PQC — Cryptographie Post-Quantique

Compte à rebours vers

Q-Day

1er janvier 2029 — Estimation de Google

000
Jours
:
00
Heures
:
00
Minutes
:
00
Secondes

Quellen: Google (2026) · NSA · SecurityWeek · GRI 2025

Qu'est-ce que le Q-Day et pourquoi devriez-vous vous en préoccuper ?

Le Q-Day désigne le moment où un ordinateur quantique devient suffisamment puissant pour casser le chiffrement RSA — la base de la sécurité internet actuelle.

Cryptographie post-quantique : la course pour protéger Internet

Le NIST a finalisé ses premiers standards de chiffrement post-quantique. Mais à quelle vitesse le monde les adoptera-t-il — et est-ce suffisamment rapide ?

La puce Willow de Google : une étape vers le Q-Day

Le dernier processeur quantique de Google change la donne. Nous décryptons ce que la percée Willow signifie réellement pour le calendrier du Q-Day.

Le NIST sélectionne HQC : un bouclier de secours contre les attaques quantiques

En mars 2025, le NIST a choisi HQC comme cinquième algorithme post-quantique — un filet de sécurité basé sur des mathématiques entièrement différentes.

What is Q-Day?

Q-Day is the predicted moment when a quantum computer becomes powerful enough to break RSA encryption — the system protecting most internet traffic, banking, and communications today. When it arrives, any data encrypted with current standards can be decrypted retroactively.

When will it happen?

Estimates vary: Google's internal security team targets 2029, NIST and the NSA are planning for 2030 as a critical migration deadline, and the Global Risk Institute puts a 50% probability on 2035. The timeline depends heavily on progress in qubit quality and error correction.

Am I already at risk?

"Harvest now, decrypt later" attacks are already happening — state actors are collecting encrypted data today to decrypt once a capable quantum computer exists. Sensitive data with long shelf-life (medical records, financial history, state secrets) is most at risk.

What is post-quantum cryptography?

Post-quantum cryptography (PQC) refers to cryptographic algorithms designed to be secure against quantum attacks. In 2024, NIST published the world's first PQC standards — CRYSTALS-Kyber and CRYSTALS-Dilithium — to replace vulnerable RSA and ECC encryption.

What can I do?

If you run critical infrastructure or handle sensitive long-lived data: begin a cryptographic inventory, follow NIST's migration guidance, and start transitioning to PQC-ready systems. Most major cloud providers are already offering PQC-compatible TLS options.

Will Bitcoin and crypto survive Q-Day?

Most cryptocurrencies use elliptic curve cryptography (ECC) for wallets — which is vulnerable to quantum attacks. Bitcoin's ECDSA signatures could be broken by a sufficiently large quantum computer. The crypto community is actively discussing post-quantum migration paths.

2016
NIST
PQC Competition Launched
NIST calls for quantum-resistant cryptography submissions. 69 candidates enter from teams worldwide.
2019
Google
Sycamore — Quantum Supremacy
53-qubit chip solves a task in 200 s that would take a classical supercomputer ~10,000 years.
2021
IBM
Eagle — 127 Qubits
First chip to break the 100-qubit barrier. IBM announces a fault-tolerant QC target by 2029.
2021
Quantinuum
First Error-Corrected Logical Qubit
Fully error-corrected logical qubit demonstrated using the Steane code — a world first.
2022
Google
Surface Code Below Threshold
Proven: adding physical qubits to a logical qubit reduces errors. A foundational QEC milestone.
2022
NSA
CNSA 2.0 — Migrate by 2030
NSA orders U.S. national security systems to complete post-quantum migration by 2030.
2023
IBM
Condor — 1,121 Qubits
World's first 1,000+ qubit chip. Also ships Heron (133Q) with best-in-class gate fidelity.
2023
Harvard / QuEra
48 Logical Qubits
First logical quantum processor using neutral atoms — 48 logical qubits at 99.5% gate fidelity.
2023
Microsoft
Majorana Zero Modes Confirmed
Peer-reviewed evidence of Majorana modes — the building block of Microsoft's topological qubit.
2024
Google
Willow — Exponential Error Reduction
105 qubits. Each code distance step halves error rate. 5 min vs. 10²⁵ years classically.
2024
NIST
First PQC Standards Published
CRYSTALS-Kyber, Dilithium, SPHINCS+ — the world's first post-quantum cryptography standards.
Feb 2025
Microsoft
Majorana 1 — Topological Chip
8 topological qubits on a chip built for 1 million. A new state of matter applied to quantum computing.
2025
Google
Verifiable Quantum Advantage
First quantum result impossible to replicate classically — certified random bit generation on Willow.
2025
PsiQuantum
$1B Raise + Omega Processor
World's most-funded quantum startup ($7B valuation). Photonic chip targeting 1M+ qubits by 2028.
Projected
2026
IBM · Target
Kookaburra — 4,158 Qubits
Three 1,386-qubit chips linked via quantum communication — IBM's first large-scale multi-chip system.
2028
IonQ · Target
Cryptographically Relevant QC
A machine capable of running Shor's algorithm on RSA-2048 — requires ~4,000 logical qubits.
2029
Google · IBM · Target
Fault-Tolerant Computers
Both companies target 2029 for fully error-corrected, commercially useful quantum computers.
2030
NSA · Deadline
PQC Migration Deadline
All U.S. national security systems must have completed post-quantum cryptography migration.
2035
GRI · Estimate
Q-Day Probability Peak
Global Risk Institute's 50% probability estimate: a quantum computer capable of breaking RSA-2048.

défiler →

Johann Polecsak

We are already having the wrong conversation in cryptography if we argue about whether we have one, three, or five years before quantum computers will break today's security algorithms. We must always be ahead of the curve — especially in the era of 'Store now, decrypt later'.

Johann Polecsak Co-Founder & CTO — QANplatform
SP

In three to five years' time, we will have that moment where from a cryptographic standpoint we have to adapt to quantum, for sure.

Sundar Pichai CEO — Google · Bloomberg, Feb 2025
Ollie Whitehouse

Preparing for a post-quantum world will be a complex change programme that makes fixing the Millennium Bug look easy.

Ollie Whitehouse Chief Technologie Officer — NCSC, UK National Cyber Security Centre
MM

The averaged expert estimate of the probability of a cryptographically relevant quantum computer emerging within the next 10 years is now between 28% and 49% — the highest in this report's history.

Michele Mosca Co-founder, evolutionQ — Professor, University of Waterloo · Quantum Threat Timeline Report 2025
Tilo Kunz

Q-Day could come as soon as 2025. The question is not if, but when — and most organisations are dangerously unprepared.

Tilo Kunz Executive VP — Quantum Defen5e · US Defense Information Systems Agency briefing
VB

Elliptic curves are going to die. There is about a 20% chance that quantum computers capable of breaking today's cryptography arrive before 2030 — and that is not a risk Ethereum can afford to ignore.

Vitalik Buterin Co-founder — Ethereum · Devconnect, Buenos Aires, Nov 2025
Dmitry Gerasimov

It's a really serious threat, and I think the modern crypto community doesn't fully understand just how serious it is. My forecast is a matter of years — not decades.

Dmitry Gerasimov CEO — Demlabs · Founder, Cellframe Network · post-quantum blockchain infrastructure
Peter Waterland

When a suitably powerful quantum computer becomes available, conventional digital signature schemes will be broken — and all existing ledgers will be susceptible to attack. I built QRL because this is not a theoretical problem.

Peter Waterland Founder & Lead Developer — Quantum Resistant Ledger (QRL)