PolicyBrief
H.R. 4942
119th CongressAug 8th 2025
Quantum Encryption Readiness and Resilience Act
IN COMMITTEE

This Act establishes a process for reporting on and creating a plan to mitigate the cybersecurity and national security risks posed by future cryptographically-relevant quantum computers.

Suhas Subramanyam
D

Suhas Subramanyam

Representative

VA-10

LEGISLATION

New Act Mandates 5-Year Plan to Shield US Data from Future Quantum Hacking Threats

The newly introduced Quantum Encryption Readiness and Resilience Act isn't about building a better computer; it’s about making sure the computers we already have don’t get completely owned by the ones coming down the pipeline. Specifically, Section 2 of this Act sets up a mandatory, five-year process for the government to prepare the country—and our data—for the day a truly powerful quantum computer arrives. The bill mandates that a specialized Subcommittee deliver a detailed plan within one year to mitigate the risks posed by a “cryptographically-relevant quantum computer”—one capable of breaking current, standard encryption methods.

The Countdown to Quantum-Proofing Our Data

Think of this as an insurance policy against a future digital catastrophe. Right now, most of our sensitive data—bank records, medical files, national security secrets—is protected by encryption algorithms that are secure against today’s "classical" computers. The problem is that quantum computers, once powerful enough, could potentially break that encryption instantly. This bill directly addresses the nightmare scenario known as "Harvest Now, Decrypt Later," where adversaries steal encrypted data today, knowing they can decrypt it easily once they have the right quantum machine.

To tackle this, the Subcommittee has a few major tasks. First, they have to assess where the U.S. stands globally in both developing these powerful quantum computers and in adopting new, quantum-resistant security methods (called "post-quantum cryptography"). Crucially, they must also identify which economic sectors—like finance, energy, or healthcare—are most vulnerable to this future hack. This isn't just theory; the bill requires them to create a detailed risk mitigation plan, outlining how federal agencies will coordinate and, importantly, how they will partner with private companies to adopt these new security standards.

What This Means for Everyday Business

If you run a small business that handles customer data or sensitive proprietary information, this bill matters. While the immediate action is on the government side, the plan developed by the Subcommittee will directly influence future cybersecurity standards across the board. For example, the plan must identify specific security measures that companies should adopt and suggest concrete actions agencies can take to help the adoption process—perhaps through pilot projects or simplified guides. This suggests that over the next few years, the government will start pushing for, and potentially subsidizing or mandating, the transition to post-quantum cryptography. This could mean initial compliance costs for companies, but it's a necessary investment to protect their systems from being instantly cracked later.

Transparency and the Long Game

The Act requires the Subcommittee to define exactly what qualifies as a “cryptographically-relevant quantum computer.” This is a key detail, as this definition will trigger when heightened security measures need to be implemented. The Subcommittee must send its initial findings and the full mitigation plan to Congress within the first year. They have the option to classify this report, which is a point worth noting—while national security information needs protection, too much classification could limit the public and private sector’s ability to assess their own risk levels effectively.

After the initial report, the oversight doesn't stop. The Subcommittee must provide annual follow-up reports for the next four years, specifically tracking how well public and private entities are actually adopting the recommended security measures. This ensures that the plan doesn't just sit on a shelf. Instead, it creates a structured, five-year commitment to proactively securing our digital infrastructure before the ultimate digital threat arrives.