On February 7, 2026, Kent Walker, President of Global Affairs at Google's parent company Alphabet, issued a warning that cut through years of vague quantum computing timelines: adversaries are actively harvesting encrypted data right now, betting that future quantum computers will crack it. The threat to VPN encryption and online privacy is not a future problem — it has already started.
This is not hype. NIST finalized three post-quantum cryptographic standards in August 2024 after an eight-year global effort. Google migrated all its internal traffic to quantum-resistant key exchange and has completed the process for all Google services. The US government has mandated that national security systems must migrate to post-quantum cryptography by 2030 with classical algorithms disallowed by 2035. The post-quantum cryptography market is projected to grow from $420 million in 2025 to $2.84 billion by 2030.
This article explains what quantum computing actually threatens in your VPN connection, what the "store now, decrypt later" attack means in practice, what NIST's new standards do, and what you should know about the state of quantum-resistant VPNs in 2026.
What Quantum Computing Threatens in VPN Encryption
There are two types of encryption involved in a typical VPN connection, and the quantum threat affects them differently.
Public-Key Cryptography (The Real Target)
When you connect to a VPN, the first step is a key exchange — a process where your device and the VPN server agree on a shared encryption key without transmitting it directly. This is done using public-key cryptography: RSA, Elliptic Curve Diffie-Hellman (ECDH), or similar algorithms.
These algorithms are built on mathematical problems — large integer factorization and discrete logarithm problems — that are computationally hard for classical computers but tractable for quantum computers running Shor's algorithm. Google has stated that a cryptographically relevant quantum computer could break these algorithms as early as 2029.
According to The Quantum Insider, three papers published within 12 months sharply reduced estimated quantum computing resources needed to break RSA-2048 — from approximately 20 million physical qubits down to potentially fewer than 100,000 under newer architectures. The timeline is compressing.
Symmetric Encryption (Less Immediate, Manageable)
The encryption that protects the actual content of your VPN traffic — AES — uses symmetric key cryptography. Grover's algorithm gives quantum computers a quadratic speedup against symmetric encryption, effectively halving the key length: AES-128 would behave like a 64-bit key against a quantum adversary.
The fix here is straightforward: AES-256 is generally considered to restore adequate security against quantum attacks without replacing the underlying algorithm. This is why AES-256 is the current standard for serious VPN use — it provides a margin against both classical and quantum brute-force attacks.
CyberFence uses AES-256-GCM encryption for all traffic, which already addresses the symmetric encryption quantum threat. The more pressing concern is the key exchange layer.
The "Store Now, Decrypt Later" Attack — Why This Is Already Happening
The most important thing to understand about quantum computing and encryption is that you do not have to wait for a quantum computer to exist before the threat is real.
Adversaries are capturing encrypted VPN traffic today and storing it. They cannot read it now. But when quantum computing capabilities advance to the point where RSA and ECDH can be broken, they will decrypt everything they captured years earlier. This is called a "harvest now, decrypt later" or "store now, decrypt later" (SNDL) attack.
Google confirmed this is already underway. Intelligence agencies, state-sponsored groups, and well-funded criminal organizations have been harvesting encrypted traffic for years. Research cited by Google Cloud found that only 9% of organizations have a plan for transitioning to quantum-resistant encryption — meaning the vast majority are generating traffic that may be decryptable in the future.
The data types with the longest shelf life are the highest priority targets:
- Healthcare records with 50+ year retention requirements
- Financial transactions and trading algorithms
- Government and defense communications
- Legal documents and intellectual property
- Pharmaceutical research worth billions
- Long-term business contracts
For anyone who uses a VPN for HIPAA, NIST, or CMMC compliance — or who handles any of the above categories of data — the relevant question is not "when will quantum computers exist?" It is "how long does my data need to remain confidential, and will my VPN encryption last that long?"
What NIST's Post-Quantum Cryptography Standards Actually Are
In August 2024, NIST finalized three post-quantum cryptographic standards after an eight-year global evaluation process. These standards replace the mathematical foundations that quantum computers can break.
FIPS 203 — ML-KEM (Module-Lattice-Based Key Encapsulation)
Formerly called CRYSTALS-Kyber. This is the primary replacement for RSA and ECDH in key exchange — exactly the step in VPN connections that quantum computers threaten. ML-KEM is based on lattice problems, which are believed to be hard for both classical and quantum computers. NIST designated it as the primary standard for general encryption.
FIPS 204 — ML-DSA (Module-Lattice-Based Digital Signature Algorithm)
Formerly CRYSTALS-Dilithium. Replaces RSA and ECDSA for digital signatures — used to verify authenticity of software, certificates, and communications. Primary standard for protecting digital signatures.
FIPS 205 — SLH-DSA (Stateless Hash-Based Digital Signature Algorithm)
Based on Sphincs+. A backup digital signature algorithm based on a different mathematical approach than ML-DSA, providing redundancy if ML-DSA is later found vulnerable.
NIST's mathematician Dustin Moody, who heads the PQC standardization project, was explicit: "We encourage system administrators to start integrating them into their systems immediately, because full integration will take time." Cryptographic migrations historically take 10-20 years to complete across global infrastructure. Starting in 2026 means finishing around 2030-31 for most organizations.
Where VPN Providers Stand on Post-Quantum Encryption in 2026
The VPN industry's response to post-quantum cryptography has been uneven. According to analysis published in April 2026, the majority of commercial VPN services still have not shipped quantum-resistant encryption to users, despite NIST standards being finalized 20 months ago.
