PQC — Post-Quantum Cryptography

Countdown to

Q-Day

January 1, 2029 — Google estimate

000
Days
:
00
Hours
:
00
Minutes
:
00
Seconds

Sources: Google (2026) · NSA · SecurityWeek · GRI 2025

China's Origin Wukong-180: A 180-Qubit Quantum Leap and What It Means for Q-Day

China's Origin Quantum has launched its fourth-generation 180-qubit superconducting quantum computer — built entirely on domestic technology. Here's what it signals for the global Q-Day race.

Microsoft's Majorana 1: The Topological Qubit That Could Accelerate Q-Day

Microsoft's topological qubit architecture could dramatically reduce the physical qubit overhead needed to break RSA — and reshape the Q-Day timeline in the process.

Ethereum's Quantum Escape Plan: Protecting 100 Million Wallets from Q-Day

Ethereum's ECDSA signatures are vulnerable to quantum attacks. With 100 million active wallets at stake, the community is racing to design a post-quantum migration path — before it becomes urgent.

What is Q-Day and Why Should You Care?

Q-Day refers to the moment a quantum computer becomes powerful enough to break RSA encryption — the foundation of most internet security today. Here's what that means for you.

Post-Quantum Cryptography: The Race to Protect the Internet

NIST has finalized its first post-quantum encryption standards. But how quickly will the world actually adopt them — and is it fast enough?

Google's Willow Chip: A Milestone on the Road to Q-Day

Google's latest quantum processor raises the stakes. We break down what the Willow breakthrough actually means for the Q-Day timeline.

NIST Selects HQC: A Backup Shield Against Quantum Attacks

In March 2025, NIST chose HQC as a fifth post-quantum algorithm — a fallback built on entirely different mathematics, in case the primary standard ever falls.

Harvest Now, Decrypt Later: The Silent Attack Already Happening

State actors are already collecting your encrypted data today — planning to decrypt it once quantum computers arrive. This attack doesn't need Q-Day to begin.

Could a Quantum Computer Steal Your Bitcoin in 9 Minutes?

Google's quantum research puts a number on the threat: a capable quantum computer could derive a Bitcoin private key in roughly 9 minutes. Bitcoin's block time is 10.

NSA's CNSA 2.0: The Military's Deadline for a Quantum-Safe World

The NSA has set January 2027 as the first hard deadline for quantum-safe encryption across US national security systems. Here's what the full timeline looks like.

Why Q-Day Could Be Worse Than Y2K

Y2K cost $300 billion and was fixed in time. Q-Day threatens to break encryption across the entire internet — and unlike Y2K, the damage can be retroactive.

Cloudflare's 2029 Deadline: How the Internet Is Preparing for Q-Day

Cloudflare targets full post-quantum security by 2029. Here's what that migration actually looks like — and what it means for the rest of the internet.

Three Papers in Three Months: Why Q-Day May Now Be 2029, Not 2035

Between May 2025 and March 2026, three papers slashed the qubit estimate to break RSA by a factor of 20. Q-Day just got a lot closer.

Q-Day Timeline: The Complete History of Expert Predictions

How did the Q-Day timeline shift from "decades away" to 2029? A complete history of expert estimates from 2016 to 2026 — and what changed in each critical year.

Q-Day and Banking: How the Financial Sector Is Preparing for Quantum Risk

Banks, SWIFT, and central banks face acute exposure from Q-Day. Here's what major financial institutions are doing — and what is still at stake.

How to Prepare for Q-Day: A Practical Guide for Organizations

Six concrete steps every organization should take before Q-Day: cryptographic inventory, data classification, NIST standards, hybrid encryption, and supply chain assessment.

Q-Day Glossary: 25 Essential Terms Explained

From Shor's algorithm to ML-KEM and crypto-agility: 25 key terms from quantum computing and post-quantum cryptography, clearly defined.

What is Q-Day?

Q-Day is the predicted moment when a quantum computer becomes powerful enough to break RSA encryption — the system protecting most internet traffic, banking, and communications today. When it arrives, any data encrypted with current standards can be decrypted retroactively.

When will it happen?

Estimates vary: Google's internal security team targets 2029, NIST and the NSA are planning for 2030 as a critical migration deadline, and the Global Risk Institute puts a 50% probability on 2035. The timeline depends heavily on progress in qubit quality and error correction.

Am I already at risk?

"Harvest now, decrypt later" attacks are already happening — state actors are collecting encrypted data today to decrypt once a capable quantum computer exists. Sensitive data with long shelf-life (medical records, financial history, state secrets) is most at risk.

What is post-quantum cryptography?

Post-quantum cryptography (PQC) refers to cryptographic algorithms designed to be secure against quantum attacks. In 2024, NIST published the world's first PQC standards — CRYSTALS-Kyber and CRYSTALS-Dilithium — to replace vulnerable RSA and ECC encryption.

What can I do?

If you run critical infrastructure or handle sensitive long-lived data: begin a cryptographic inventory, follow NIST's migration guidance, and start transitioning to PQC-ready systems. Most major cloud providers are already offering PQC-compatible TLS options.

Will Bitcoin and crypto survive Q-Day?

Most cryptocurrencies use elliptic curve cryptography (ECC) for wallets — which is vulnerable to quantum attacks. Bitcoin's ECDSA signatures could be broken by a sufficiently large quantum computer. The crypto community is actively discussing post-quantum migration paths.

Has the timeline changed recently?

Yes — significantly. In May 2025, Google researcher Craig Gidney published a paper showing RSA-2048 could be broken with under one million qubits, down from his own 2019 estimate of 20 million. That's a 20× reduction in required resources. The AQTI's JVG algorithm (March 2026) claims even fewer qubits may be needed. These papers are why Google, Cloudflare and major governments have all moved their migration deadlines forward to 2029–2030.

