic assets behind. The security team migrates the
systems they know about and considers the project complete. The undiscovered
assets, the hardcoded key in the legacy billing application, the RSA-1024
certificate on the partner API endpoint, the SHA-1 signing key for the firmware
update server remain vulnerable indefinitely. The organisation has spent
significant resources on migration and believes it is protected when it is not.
Prioritisation becomes arbitrary without inventory data
Effective
migration requires prioritising systems by the sensitivity of the data they
protect and the likelihood of being targeted. Without a comprehensive
inventory, prioritisation defaults to institutional familiarity, teams migrate
the systems they work with every day, not necessarily the systems that are most
at risk. Critical assets that are rarely touched day-to-day often end up at the
bottom of the queue.
Third-party and supply chain dependencies create blockers
Many
of the cryptographic assets in an enterprise environment are not owned by the
enterprise they are provided by software vendors, cloud providers, hardware
manufacturers, and technology partners. A comprehensive discovery process
identifies these dependencies early, allowing the organisation to begin vendor
conversations and upgrade cycles well in advance. Without this visibility,
supply chain dependencies surface as blockers mid-migration, causing delays and
cost overruns.
Compliance demonstrations become impossible
NIST
SP 800-207 (Zero Trust Architecture), CISA's PQC guidance, the EU Cyber
Resilience Act, and emerging financial sector regulations all require
organisations to demonstrate that they have inventoried their cryptographic
assets and have a documented migration plan. An organisation that began
migrating before completing discovery cannot produce the inventory
documentation that regulators will require. It has to restart the discovery
process after the fact, at additional cost and delay.
The right sequence: discover, then migrate
The
correct approach to quantum migration is a three-phase process in which
discovery is not just the first step, but an ongoing capability that persists
throughout and after migration:
•
Phase 1 — Complete
cryptographic inventory: deploy automated discovery across all infrastructure
layers external-facing services, internal networks, APIs, cloud environments,
endpoints, OT/IoT systems, and source code repositories. Build a structured
cryptographic Bill of Materials (CBOM) that captures every algorithm, key
length, certificate, and protocol in use
•
Phase 2 — Risk-stratified
migration planning: use the CBOM to identify which assets are most vulnerable
(weak algorithms, short key lengths, systems handling sensitive long-lived
data) and which carry the most regulatory exposure. Build a migration plan ordered
by risk, not by convenience
•
Phase 3 — Continuous
post-migration monitoring: cryptographic assets do not stand still. New
deployments introduce new vulnerabilities. Third-party updates can regress
migrated systems. Post-migration monitoring ensures that the gains made in the
migration are not silently eroded over time
What crypto agility means in practice
The
goal of a well-executed quantum migration is not merely to arrive at a
PQC-compliant state, it is to build crypto agility into the organisation's
infrastructure. Crypto agility means that when the next cryptographic standard
changes (and it will change again, as it always has), the organisation can
respond quickly because it has the visibility and tooling to identify affected
systems and execute controlled transitions.
Organisations
that complete migration without building discovery and monitoring capabilities
will find themselves in the same position in five years that they are in today,
uncertain about what they have, uncertain about its vulnerability, and facing
an urgent scramble to migrate before a deadline.
Conclusion
The
quantum migration challenge is real and the timelines are shorter than they
appear. But the greatest risk is not that organisations start too late but it
is that they start uninformed. Discovery is not a preliminary step that can be
skipped to accelerate the timeline; it is the foundation that makes the
timeline achievable.
Flying
blind through a cryptographic migration is not faster. It is slower, more
expensive, and more dangerous than building the visibility that makes migration
both efficient and durable.
|
Ready to take action? QuAi Security Labs helps enterprises discover, inventory, and
migrate their cryptographic infrastructure to quantum-safe standards while
securing every AI component in your environment. Visit https://www.quaisecurity.com
to request a demo or book a quantum readiness assessment. |
<< Home