Intelligence Agencies Warn: Harvest Now, Decrypt Later Attacks Are Already Underway

March 16, 2026
EnQuanta Research Team · 5 min read

 

Multiple intelligence agencies confirmed this week that adversaries are already exfiltrating encrypted data at an industrial scale — banking on quantum decryption arriving within a decade. Meanwhile, new algorithm research suggests Q-Day may arrive sooner than the 2030–2035 window most CISOs are planning for.

 
The past two weeks brought three developments that should accelerate every enterprise PQC roadmap: an NSA compliance deadline now 290 days away, a quantum algorithm that slashes the qubit requirement for breaking RSA by 99%, and a G7 financial sector roadmap that treats Quantum+AI threats as imminent operational risk — not theoretical future concern.
 

NSA CNSA 2.0 Compliance: 290 Days Until Mandatory Adoption

Intelligence agencies across multiple countries are now publicly warning that nation-state adversaries are conducting harvest now, decrypt later attacks at scale. By January 1, 2027 — less than ten months from today — all new US National Security System acquisitions must comply with CNSA 2.0, the NSA’s post-quantum algorithm suite. Full mandatory compliance across most NSS system types follows by 2033.

 

This isn’t guidance. It’s a federal mandate with procurement consequences. Any vendor selling cryptographic systems to defense, intelligence, or critical infrastructure agencies must demonstrate NIST PQC compatibility in their product roadmaps today — or risk contract exclusion starting Q1 2027.

 

Our Take: The NSA doesn’t set seven-year migration windows for theoretical threats. The 2027 cutoff reflects intelligence assessments that adversaries are already storing encrypted traffic from government networks, financial institutions, and critical infrastructure operators. If you’re a defense contractor, healthcare system, or financial services provider handling regulated data, your PQC migration is now a compliance obligation — not a risk mitigation exercise.

 

New Algorithm Cuts Qubit Requirement for Breaking RSA by 99%

Researchers introduced the Jesse-Victor-Gharabaghi (JVG) Algorithm — a hybrid method that restructures how quantum computers approach integer factorization, the mathematical foundation underlying RSA encryption. The breakthrough requires thousand-fold fewer quantum resources — qubits and quantum gates — than previous approaches. Research extrapolations suggest fewer than 5,000 qubits will be sufficient to break encryption methods used in RSA and ECC.

 

For context: IBM’s quantum roadmap targets 4,000+ qubit systems by 2026–2027, with error-corrected systems arriving shortly after. Google’s Willow chip, announced in December 2024, demonstrated exponential error reduction as qubit counts scale — solving the primary barrier to fault-tolerant quantum computing. The JVG research suggests the “quantum advantage” threshold for cryptographic attacks may arrive years ahead of consensus estimates.

Our Take: Most enterprise PQC roadmaps assume Q-Day arrives between 2030 and 2035. The JVG Algorithm compresses that timeline — potentially into the late 2020s. CISOs planning three-to-five-year crypto-agility migrations are now gambling that no adversary will combine this algorithm with near-term quantum hardware. That’s not risk management. That’s hope.

 

G7 Publishes Financial Sector PQC Roadmap — Treats Quantum Threats as Operational Risk

The G7 Cyber Expert Group released a public statement advising financial entities, regulators, and technology suppliers on transitioning to quantum-resilient cryptography. The roadmap warns that sufficiently advanced quantum computers have the potential to break widely used cryptographic protocols that protect financial systems and data — and calls for coordinated, timely action across the sector.

 

This marks a significant shift in regulatory posture. The G7 statement frames post-quantum migration not as future-state planning but as operational risk requiring “timely” action. For banks, payment processors, securities firms, and fintech platforms operating under PCI DSS, SWIFT, or cross-border data protection mandates, the message is clear: Quantum+AI threats are now part of your threat model — and your audit scope.

 

Our Take: The G7 doesn’t publish sector-specific cryptographic roadmaps for distant threats. This statement reflects intelligence-sharing between finance ministries and national security agencies — and it signals that financial regulators will begin asking about PQC readiness in examinations. If your institution processes cross-border payments, holds customer PII under GDPR or state privacy laws, or operates under SOC 2 Type II commitments, expect PQC questions in your next audit cycle.

 

The Bottom Line

Three headlines — one message: Quantum+AI threats have exited the research lab and entered the operational threat landscape. Nation-states are harvesting encrypted data today. New algorithms are collapsing the timeline to Q-Day. And regulators are moving PQC readiness from “recommended” to “required.”

 

Most enterprises are still conducting inventories. The NSA, G7, and quantum researchers are telling you the inventory phase is over. The migration phase has begun — and the clock is now measured in months, not years.

 

If your cryptographic infrastructure still depends on RSA, ECC, or pre-2024 TLS configurations, you’re not preparing for a future threat. You’re already exposed to an active one.