Does Q-Day affect my passwords?

Not directly. Passwords are typically protected by hashing algorithms (bcrypt, Argon2, SHA-256) which are not broken by Shor's algorithm. The main threat is to public-key cryptography — RSA and ECC — which secures your connection to websites (HTTPS), your email, and your cryptocurrency wallets. Grover's algorithm could weaken symmetric encryption, but doubling key lengths (e.g. AES-256 instead of AES-128) provides sufficient protection.

What is "harvest now, decrypt later"?

It's an attack strategy where adversaries — typically nation-state intelligence agencies — intercept and store encrypted data today, even though they can't read it yet. Once a capable quantum computer exists, they retroactively decrypt everything they've collected. This means data you send today could be exposed in 2030. Medical records, diplomatic cables, and business communications with long-term sensitivity are most at risk.

2016
NIST
PQC Competition Launched
NIST calls for quantum-resistant cryptography submissions. 69 candidates enter from teams worldwide.
2019
Google
Sycamore — Quantum Supremacy
53-qubit chip solves a task in 200 s that would take a classical supercomputer ~10,000 years.
2021
IBM
Eagle — 127 Qubits
First chip to break the 100-qubit barrier. IBM announces a fault-tolerant QC target by 2029.
2021
Quantinuum
First Error-Corrected Logical Qubit
Fully error-corrected logical qubit demonstrated using the Steane code — a world first.
2022
Google
Surface Code Below Threshold
Proven: adding physical qubits to a logical qubit reduces errors. A foundational QEC milestone.
2022
NSA
CNSA 2.0 — Migrate by 2030
NSA orders U.S. national security systems to complete post-quantum migration by 2030.
2023
IBM
Condor — 1,121 Qubits
World's first 1,000+ qubit chip. Also ships Heron (133Q) with best-in-class gate fidelity.
2023
Harvard / QuEra
48 Logical Qubits
First logical quantum processor using neutral atoms — 48 logical qubits at 99.5% gate fidelity.
2023
Microsoft
Majorana Zero Modes Confirmed
Peer-reviewed evidence of Majorana modes — the building block of Microsoft's topological qubit.
2024
Google
Willow — Exponential Error Reduction
105 qubits. Each code distance step halves error rate. 5 min vs. 10²⁵ years classically.
2024
NIST
First PQC Standards Published
CRYSTALS-Kyber, Dilithium, SPHINCS+ — the world's first post-quantum cryptography standards.
Feb 2025
Microsoft
Majorana 1 — Topological Chip
8 topological qubits on a chip built for 1 million. A new state of matter applied to quantum computing.
2025
Google
Verifiable Quantum Advantage
First quantum result impossible to replicate classically — certified random bit generation on Willow.
2025
PsiQuantum
$1B Raise + Omega Processor
World's most-funded quantum startup ($7B valuation). Photonic chip targeting 1M+ qubits by 2028.
Projected
2026
IBM · Target
Kookaburra — 4,158 Qubits
Three 1,386-qubit chips linked via quantum communication — IBM's first large-scale multi-chip system.
2028
IonQ · Target
Cryptographically Relevant QC
A machine capable of running Shor's algorithm on RSA-2048 — requires ~4,000 logical qubits.
2029
Google · IBM · Target
Fault-Tolerant Computers
Both companies target 2029 for fully error-corrected, commercially useful quantum computers.
2030
NSA · Deadline
PQC Migration Deadline
All U.S. national security systems must have completed post-quantum cryptography migration.
2035
GRI · Estimate
Q-Day Probability Peak
Global Risk Institute's 50% probability estimate: a quantum computer capable of breaking RSA-2048.

scroll →

JP

We are already having the wrong conversation in cryptography if we argue about whether we have one, three, or five years before quantum computers will break today's security algorithms. We must always be ahead of the curve — especially in the era of 'Store now, decrypt later'.

Johann Polecsak Co-Founder & CTO — QANplatform
SP

In three to five years' time, we will have that moment where from a cryptographic standpoint we have to adapt to quantum, for sure.

Sundar Pichai CEO — Google · Bloomberg, Feb 2025
OW

Preparing for a post-quantum world will be a complex change programme that makes fixing the Millennium Bug look easy.

Ollie Whitehouse Chief Technology Officer — NCSC, UK National Cyber Security Centre
MM

The averaged expert estimate of the probability of a cryptographically relevant quantum computer emerging within the next 10 years is now between 28% and 49% — the highest in this report's history.

Michele Mosca Co-founder, evolutionQ — Professor, University of Waterloo · Quantum Threat Timeline Report 2025
TK

Q-Day could come as soon as 2025. The question is not if, but when — and most organisations are dangerously unprepared.

Tilo Kunz Executive VP — Quantum Defen5e · US Defense Information Systems Agency briefing
VB

Elliptic curves are going to die. There is about a 20% chance that quantum computers capable of breaking today's cryptography arrive before 2030 — and that is not a risk Ethereum can afford to ignore.

Vitalik Buterin Co-founder — Ethereum · Devconnect, Buenos Aires, Nov 2025
DG

It's a really serious threat, and I think the modern crypto community doesn't fully understand just how serious it is. My forecast is a matter of years — not decades.

Dmitry Gerasimov CEO — Demlabs · Founder, Cellframe Network · post-quantum blockchain infrastructure
PW

When a suitably powerful quantum computer becomes available, conventional digital signature schemes will be broken — and all existing ledgers will be susceptible to attack. I built QRL because this is not a theoretical problem.

Peter Waterland Founder & Lead Developer — Quantum Resistant Ledger (QRL)