Quantum Computing Cybersecurity

Healthcare Quantum Risk

Protected Health Information must remain confidential for a patient's lifetime. That shelf life far exceeds the timeline for quantum decryption. Healthcare organizations face the longest data exposure window of any industry.

CMMC Registered Practitioner Org • BBB A+ Since 2003 • 23+ Years Experience

Key Takeaways

  • PHI confidentiality requirements extend 50+ years, far beyond the projected 2029-2035 CRQC timeline
  • HHS proposed mandatory encryption requirements for ePHI in early 2026
  • Harvest now, decrypt later attacks targeting healthcare data are already active
  • Healthcare has the longest data shelf life of any industry, making it the highest-priority sector for quantum migration
  • HIPAA risk analysis must be updated to address quantum threat vectors

Why Healthcare Faces the Highest Quantum Risk

Healthcare organizations hold data with the longest confidentiality requirements of any industry. A patient born today generates Protected Health Information (PHI) that must remain confidential for 80+ years. Medical records, genetic data, mental health records, substance abuse treatment records, and HIV/AIDS information carry regulatory and ethical obligations that extend for the patient's entire lifetime and, in some cases, beyond.

This creates a fundamental problem. PHI encrypted today with RSA or ECC will be decryptable by quantum computers running Shor's algorithm. The Global Risk Institute's 2024 survey places the median expectation for a cryptographically relevant quantum computer (CRQC) between 2029 and 2035. That means PHI encrypted in 2026 and intercepted through a harvest now, decrypt later attack could be decrypted as early as 2029, exposing patient data that must remain confidential until 2096 or later.

No other industry faces this magnitude of exposure. Financial transactions have short shelf lives. Most corporate data becomes irrelevant within a decade. But a patient's genetic data, psychiatric records, and chronic condition history remain deeply sensitive for their entire life. Healthcare organizations that do not begin quantum migration now are accepting a risk that spans generations.

Active Threat: HNDL Attacks on Healthcare Data

Nation-state adversaries are already executing harvest now, decrypt later campaigns against healthcare networks. Encrypted data intercepted today (EHR transmissions, HL7 FHIR API calls, DICOM imaging transfers, VPN traffic) is being stored for future quantum decryption. The NSA has publicly acknowledged this threat vector. Every day that PHI traverses quantum-vulnerable encryption is another day of HNDL exposure.

Protect Patient Data Against Quantum Threats

PTG's healthcare quantum risk assessment maps your ePHI data flows, identifies quantum-vulnerable encryption points, and produces a HIPAA-aligned remediation roadmap. The initial consultation is free.

Healthcare Quantum Attack Surfaces

Healthcare IT environments have multiple cryptographic touchpoints, each representing a quantum vulnerability that must be assessed and migrated:

Electronic Health Records (EHR) Systems

EHR databases store PHI at rest using encryption that typically relies on RSA key management. Database-level transparent data encryption (TDE), backup encryption, and key management for EHR systems like Epic, Cerner (now Oracle Health), and MEDITECH must be evaluated for quantum vulnerability. The migration path involves upgrading key management to PQC algorithms while maintaining FIPS 140 compliance for the underlying cryptographic modules.

HL7 FHIR and Healthcare Interoperability APIs

The 21st Century Cures Act mandates patient data sharing through HL7 FHIR APIs. These APIs use TLS for transport encryption, which relies on RSA or ECC key exchanges. As healthcare interoperability expands (Care Quality Alliance, CommonWell, TEFCA), the volume of PHI transmitted via quantum-vulnerable TLS connections increases. Migrating FHIR API endpoints to PQC-capable TLS configurations is a high-priority action.

Medical Imaging (DICOM)

DICOM imaging data (X-rays, MRIs, CT scans) is transmitted between imaging devices, PACS servers, and cloud archives. DICOM TLS encryption uses the same quantum-vulnerable algorithms as general TLS. Medical images contain embedded patient identifiers and are stored for the patient's lifetime. The combination of long retention and quantum-vulnerable transport encryption creates significant HNDL exposure.

Connected Medical Devices (IoMT)

The Internet of Medical Things includes infusion pumps, patient monitors, ventilators, surgical robots, and wearable health devices. Many use embedded cryptographic implementations that cannot be easily upgraded. Medical device firmware updates require FDA regulatory considerations. A quantum readiness assessment must inventory these devices and classify them by upgradability: some can receive firmware updates, others must be replaced on a managed timeline.

