Blog

Quantum Isn’t a Future Problem — It’s Already a Security Problem

A red data center with red connection lines passing through to indicate quantum security.

Today’s security models were designed for the threat environment we know, and, in many cases, they still work. But quantum introduces a different kind of risk: data intercepted today may become readable later.

That’s what changes the equation. The threat is not only future compromise. It’s present-day exposure with delayed consequences.

Just last March 2026, Google accelerated its internal post-quantum cryptography (PQC) migration deadline to 2029, citing rapid advances in quantum hardware, error correction, and factoring estimates. This wasn’t a press release. It was a revised threat model from one of the most sophisticated security organizations in the world — and it signals that the window for quantum-enabled decryption is compressing into the late 2020s.

The NSA reached the same conclusion. CNSA 2.0 mandates migration to post-quantum cryptography for national security systems, with timelines already underway and extending through 2033. NSM-10 and OMB M-23-02 require agencies to inventory cryptographic assets, identify exposure, and execute formal migration plans.

These aren’t guidelines. They’re compliance requirements tied to reporting, budget, and procurement.
For enterprise security leaders, this is the shift: quantum risk is no longer theoretical. It’s a forcing function reshaping how security is evaluated and purchased.

The question isn’t whether the risk is real. It’s whether your organization will be ahead of the transition — or catching up to it.

The Threat Already in Motion

Hackers and nation-state adversaries are already penetrating defense and intelligence networks, maintaining persistent access, and exfiltrating encrypted data for future use.

This is the “harvest now, decrypt later” model — and it changes the timeline entirely.
Attackers aren’t waiting for quantum systems to arrive. They’re collecting ciphertext now, classified communications, financial records, infrastructure credentials, health care data, with the expectation that it will be decrypted later.

For any organization with long-lived sensitive data, the risk is not future-facing. It’s retroactive.

Every data transmission happening today is part of a future attack surface.

The right question isn’t “When will quantum break encryption?”

It’s “How long does our data need to remain secure?”

If the answer is “now and moving forward” as it is for most regulated industries and critical infrastructure, then quantum risk is already part of your environment.

Where the Current Response Falls Short

Most enterprise responses to PQC focus on crypto algorithms being employed:

  • Migrating to NIST standards like ML-KEM (FIPS 203)
  • Updating TLS configurations
  • Patching cryptographic libraries

This is necessary. But, it addresses only part of the problem. The deeper issue is architectural.

Enterprise networks were built around a perimeter model, where encryption is layered onto the edge as a wrapper, not embedded into how trust is established.

TLS sessions, VPN tunnels, and centralized key management were not designed for:

  • Quantum-resilient cryptography
  • Decades-long forward secrecy
  • Distributed trust models

Retrofitting PQC into these systems upgrades the cryptography. It doesn’t fix the structural weaknesses:

  • Centralized control planes concentrate risk
  • Session-based identity is vulnerable in long-term adversarial models
  • Infrastructure-based trust enables lateral movement

Security doesn’t break at the algorithm layer first. It breaks at the architectural layer.

Security Has to Be Built in the Network, Not Bolted on

Quantum resilience cannot be bolted on. It has to be built into the architecture.

ZeroTier Quantum reflects that shift.

Instead of layering post-quantum cryptography onto legacy systems, it embeds quantum-resilient encryption directly into the network itself — at the protocol layer, at every node, independent of infrastructure or topology.
This is enabled by the ZeroTier Transport Protocol (ZTP), a packet-based transport designed for high-performance secure connectivity with post-quantum cryptography at the highest level.

ZeroTier Quantum implements NIST-standardized algorithms, including ML-KEM 1024 (FIPS 203), alongside hybrid cryptographic schemes that require both classical and quantum methods to be broken for compromise.
Operationally, this changes how security works:

  • Cryptographic identity is established at every node, not just at session boundaries
  • The control plane is distributed — eliminating single points of failure
  • Forward secrecy extends into the quantum era and captured traffic remains unusable
  • The system is software-defined and API-first making it deployable across cloud, on-prem, edge, and air-gapped environments without hardware constraints
  • The network can operate air-gapped, sovereign-gapped, etc. with no external dependencies

This isn’t an upgrade. It’s a different design model, one aligned to how threats actually operate.

The Strategic Window Is Now

In the federal market, the transition is already underway. Requirements are being defined, crypto inventories are being built, and execution planning has started.

What matters now is how organizations respond. The shift to post-quantum isn’t theoretical — it’s operational. Teams are being pushed to modernize, reduce risk, and do it without ripping and replacing existing infrastructure.

Regulated enterprises are following the same path. Slower, but with the same end state: inventory, prioritize, and begin phased adoption before the threat becomes unavoidable.

PQC is not a standalone initiative. It’s being embedded into:

  • Zero-trust strategies
  • Identity modernization
  • Broader cybersecurity investment

Organizations that treat this as future planning will be forced into reactive migration — under compliance pressure, with less flexibility, and more legacy friction. The key tenants to think about are the quality and level crypto and compliance, performance considerations, and flexibility, like being crypto agile.
That’s the cost of waiting.

The organizations moving now aren’t just reducing risk. They’re building infrastructure designed for the next era of cryptography, not the last one.

Want to understand where ZeroTier Quantum fits in your migration strategy? Talk to our team.

Sign up for our newsletter

Don’t miss an update. Sign up to receive occasional networking content and news.

By providing your email address, you agree to receive marketing communications from ZeroTier. We’ll make sure it’s awesome!

Our Privacy Policy has more information on how we use your personal information. You can unsubscribe from our communications at any time. Your communications, your choice.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.