Providers that have moved:
- NordVPN shipped post-quantum encryption on Linux via NordLynx in September 2024, then rolled it across Windows, macOS, iOS, and Android by May 2025.
- ExpressVPN integrated PQE into its Lightway protocol in January 2025 across all platforms.
- Mullvad had been working on quantum-resistant tunnels since 2017, ahead of the standards themselves.
Meanwhile, CyberGhost, Private Internet Access, and several others remain without quantum-resistant options. A Surfshark study from January 2026 found that only 8% of the 40 most popular consumer apps had implemented any form of post-quantum cryptography.
The argument for waiting — that a cryptographically relevant quantum computer is still years away — misses the SNDL threat entirely. The providers that shipped PQE made a bet that their users' traffic has a shelf life longer than the time remaining before quantum decryption becomes practical. Given the data types that VPN users are protecting, this is the correct bet.
CyberFence uses AES-256-GCM encryption across all connections — which already addresses the symmetric encryption quantum threat. We are actively tracking post-quantum key exchange developments and the NIST standards for integration. Start your Free Trial — $7.99/mo.
What Hybrid Post-Quantum Encryption Means
Most implementations currently deploying post-quantum cryptography use a hybrid approach: combining classical algorithms (like X25519) with post-quantum algorithms (like ML-KEM) in the key exchange. The connection is protected by both, so it remains secure unless both algorithms are broken simultaneously.
This is the recommended approach during the transition period. NIST permits hybrid key exchange using ML-KEM + X25519. The UK's NCSC allows hybrid as an interim approach while preferring pure PQC where feasible.
Hybrid implementations ensure backward compatibility (the connection still works with devices that don't support the PQC algorithm) while adding quantum resistance for the key exchange. NordVPN and ExpressVPN both use hybrid approaches in their current implementations.
What This Means for HIPAA, NIST, and Compliance Users
For organizations operating under HIPAA, NIST Cybersecurity Framework, CMMC, or SEC cybersecurity disclosure rules, the quantum computing timeline is not abstract.
NIST's post-quantum migration guidance is explicit: organizations should begin inventory of cryptographic assets now, prioritize systems handling long-lived sensitive data, and begin testing PQC implementations in 2026-2027 to be ready for migration by 2030. Government contractors working with the NSA have a harder deadline: CNSA 2.0 requires pure PQC for national security systems by 2035, with migration beginning in 2025.
The HIPAA intersection is direct: electronic protected health information (ePHI) is subject to retention requirements that can extend 50+ years for certain records. If that data is being transmitted today over VPN tunnels using classical key exchange, and that traffic is being captured by state-sponsored actors, the SNDL threat is not theoretical — it is a current compliance risk.
CyberFence is built for HIPAA and NIST compliance use cases. Our AES-256-GCM encryption addresses the symmetric layer of the quantum threat today. Post-quantum key exchange integration follows the industry's leading timeline as standards and implementations mature. For compliance conversations, the current state of the encryption — AES-256 for the data layer — is the right answer for the symmetric threat, while the key exchange transition is part of the broader industry migration underway.
What You Can Do Right Now
The quantum computing transition will take years. But there are concrete steps that matter today:
For Individuals
- Use AES-256 encryption — AES-128 is effectively weakened to 64-bit security against quantum attacks. AES-256 restores adequate security. Verify your VPN is using AES-256-GCM, not AES-128.
- Prefer WireGuard — WireGuard uses ChaCha20 and Curve25519. The symmetric component (ChaCha20-Poly1305) is quantum-resistant at its key length. The key exchange (Curve25519) is not — but WireGuard's design makes swapping the key exchange mechanism cleaner than legacy protocols.
- Consider your data's shelf life — If you transmit data today that needs to remain confidential for more than five years, SNDL is a direct concern. Prioritize providers that have already shipped quantum-resistant key exchange for that traffic.
- Avoid providers with no PQC roadmap — If a VPN provider has made no public statement about post-quantum cryptography by mid-2026, that is a signal about their security culture.
For Organizations
- Inventory all cryptographic systems — identify which use RSA, ECDH, or ECDSA for key exchange or signatures.
- Prioritize systems handling data with long confidentiality requirements.
- Begin testing FIPS 203 (ML-KEM) integrations in non-production environments now.
- Update vendor questionnaires to include post-quantum cryptography roadmap questions.
- Review NIST SP 800-227 (Final KEM Recommendations) and CNSA 2.0 migration guidance.
The Timeline in Plain Terms
The honest summary of where things stand in 2026:
- A quantum computer capable of breaking RSA-2048 does not yet exist, but resource estimates for building one have dropped dramatically in the past 12 months.
- Google's best estimate puts the deadline for post-quantum migration as early as 2029 — not 2040.
- Store-now-decrypt-later attacks are actively underway against encrypted traffic today.
- NIST standards are finalized and ready for implementation.
- The PQC market is growing at 18%+ CAGR — the industry is treating this as solved, not theoretical.
- 91% of organizations have no post-quantum migration roadmap. That is the actual risk gap.
The practical implication: if you are transmitting sensitive data over a VPN today and that data needs to remain confidential for five or more years, the encryption protecting your key exchange will likely not last long enough. Using AES-256 on the data layer is correct. Choosing a provider that has shipped or is actively deploying quantum-resistant key exchange is the next layer.
CyberFence uses AES-256-GCM on all connections, zero logs, a built-in kill switch, and Web Shield DNS filtering — built for HIPAA, NIST, and CMMC compliance environments. Start your Free Trial today.