TheMurrow

Google Just Moved Up “Q‑Day.” The Part That Breaks First Isn’t Your Encryption—It’s the Digital Signatures Holding the Web Together.

Google didn’t announce a countdown—it narrowed a resource estimate. The bigger risk isn’t secrecy lost, but signature forgery that unravels web identity: certs, updates, attestations.

By TheMurrow Editorial
April 5, 2026
Google Just Moved Up “Q‑Day.” The Part That Breaks First Isn’t Your Encryption—It’s the Digital Signatures Holding the Web Together.

Key Points

  • 1Treat Google’s <500,000‑qubit ECC estimate as a complacency shock, not a deadline—migration lead times are the real constraint.
  • 2Prioritize post‑quantum signatures: forged certs, CT proofs, updates, and attestations cause active manipulation, not just passive decryption.
  • 3Plan for WebPKI bloat: PQ signatures (~2,420 bytes vs ~64) can multiply across chains, raising latency, cost, and fragility at scale.

The headlines made it sound like a date moved on the calendar. As if “Q‑Day” — the moment quantum computers can crack today’s cryptography — had been penciled in for 2039 and Google quietly circled 2032 in red.

That’s not how it works. “Q‑Day” isn’t a day at all, and no serious lab can promise a countdown. What did change, according to reporting on a recent Google Quantum AI resource estimate, is the perceived scale of the engineering problem — specifically, the number of physical qubits a quantum machine might need to break the elliptic‑curve cryptography (ECC) used by major cryptocurrencies.

<500,000
Forbes (March 31, 2026) reported a Google Quantum AI estimate that breaking the ECC protecting Bitcoin/Ethereum could require fewer than 500,000 physical qubits (superconducting architecture).

Forbes reported on March 31, 2026 that a Google Quantum AI whitepaper estimates breaking the ECC protecting Bitcoin and Ethereum could require fewer than 500,000 physical qubits on a superconducting architecture — about 20× lower than a commonly cited estimate referenced from 2023 in the same coverage. That’s not a working attack. It’s not a timeline. It is, however, a jolt to complacency.

The deeper jolt is what Google’s security teams have been saying in parallel: the first thing that breaks may not be encryption. It’s signatures. The internet’s trust system — certificates, logs, software updates, device attestations — rests on cryptographic signatures that a cryptographically relevant quantum computer could forge.

“The first serious post‑quantum failure won’t feel like secrecy lost. It will feel like reality unmoored: fake identities, fake updates, fake proof.”

— The Murrow (pullquote)

Q‑Day isn’t a date — it’s a capability

“Q‑Day” has become shorthand for the arrival of cryptographically relevant quantum computers (CRQCs): machines capable of running Shor’s algorithm at the scale needed to break widely deployed public‑key cryptography, especially RSA and ECC.

What Google “moved up” — and what it didn’t

The past week’s coverage stems from a more aggressive resource estimate attributed to Google Quantum AI. As summarized by Forbes (March 31, 2026), the claim is not “Google can break Bitcoin,” but rather: in principle, on a superconducting quantum architecture, the number of physical qubits needed to break the ECC that protects Bitcoin/Ethereum keys may be under 500,000roughly 20 times fewer than a commonly cited earlier estimate.

That resource estimate matters because it compresses the psychological distance. Yahoo’s tech syndication framed the shift as moving from “generational” to “engineering problem,” a narrative interpretation that captured the mood even if it was not a formal promise.
~20×
The reported shift: a Google-attributed resource estimate described as roughly twenty times fewer physical qubits than a commonly cited earlier estimate.

Why resource estimates move public perception

Quantum roadmaps hinge on error correction, qubit quality, and system architecture. When credible labs revise resource requirements downward, the public reads it as “sooner,” even when the underlying reality remains probabilistic and contingent.

For decision‑makers, the point isn’t predicting a year. The point is recognizing that migration timelines are long. Web trust infrastructure, certificate ecosystems, and software supply chains don’t refit themselves on short notice.

