Harvest Now, Decrypt Later (HNDL)

The quantum threat to blockchain is not a future problem — it is a present-day data exposure issue.
QuantumSafe is built on current NIST-standardized algorithms and does not guarantee absolute security. This is a quantum-readiness tool, not a quantum-proof solution.

What Is HNDL?

Harvest Now, Decrypt Later is an attack strategy where adversaries:
  1. Harvest — Collect encrypted data and public keys today
  2. Store — Archive the collected data indefinitely
  3. Decrypt Later — Break the cryptography once quantum computers are capable
This is not theoretical. Intelligence agencies and sophisticated actors are already archiving encrypted traffic for future decryption.

Why Blockchain Is Especially Vulnerable

Blockchain has unique properties that make HNDL particularly dangerous:

1. Public Key Exposure Is Permanent

When you send a blockchain transaction, your public key is broadcast to the entire network and stored permanently in the blockchain’s history. Unlike traditional systems where public keys can be rotated, blockchain public keys are:
  • Publicly visible to anyone
  • Immutably stored forever
  • Directly linked to funds
Traditional TLS:  Public key exposed briefly during handshake, then rotated
Blockchain:       Public key exposed permanently in every transaction

2. No Key Rotation

In most blockchain protocols, once a public key is associated with an address and funds, you cannot rotate to a new key without moving all funds. This makes every exposure permanent.

3. Immutable Ledger = Permanent Record

The blockchain is a permanent, public record of:
  • All public keys that have transacted
  • All transaction signatures (which can be used to recover public keys)
  • Historical balances and transfers
An attacker collecting this data today has unlimited time to wait for quantum capability.

4. High-Value Targets

Blockchain addresses can hold enormous value. A single whale address might contain hundreds of millions of dollars — making it an extremely attractive target for HNDL:
  • Recover the private key from the exposed public key
  • Sign fraudulent transactions transferring all funds
  • Execute before anyone can react

The Timeline

MilestoneEstimatedImpact
Data harvestingNowPublic keys being collected from all chains
Cryptographically relevant quantum computer (CRQC)2030-2040ECDSA broken for well-funded adversaries
Widespread quantum capability2040-2050ECDSA broken for any sophisticated actor
Post-quantum chain migrationUnknownDepends on protocol governance
The threat is future — data exposure is NOW. Every blockchain transaction that reveals a public key creates a permanent vulnerability that cannot be revoked.

What Can You Do Today?

  1. Minimize public key exposure — Use fresh addresses. Avoid address reuse.
  2. Scan your wallets — Use the QuantumSafe wallet scanner to assess risk.
  3. Create PQC attestationsHybrid signing creates a quantum-ready audit trail alongside your existing ECDSA signatures.
  4. Generate PQC keys now — Establish your post-quantum identity before the rush.

The Math

A quantum computer with ~2,500 logical qubits could break 256-bit ECDSA. Current quantum computers have hundreds of noisy physical qubits. The gap is closing:
YearPhysical QubitsLogical Qubits (estimated)
2024~1,100~1-2
2027~10,000 (projected)~10-20
2030~100,000 (projected)~100-500
2035~1,000,000 (projected)~1,000-5,000
The exact timeline is uncertain, but the trend is clear. Preparing now is prudent risk management.

Further Reading