Industry
Cloudflare sits at a unique vantage point on the internet. Its network handles traffic for millions of websites and applications — which means when Cloudflare migrates to post-quantum cryptography, a significant fraction of the internet migrates with it. In 2024, the company published a detailed post-quantum roadmap with a clear target: full post-quantum security across its entire network by 2029.
Cloudflare's migration is not theoretical. The company has been deploying post-quantum TLS (Transport Layer Security) in production since 2022, initially as an opt-in beta and progressively rolling it out to all traffic. By 2024, post-quantum key exchange using CRYSTALS-Kyber was active on a substantial share of Cloudflare's connections.
The approach is hybrid cryptography: combining classical ECDH key exchange with post-quantum Kyber simultaneously. If either algorithm holds, the connection is secure. This allows a gradual transition — post-quantum protection without risking compatibility breakage on older clients.
Why 2029? Cloudflare's deadline is calibrated against the most aggressive expert Q-Day forecasts. Google's internal security team has pointed to 2029 as a plausible target for a cryptographically relevant quantum computer. Cloudflare wants its migration complete before the earliest credible threat window opens.
TLS is only one layer of cryptography in a modern internet infrastructure. Cloudflare's roadmap covers not just HTTPS connections, but also internal service-to-service communication, certificate issuance and validation, API authentication, DNS security (DNSSEC), and email signing. Each of these systems relies on different cryptographic primitives, each of which must be independently migrated.
This illustrates the broader challenge facing any large organisation: cryptography is everywhere, often invisible, frequently hardcoded. A full cryptographic inventory — mapping every system and library that uses encryption — is a prerequisite that many organisations haven't completed.
Cloudflare is not alone. Google has been deploying post-quantum TLS in Chrome and its own infrastructure since 2016. Apple added post-quantum protection to iMessage with its PQ3 protocol in 2024. Signal updated its messaging protocol with post-quantum key exchange the same year.
The pattern across these organisations is consistent: hybrid deployments first, full migration later. The 2026–2029 window is when most major infrastructure providers plan to complete their transitions — putting enormous pressure on organisations that haven't started their own migrations to catch up.
If your website runs behind Cloudflare, your HTTPS connections will be post-quantum secure by 2029 — without any action required. But that only protects data in transit. Data at rest, application-layer authentication, stored credentials, and any cryptography implemented directly in your application code remains your responsibility to migrate.
The infrastructure layer is becoming quantum-safe. The application layer is falling behind.