For thirty years, the security industry has treated Q-Day (the moment a quantum computer breaks the encryption protecting the modern internet) as a problem for the next generation. The estimates kept shifting outward, from a billion qubits to twenty million to one million, always ten to twenty years away. In the past two weeks, two independent research teams dropped the requirement for breaking elliptic curve cryptography, a widely-used encryption method, to levels that, if they hold, would put Q-Day inside the decade.
Google and the Ethereum Foundation published a whitepaper in late March showing that breaking the 256-bit elliptic curve cryptography protecting most blockchain wallets needs roughly five hundred thousand error-corrected qubits on a superconducting quantum computer. Their estimate: minutes once that hardware exists. That is a twenty-fold reduction from prior projections. Separately, a team from Caltech, Berkeley, and the startup Oratomic showed that a neutral-atom quantum computer might pull off the same feat with just ten thousand qubits, if their analysis holds up experimentally. The same approach would need around one hundred thousand qubits to crack RSA-2048, the other widely-deployed encryption standard, in roughly three months.
Google's response was to set an internal deadline: migrate all its systems to post-quantum cryptography by 2029. Cloudflare matched that target the following week.
"The message that we've been giving to pretty much all our customers is, 'Please, don't take this lightly,'" said Ramana Kompella at Cisco. "The time to prepare your infrastructure towards these quantum threats is today. In fact, it may have even been yesterday."
The shift in tone from Google and Cloudflare is itself data. Both companies have spent years warning about "harvest now, decrypt later" attacks — adversaries collecting encrypted data today to decrypt once a capable quantum computer exists. That is a real and present danger. But their recent announcements emphasize quantum-secure authentication, not encrypted traffic. Brian LaMacchia, who ran Microsoft's post-quantum transition program until 2022, noted that Google's 2029 target is an aggressive acceleration even beyond what the US government has publicly required. "It raises the question of what's motivating them," he told Ars Technica.
The answer, most plausibly, is that Google knows something about the timeline it is not obligated to share. If your internal modeling puts Q-Day at 2030 rather than 2040, you migrate authentication first. That is exactly what Google's recent Android announcements describe: hardware-rooted post-quantum signatures in Android 17, migrating Play Store app signatures to PQC, moving remote attestation to quantum-resistant keys. These are not the actions of a company hedging against a 2040 threat.
What changed? The resource estimates tightened. The qubit counts dropped not once but twice in the same month, from two independent groups using different hardware architectures. Craig Gidney, Google's quantum algorithm lead, had already shown in 2025 that RSA-2048 requires under a million qubits — down from the billions estimated in 2012. The new results suggest that elliptic curve cryptography, the workhorse of blockchain wallets, messaging apps like Signal, and most TLS handshakes, is more vulnerable than RSA to near-term quantum attack. This is not consensus physics. The papers are preprints, subject to revision. But they arrived simultaneously, from different teams, and the field treated them seriously enough that two major internet infrastructure companies reorganized their security roadmaps within days.
The harder problem is that replacing encryption is not a software update. The infrastructure carrying the world's financial transactions, medical records, and government communications is a distributed archaeology project. Organizations do not know where all their cryptographic assets live. Martin Charbonneau at Nokia estimates that mapping and replacing vulnerable components across a large telecom or financial network takes years, and that is before touching the harder problem of cryptographic agility, the ability to swap algorithms quickly when the next vulnerability appears.
Industry analyses consistently suggest a decade or more for large enterprises to complete migration. Three organizations QuSecure, a PQC firm, is currently working with have estimated transition costs above one hundred million dollars each, over three to ten years. Smaller enterprises and hospitals are not moving. The US government has set deadlines — NSA set a 2033 target for national security systems broadly, with some specific applications due by 2030, and currently adheres to a 2031 implementation timeline — but enforcement is uneven and the commercial sector moves faster when it moves at all.
Cryptocurrency occupies the most precarious position. Unlike a bank that can flip a switch and rotate its cryptographic keys, Bitcoin and its peers are governed by distributed consensus. Changing the signing algorithms requires convincing a decentralized network of operators, a process measured in years even when there is agreement. Google's paper notes that the first sign of Q-Day may not be an announced breakthrough but a heist — quantum computers enabling on-spend attacks on Bitcoin transactions visible in the public mempool, or the quiet drain of old wallets whose private keys become derivable. The quantum-safe cryptocurrencies that appeared after the March announcements surged as much as fifty percent in a single day, which tells you how asymmetric the market's view of the risk remains.
The honest uncertainty here is large. Quantum computers with hundreds of thousands of error-corrected qubits do not exist. Building them requires sustained progress across multiple hardware modalities on a schedule that has repeatedly eluded prediction. Q-Day has been ten to twenty years away for three consecutive decades.
What is different this time is the response. Google does not publish internal migration deadlines for problems it thinks are fifteen years away. Cloudflare does not reorganize its security architecture around a 2035 threat. The fact that both companies are acting as if Q-Day is an engineering problem with a fixed address, rather than a speculative risk, is the most consequential signal in this story — and the one least visible in a headline about quantum computers and Y2K.