Key Exchange vs. Digital Signatures: Why the Quantum Clock Ticks Differently

Type: Technical Briefing
Published: December 2025
Keywords: TLS 1.3, Key Exchange, Digital Signatures, HNDL, Post-Quantum Cryptography, RSA, ECDSA, ML-KEM

Abstract

TLS 1.3 relies on two distinct cryptographic operations: key exchange for confidentiality and digital signatures for authentication. Both are vulnerable to future quantum computers running Shor's algorithm. However, the "harvest now, decrypt later" (HNDL) threat affects them very differently. This article explains why migrating key exchange to post-quantum algorithms is time-critical, while traditional RSA and ECDSA signatures can—for now—remain in service.

Key Points at a Glance

The Two Cryptographic Pillars of TLS 1.3

Every time your browser connects to a secure website, TLS 1.3 performs two fundamentally different cryptographic operations. Understanding the distinction is crucial for grasping why quantum threats affect them differently.

Two Pillars of TLS Security
🔐
Key Exchange
Diffie-Hellman / KEM
Creates a shared secret between client and server. This secret encrypts all session data—protecting it from eavesdroppers.
Classical: X25519, ECDH, DH
Post-Quantum: ML-KEM-768
✍️
Digital Signature
RSA / ECDSA
Proves the server's identity is genuine. The signature verifies the certificate wasn't forged—preventing impersonation.
Classical: RSA-2048, ECDSA
Post-Quantum: ML-DSA, SLH-DSA
Figure 1: Key exchange provides confidentiality (protecting data content), while digital signatures provide authentication (proving identity). Both use public-key cryptography but serve entirely different purposes.

Key exchange (typically using ECDH with the X25519 curve) creates an ephemeral shared secret. Both parties derive encryption keys from this secret, and all subsequent communication is encrypted. The beauty of this approach—called forward secrecy—is that even if someone steals the server's long-term private key later, they cannot decrypt past sessions because each session used a unique ephemeral key.

Digital signatures (RSA or ECDSA) handle authentication. The server signs the handshake transcript with its private key, and the client verifies this signature using the public key from the server's certificate. This proves the client is talking to the genuine server, not an impostor.

The Harvest Now, Decrypt Later Threat

The "harvest now, decrypt later" (HNDL) attack is perhaps the most insidious quantum threat we face. Unlike traditional cyberattacks that seek immediate gain, HNDL is a long game: adversaries passively collect encrypted traffic today and archive it, betting that future quantum computers will break the encryption.

Intelligence agencies and security researchers confirm this is already happening. Internet route hijacks have diverted massive volumes of encrypted traffic through adversary-controlled networks. The encrypted data is useless today—but could become a goldmine when cryptographically relevant quantum computers (CRQCs) arrive.

But here's the critical insight: HNDL is fundamentally a confidentiality attack. Attackers want to read your encrypted data. This means the threat specifically targets the key exchange mechanism, not the signature mechanism.

Why HNDL Affects Key Exchange and Signatures Differently

To understand the asymmetric impact, consider what happens when a quantum computer eventually breaks each mechanism:

How Quantum Attacks Affect Key Exchange vs. Signatures
🔐
Key Exchange
Today
ECDH Key Exchange
🔒
Today
Attacker Records Traffic
📡
Future (Q-Day)
Break ECDH with Shor's
⚛️
Result
All Stored Data Exposed
💀
✍️
Signature
Today
RSA Signature Verified
Today
Session Completes Securely
🔒
Future (Q-Day)
Break RSA with Shor's
⚛️
Result
Past Sessions Still Safe
🛡️
Figure 2: Breaking key exchange retroactively exposes all stored encrypted data. Breaking signatures retroactively has no effect—the authentication already happened and session keys were never derived from the signature.

The key insight is that signatures are ephemeral verifications. Once the handshake completes and both parties have authenticated, the signature has done its job. Breaking the signature algorithm ten years later doesn't let an attacker recover session keys—because session keys were derived from the key exchange, not the signature.

In contrast, key exchange secrets persist in the encrypted traffic. Every byte of encrypted data transmitted over the session was protected by keys derived from the Diffie-Hellman exchange. If an attacker can recover the shared secret, they can decrypt everything.

Migration Priority: Key Exchange First

This asymmetry has profound implications for post-quantum migration planning. Consider the timeline:

Post-Quantum Migration Urgency
Key Exchange
URGENT: Migrate Now
Why urgent? Data encrypted today with classical key exchange will be decryptable when quantum computers arrive. If your data must stay secret for 10+ years, it's already at risk from HNDL attacks.
📋
Signatures
IMPORTANT: Plan Ahead
Why less urgent? Breaking signatures retroactively doesn't compromise past sessions. Migration is needed before quantum computers can attack in real-time—but that's a slightly longer runway.
Figure 3: Key exchange migration is time-critical due to HNDL attacks. Signature migration is important but has more flexibility in timing.

Industry experts and government bodies like the BSI and NSA have explicitly prioritised key exchange migration. The good news: hybrid key exchange is already available. TLS libraries and major browsers now support the X25519MLKEM768 group, combining classical X25519 with post-quantum ML-KEM-768.

Your Data's Lifespan Determines Your Urgency

Not all data faces equal risk. The critical question is: how long must your data remain confidential? If the answer exceeds the expected timeline for quantum computers, you should already be deploying post-quantum key exchange.

Data Sensitivity Lifespan vs. Quantum Arrival
🏛️ Classified Government
25+ years
🔬 Trade Secrets / IP
20 years
🏥 Healthcare Records
10 years
💰 Financial Records
7 years
📧 Business Email
3-5 years

Red line indicates estimated quantum computer timeline (~2030-2035). Data with lifespans extending beyond this point is at risk from HNDL attacks.

Figure 4: If your data's required confidentiality period extends past the estimated "Q-Day" timeline, HNDL attacks pose a real threat. Classify your data and prioritise migration accordingly.

Why RSA and ECDSA Signatures Can Wait (But Not Forever)

Given the discussion above, you might wonder: can we ignore post-quantum signatures entirely? Not quite. While the urgency is lower, there are still reasons to plan ahead:

The practical advice: keep certificate lifetimes short (one year or less for end-entity certificates), monitor the NIST PQC standardisation process, and ensure your infrastructure can adapt when post-quantum signatures become practical.

The Path Forward

The good news is that the cryptographic community has already done the hard work. NIST standardised ML-KEM (FIPS 203) in 2024, and hybrid key exchange combining X25519 with ML-KEM-768 is already supported by major browsers, cloud providers, and TLS libraries.

For a detailed technical walkthrough of implementing hybrid TLS, see our article on TLS 1.3 Quantum Vulnerabilities and Hybrid Defences.

Related Resources

Ready to go deeper? Explore our other articles on post-quantum cryptography:

Read: Harvest Now, Decrypt Later → Read: TLS 1.3 Hybrid Defences →