Site icon CTIN

Current Attack Vectors: Quantum Computing

Harvest-Now, Decrypt-Later (HNDL) and Trust Now, Forge Later (TNFL) are distinct quantum-enabled attack patterns: HNDL is a confidentiality threat against encrypted data, while TNFL is an integrity/authenticity threat against digital signatures and roots of trust. Both exploit the same underlying reality: quantum computers will break today’s public‑key cryptography, but they weaponize that reality in different ways and on different timelines that CISOs and enterprise architects must plan for now.

HNDL – Harvest Now, Decrypt LaterAdversary passively records encrypted traffic or stored ciphertext today (VPN, TLS, 5G control/user plane, satellite links, database backups, cloud archives) and stores it until a cryptographically relevant quantum computer (CRQC) can break the public‑key scheme used for key establishment.
Once quantum capability exists, the attacker retrospectively recovers historic session keys and plaintext, violating long‑term confidentiality guarantees of data that was “secure” at the time of transmission.
TNFL – Trust Now, Forge LaterAdversary records digitally signed artifacts today (firmware images, software updates, contracts, blockchain transactions, identities/certificates), which rely on RSA/ECDSA or similar schemes vulnerable to Shor’s algorithm.
In the post‑quantum era, the attacker derives the private key from the public key material and forges new signatures that verify as if they came from the original trusted entity.

In short, HNDL reads your past emails and actions; TNFL rewrites your future logs, firmware, and contracts.

Enterprise defenders do not need to be quantum physicists, but they do need a working mental model of why these attacks become feasible.

The net effect is a time‑asymmetric world: ciphertext and signatures that look safe against today’s classical adversaries may be trivial to break for a future quantum adversary with enough logical qubits and error‑corrected gates. ​

HNDL formalizes an attack pattern from a strategic adversary who targets long‑lived confidentiality of harvested data.

TNFL shifts from confidentiality to integrity and authenticity, exploiting the long‑tail trust embedded in digital signatures.

Where HNDL erodes secrecy of past records, TNFL erodes trust in what is currently or future claimed to be authentic, given historic key material.

author avatar
Jane Ginn CTIN President & Co-Founder
Jane Ginn ~ As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. She also served as the Secretary of the OASIS Threat Actor Context Technical Committee, contributing to the creation of a semantic technology ontology for cyber threat actor analysis. Her efforts in this area and her earlier work with the Cyber Threat Intelligence (CTI) TC earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights.
Exit mobile version