Health Information Exchanges (HIEs)

Health Information Exchanges facilitate PHI sharing between healthcare organizations. HIEs use VPN tunnels, TLS connections, and digital certificates for authentication, all of which rely on quantum-vulnerable algorithms. As HIE participation becomes mandatory under TEFCA, the attack surface for HNDL campaigns against healthcare data in transit expands significantly.

Genomic Data

Genomic sequencing data is perhaps the most sensitive category of healthcare data. It is immutable (a patient's genome does not change), it identifies family members beyond the patient, and it has implications for insurance, employment, and social discrimination that extend indefinitely. GINA (Genetic Information Nondiscrimination Act) provides some protections, but quantum decryption of intercepted genomic data would render those protections meaningless. Organizations handling genomic data should treat it as the highest-priority migration target.

HIPAA Compliance and Quantum Risk

The HIPAA Security Rule (45 CFR 164.312) establishes encryption requirements for ePHI. Under current rules, encryption is an "addressable" implementation specification, meaning covered entities must implement it or document why an equivalent alternative is reasonable. HHS proposed mandatory encryption requirements in early 2026, which would eliminate the "addressable" flexibility.

Regardless of the regulatory outcome, HIPAA compliance requires a documented risk analysis (45 CFR 164.308(a)(1)(ii)(A)) that identifies threats and vulnerabilities to ePHI. A risk analysis that fails to consider quantum computing threats, given the public acknowledgment of HNDL attacks by the NSA, NIST, and CISA, could be cited as inadequate. The question is not whether your risk analysis needs to address quantum threats but how thoroughly.

PTG's healthcare quantum risk assessment produces the following HIPAA-aligned deliverables:

  • Updated HIPAA risk analysis with quantum threat vectors for each ePHI data flow
  • Cryptographic inventory mapped to HIPAA Security Rule controls (164.312(a)(2)(iv), 164.312(e)(2)(ii))
  • Risk register with quantum-specific entries scored by PHI sensitivity and exposure window
  • Remediation roadmap aligned to HIPAA audit cycle and HHS enforcement priorities
  • Business Associate Agreement (BAA) addendum template for vendor PQC migration requirements
  • Board-ready executive summary quantifying quantum risk to organizational PHI
  • Incident response plan update for potential HNDL exposure scenarios
  • Staff training documentation for quantum-aware security practices

Your HIPAA Risk Analysis Needs a Quantum Update

If your risk analysis does not address quantum computing threats to ePHI, it has a gap that HHS and OCR are increasingly aware of. PTG's assessment produces the documentation your compliance team needs.

Healthcare Quantum Migration Priorities

Not all healthcare data has equal quantum risk. PTG's assessment prioritizes migration by a combination of data sensitivity, regulatory exposure, and HNDL vulnerability:

Priority 1: Genomic and Behavioral Health Data

Highest sensitivity, longest exposure window, most severe consequences if decrypted. Genomic data is immutable and identifies family members. Behavioral health records carry extreme social sensitivity. These data categories should migrate to PQC encryption first, including both data at rest and transport encryption for any system that processes them.

Priority 2: EHR and PHI in Transit

HL7 FHIR APIs, DICOM transfers, HIE connections, and telehealth platforms transmit PHI over TLS connections that are actively exposed to HNDL interception. Migrating these transport layers to PQC-capable TLS (using hybrid ML-KEM + ECDH) addresses the most immediate interception vector.

Priority 3: PHI Archives and Backups

Long-term PHI archives (data warehouses, backup tapes, disaster recovery sites) contain the largest volume of sensitive data with the longest remaining shelf life. Re-encrypting these archives with PQC algorithms is a bulk operation that can be scheduled during maintenance windows without disrupting clinical operations.

Priority 4: Medical Device Encryption

Connected medical devices with embedded cryptography require the longest lead time for migration. Devices that support firmware updates can be migrated through vendor coordination. Devices that cannot be updated must be identified for replacement on a managed timeline, with compensating controls (network segmentation, PQC-encrypted gateways) deployed in the interim.

Frequently Asked Questions

Does HIPAA currently require quantum-resistant encryption?

HIPAA does not explicitly mention quantum-resistant encryption. However, HIPAA requires a documented risk analysis that identifies threats and vulnerabilities to ePHI. Given public acknowledgment of quantum threats by NIST, NSA, and CISA, a risk analysis that ignores quantum computing could be cited as inadequate. HHS proposed mandatory encryption requirements in early 2026. PTG recommends updating your risk analysis to address quantum threats now, before HHS formalizes the requirement.

How long does PHI need to remain confidential?

