{"id":16010,"date":"2026-03-27T00:36:39","date_gmt":"2026-03-27T00:36:39","guid":{"rendered":"https:\/\/newestek.com\/?p=16010"},"modified":"2026-03-27T00:36:39","modified_gmt":"2026-03-27T00:36:39","slug":"google-the-quantum-apocalypse-is-coming-sooner-than-we-thought","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=16010","title":{"rendered":"Google: The quantum apocalypse is coming sooner than we thought"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Google isn\u2019t just responsible for the encryption of a big chunk of the communications on the internet. It is also building its own quantum computers, so it\u2019s well placed to evaluate how close the technology is to fruition.<\/p>\n<p>Until now, the company has been aligned with <a href=\"https:\/\/www.csoonline.com\/article\/3604824\/nist-publishes-timeline-for-quantum-resistant-cryptography-but-enterprises-must-move-faster.html\" target=\"_blank\">the NIST timeline<\/a>, which specifies 2030 for deprecating quantum-unsafe algorithms and their full disallowance by 2035.<\/p>\n<p>But on Wednesday, <a href=\"https:\/\/blog.google\/innovation-and-ai\/technology\/safety-security\/cryptography-migration-timeline\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google said<\/a> that 2029 is now the deadline for the migration to post-quantum cryptography (PQC). It also said that it has adjusted its threat model to prioritize PQC migration for authentication services, and urged other engineering teams to follow suit.<\/p>\n<h2 class=\"wp-block-heading\" id=\"quantum-computers-increasingly-powerful\">Quantum computers increasingly powerful<\/h2>\n<p>Quantum computers are expected to break traditional asymmetric encryption, which is used to secure communications, financial transactions, and websites, once they get powerful enough.<\/p>\n<p>That time is coming, says Jordan Kenyon, chief scientist in the quantum practice at Booz Allen Hamilton. \u201cThe first version of Shor\u2019s [algorithm] was projected to require 20 million qubits [to break] and recent results have shrunk those requirements down to as a little as around 100,000 qubits.\u201d<\/p>\n<p>It\u2019s not just that the hardware is getting better, she tells CSO. There have also been advances in error correction and algorithms.<\/p>\n<p>\u201cThe magnitude of change is tough to deny,\u201d she says.<\/p>\n<p>In 2019, Google estimated that it would take 20 million qubits to break RSA encryption. By May of 2025, Google <a href=\"https:\/\/security.googleblog.com\/2025\/05\/tracking-cost-of-quantum-factori.html\" target=\"_blank\" rel=\"noreferrer noopener\">revised those estimates<\/a> down to 1 million. And last month, researchers at Australia\u2019s Iceberg Quantum said in a pre-print report that <a href=\"https:\/\/arxiv.org\/abs\/2602.11457\" target=\"_blank\" rel=\"noreferrer noopener\">only 100,000 physical qubits were needed<\/a>.<\/p>\n<p>Fortunately, NIST has already finalized four algorithms that should withstand quantum computing, and <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2025\/03\/nist-selects-hqc-fifth-algorithm-post-quantum-encryption\" target=\"_blank\" rel=\"noreferrer noopener\">has selected a fifth<\/a>. But unfortunately, according to the Post Quantum Cryptography Coalition, most PQC standards have <a href=\"https:\/\/pqcc.org\/learn-more\/state-of-the-migration\/\" target=\"_blank\" rel=\"noreferrer noopener\">not achieved broad adoption<\/a> yet.<\/p>\n<p>Worse yet, says the Trusted Computing Group, its research shows that <a href=\"https:\/\/trustedcomputinggroup.org\/91-of-businesses-do-not-have-a-roadmap-in-place-to-protect-against-quantum-threats-finds-new-industry-survey\/\">91% of businesses do not have a roadmap<\/a> in place. In addition, 80% say their current crypto libraries and hardware security modules are <a href=\"https:\/\/www.networkworld.com\/article\/4117438\/quantum-computing-is-getting-closer-but-quantum-proof-encryption-remains-elusive.html\">not ready for PQC integration<\/a>, and only 39% have begun their PQC compliance readiness assessments.<\/p>\n<h2 class=\"wp-block-heading\" id=\"csos-cant-afford-to-watch-and-wait\">CSOs can\u2019t afford to watch and wait<\/h2>\n<p>Google has upped the ante on PQC migration, Michela Menting, an analyst at ABI Research, tells CSO.<\/p>\n<p>That means that enterprises will also need to step up their transition plans, she says, \u201cto align earlier than what they might have originally thought was acceptable based on the NIST deprecation timelines \u2014 especially if they want to keep pace with hyperscalers.\u201d<\/p>\n<p>She expects Microsoft and AWS to set similar migration schedules, and CSOs will need to move their PQC transition plans up the priority list.<\/p>\n<p>\u201cIt\u2019s not a side project anymore, with an extended time frame that they can just get to whenever they have extra time to work on it,\u201d she says. \u201cThey really can\u2019t afford to watch and wait anymore.\u201d<\/p>\n<p>According to Google, some data is already being collected by attackers. <a href=\"https:\/\/blog.google\/innovation-and-ai\/technology\/safety-security\/the-quantum-era-is-coming-are-we-ready-to-secure-it\/\" target=\"_blank\" rel=\"noreferrer noopener\">In a post<\/a> last month, Kent Walker, president of global affairs at Google and Alphabet, wrote, \u201cMalicious actors are not waiting until a cryptographically relevant quantum computer is ready. They are likely already carrying out \u2018store now, decrypt later\u2019 attacks and collecting encrypted data, just waiting for the day when a quantum computer can unlock it.\u201d<\/p>\n<p>This means that enterprises need to up their game. <a href=\"https:\/\/www.gartner.com\/en\/documents\/7290130\" target=\"_blank\" rel=\"noreferrer noopener\">According to Gartner<\/a>, 61% of organizations lack full visibility into their cryptographic systems. The research firm recommends that companies conduct a comprehensive cryptographic inventory, invest in cryptographic agility and visibility, establish a cryptographic center of excellence, and prioritize PQC migration for assets with long-term sensitivity.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Google isn\u2019t just responsible for the encryption of a big chunk of the communications on the internet. It is also building its own quantum computers, so it\u2019s well placed to evaluate how close the technology is to fruition. Until now, the company has been aligned with the NIST timeline, which specifies 2030 for deprecating quantum-unsafe algorithms and their full disallowance by 2035. But on Wednesday,&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=16010\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16010","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/16010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16010"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/16010\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}