Once operational, a CRQC is expected to be able to compromise certain widely used cryptographic algorithms used to secure Federal data and information systems. Additionally, agencies must remain cognizant that encrypted data can be recorded now and later decrypted by operators of a future CRQC.