Trump's Quantum Security Policy Reversal: What It Means for Business
On June 6, 2025, President Trump signed an executive order that represents a significant retreat from urgent quantum preparedness—just when the threat is becoming most critical.
Critical Alert
The "harvest now, decrypt later" attack is already happening. Nation-state actors are collecting encrypted data today, betting that future quantum computers will crack current encryption within a decade. Every day of delay increases vulnerability.
The Policy Shift That Could Leave America Vulnerable
President Trump's Executive Order "Sustaining Select Efforts to Strengthen the Nation's Cybersecurity" fundamentally altered America's approach to quantum-resistant security. While maintaining some cybersecurity frameworks from previous administrations, this order represents a significant retreat from the urgent quantum preparedness that experts have been advocating.
What Changed: The Quantum Security Rollback
The most concerning aspect of this executive order is its systematic dismantling of post-quantum cryptography (PQC) mandates. The previous administration's Executive Order 14144 had directed federal agencies to adopt quantum-resistant encryption "as quickly as feasible" and encouraged technology vendors and allied nations to follow suit.
Key Changes Include:
- Removal of urgent PQC adoption requirements for federal agencies
- Elimination of PQC standards from federal procurement processes
- Stripping of hybrid quantum-resistant key exchange implementation requirements
- Cancellation of international cooperation initiatives to promote NIST-approved quantum-safe algorithms
What remains are only modest provisions: CISA will maintain a list of PQC-capable product categories, and agencies must support modern encryption protocols like TLS 1.3 by 2030. This represents a fundamental shift from immediate action to a "wait and see" approach that could prove catastrophic.
The "Harvest Now, Decrypt Later" Threat
Perhaps the most misunderstood aspect of the quantum threat is its current relevance. The danger isn't hypothetical—it's happening today. Nation-state actors and sophisticated cybercriminals are already harvesting encrypted data, banking on the assumption that future quantum computers will make current encryption obsolete.
"Every additional year that federal agencies continue using legacy encryption for high-value data is another year that hostile actors can intercept those communications and archive them, betting that a future cryptanalytically relevant quantum computer (CRQC) will crack them open."
— Marin Ivezic, Founder of Applied Quantum
This strategy means that sensitive data encrypted today could be vulnerable tomorrow. Every classified government communication, every piece of critical infrastructure data, and every citizen's personal information held in government systems is potentially at risk.
America's Leadership at Risk
The policy reversal doesn't just affect domestic security—it undermines America's position as a global leader in quantum preparedness. The United States has been at the forefront of quantum-resistant cryptography development, with NIST leading the world in selecting quantum-safe algorithms.
The previous executive order had positioned America to drive international adoption of these standards. Now, that leadership vacuum could be filled by competing nations pushing their own quantum solutions, potentially creating a fragmented global security landscape where not everyone is equally protected.
The Complacency Trap
One of the most dangerous aspects of this policy shift is the message it sends to federal agencies already overwhelmed with cybersecurity challenges. Without clear mandates from Washington, quantum preparedness risks falling off organizational radar screens.
The reality is that quantum preparedness cannot be implemented overnight. It requires:
- Comprehensive cryptographic system inventories
- Standards updates and testing
- Hardware retrofitting or replacement
- Legacy system integration
- Multi-year implementation timelines
By easing pressure now, the administration virtually guarantees a more chaotic scramble when quantum threats can no longer be ignored.
What Organizations Must Do Now
Despite the policy retreat, forward-thinking organizations cannot afford to wait. Here's what needs to happen:
For Federal Agencies
Continue quantum-readiness efforts voluntarily, treating existing guidance like NSM-10 and OMB Memo M-23-02 as de facto requirements. Begin including quantum-safe language in contracts and prioritize vendors offering PQC capabilities.
For Private Sector
Don't slow down PQC development and implementation. The fundamental risk remains unchanged, and early adoption will provide competitive advantages in both domestic and international markets.
For Policymakers
Congress can fill the leadership void through legislative action, incorporating PQC mandates into defense authorization acts, ensuring dedicated funding for quantum transitions, and maintaining support for international standards development.
The Bottom Line for Business Leaders
This policy shift makes proactive quantum preparedness more critical than ever. While government leadership has stepped back, the quantum threat continues to advance. Organizations that act now to implement quantum-resistant security will be protected when cryptographically relevant quantum computers emerge.
We cannot afford to treat quantum preparedness as a distant concern. The window for proactive security is narrowing, and those who wait for government mandates may find themselves scrambling to catch up when it's too late.
Key Takeaway
The quantum revolution is coming whether we're ready or not. The question is: will you be prepared?
Ready to Prepare for Quantum Threats?
Don't wait for government mandates. Quantum Shield Labs provides strategic guidance and post-quantum cryptography assessments to help your organization prepare for emerging quantum threats.
Schedule a Quantum Security AssessmentSources and Expert Commentary
This analysis is based on expert commentary by Marin Ivezic, Founder of Applied Quantum and Secure Quantum, with over 30 years of cybersecurity experience in critical infrastructure protection. For more insights on quantum security, visit PostQuantum.com.