PHI confidentiality extends for the patient's lifetime. For a child born today, that could be 80+ years. Some categories of PHI have even longer requirements: genetic data is relevant to descendants indefinitely; psychotherapy notes carry sensitivity that does not diminish with time. HIPAA retention rules require covered entities to maintain certain records for 6 years, but the confidentiality obligation persists far beyond retention periods. This is why healthcare faces the longest quantum exposure window of any industry.

Are healthcare organizations currently being targeted by HNDL attacks?

Yes. Healthcare data is a prime target for harvest now, decrypt later campaigns because of its long confidentiality shelf life and high value. Nation-state adversaries intercept encrypted healthcare data transmitted over the internet (EHR queries, FHIR API calls, telehealth sessions, medical imaging transfers) and store it for future quantum decryption. The NSA has publicly acknowledged HNDL as an active threat. Healthcare organizations cannot prevent all interception, but they can minimize HNDL value by migrating to PQC encryption for data in transit.

What about medical devices that cannot be updated?

Many connected medical devices (infusion pumps, patient monitors, legacy imaging equipment) have embedded cryptographic implementations that cannot be firmware-updated. For these devices, the migration strategy involves compensating controls: network segmentation to isolate quantum-vulnerable devices, PQC-encrypted gateway proxies that re-encrypt traffic before it leaves the network, and managed replacement timelines aligned to device lifecycle and FDA requirements. PTG's assessment identifies these devices and recommends specific compensating controls for each category.

How does telehealth quantum risk compare to in-person care?

Telehealth significantly increases quantum exposure. In-person care generates PHI that is stored locally and transmitted over internal networks. Telehealth transmits PHI over the public internet, where it is exposed to HNDL interception at every network hop. Video conferencing platforms, remote patient monitoring devices, and patient portal communications all use TLS with quantum-vulnerable key exchanges. As telehealth adoption continues to grow post-pandemic, the quantum attack surface for healthcare organizations expands proportionally.

Will Business Associates need to demonstrate quantum readiness?

Yes. HIPAA's Business Associate Rule requires BAs to implement safeguards for PHI equivalent to those of the covered entity. As covered entities update their risk analyses to address quantum threats, Business Associates will face the same expectations. PTG recommends adding PQC migration requirements to Business Associate Agreements (BAAs) now, including specific timelines and reporting obligations. Our assessment includes a BAA addendum template for this purpose.

How does the HHS 2026 encryption proposal affect quantum planning?

HHS proposed mandatory encryption for ePHI in early 2026, removing the "addressable" flexibility in the current Security Rule. If finalized, this rule would require all covered entities and Business Associates to encrypt ePHI at rest and in transit with NIST-approved algorithms. As NIST transitions its approved algorithm list to include PQC and deprecate quantum-vulnerable algorithms, mandatory encryption under the updated rule would effectively require PQC. Organizations that begin quantum migration now will be ahead of this regulatory curve.

What is the cost of a healthcare quantum risk assessment?

Pricing depends on the size of your organization, the complexity of your healthcare IT environment (number of EHR systems, connected devices, interoperability connections), and the depth of HIPAA compliance documentation required. PTG's initial consultation is free, and we provide a detailed proposal after the scoping call. The assessment can be delivered as a standalone engagement or integrated with a broader quantum readiness assessment and PQC migration plan.

Should small healthcare practices worry about quantum threats?

Yes. HNDL attackers do not discriminate by practice size. Small practices often use the same EHR platforms, health information exchanges, and cloud services as large hospital systems. PHI from a small practice is equally valuable and equally sensitive. Small practices also face proportionally higher regulatory risk: a HIPAA breach involving quantum-decrypted PHI would be devastating regardless of organization size. PTG's assessment scales to practices of all sizes, and the initial consultation is free.

How does PTG's healthcare quantum assessment work with existing HIPAA audits?

PTG's assessment produces deliverables that integrate directly into your existing HIPAA compliance program. The updated risk analysis feeds into your annual review cycle. Risk register entries follow your existing scoring methodology. Remediation roadmap items are formatted as HIPAA action items with responsible parties, deadlines, and evidence requirements. If you have an upcoming OCR audit or third-party HIPAA assessment, the quantum risk documentation strengthens your overall compliance posture by demonstrating proactive risk management.

Ready to Assess Your Healthcare Quantum Risk?

Patient data confidentiality is not a future concern. It is a present obligation. PTG's free consultation scopes your ePHI environment and maps the quantum threat to your specific infrastructure.