“The most dangerous misconception about Q‑Day is that you’ll recognize it when it arrives — like a storm on the horizon. Trust systems fail more quietly, and often more catastrophically.”

— The Murrow (pullquote)

Why the first crack is likely to appear in signatures, not encryption

A useful way to think about the post‑quantum transition: confidentiality has an escape hatch; authenticity does not.

Encryption used for key exchange in protocols like TLS can often migrate by swapping algorithms in new sessions. That’s already happening in parts of the web through hybrid approaches that combine classical methods with post‑quantum techniques for key establishment.

Digital signatures are different. Signatures don’t merely protect secrets in transit; they anchor identity and integrity over time.

What signatures protect in everyday infrastructure

Digital signatures underpin the objects the internet treats as “real”:

- TLS certificates that prove a website is who it claims to be
- Certificate Transparency (CT) log proofs that make certificate issuance auditable
- Software update signatures / code signing that validate updates
- Hardware attestation certificate chains that assert a device’s state or identity

A CRQC running Shor’s algorithm doesn’t just “decrypt old traffic.” It can forge signatures in schemes like ECDSA and RSA. Forgery turns security failures from passive exposure into active manipulation.

Google’s stance: authenticity and integrity are the hard problem

Google’s security messaging has been explicit about broadening the focus beyond confidentiality. The challenge is not only “harvest now, decrypt later.” It’s also “forge later, impersonate later.”

Google Cloud’s security communications emphasize that post‑quantum signature migration is essential to prevent future forgery and tampering, and highlight the importance for secure software updates in a post‑quantum world.

The pragmatic implication: when people ask, “What breaks first?” the more realistic answer is “the mechanisms that tell you what to trust.”

Key Insight

In a post‑quantum failure, the earliest systemic damage is likely integrity: forged certificates, forged updates, forged attestations—trust unravels before privacy does.

The standards exist now — NIST settled the first round in 2024

A few years ago, a common excuse for inaction was uncertainty: which post‑quantum algorithms would become the standards? That excuse has expired.

On August 13, 2024, NIST finalized the first three post‑quantum cryptography standards as FIPS publications:

- FIPS 203: ML‑KEM (Kyber) — key establishment/encryption
- FIPS 204: ML‑DSA (Dilithium) — digital signatures
- FIPS 205: SLH‑DSA (SPHINCS+) — digital signatures

Those names can look forbidding, but the editorial meaning is simple: the “waiting for standards” phase is over for initial deployment.

What changed after August 2024

Standardization didn’t magically upgrade the internet. It did change procurement, compliance, and product planning. Organizations that need FIPS‑recognized primitives can now point to finalized standards rather than drafts.

It also shifted debate to the real friction point: deployability. Post‑quantum cryptography is not only a mathematical change. It changes payload sizes, handshake shapes, certificate formats, and operational systems — especially in the WebPKI.

Multiple perspectives: standards vs. ecosystems

Some engineers see NIST’s 2024 finalization as a green light: start rolling out post‑quantum algorithms wherever possible. Others treat it as the start of a longer hardening cycle — adoption, implementation reviews, interoperability, performance tuning, and careful rollout.

Both are right in different layers. The bottleneck is rarely the algorithm. It’s the environment the algorithm must survive in.

“NIST didn’t hand the internet a finished migration. It handed the internet a starting pistol.”

— The Murrow (pullquote)

The WebPKI bottleneck: signatures get big, fast

The web’s trust fabric — the WebPKI, the certificate authority ecosystem behind HTTPS — is where post‑quantum signatures collide with physical reality: packet sizes, latency budgets, mobile constraints, and operational complexity.

Certificate bloat is not a theoretical annoyance

Classical web signatures are compact. Post‑quantum signatures often are not.

Cloudflare’s published reporting highlights the scale change: a post‑quantum signature can be about 2,420 bytes, compared with about 64 bytes for current signature algorithms in their overview materials. That is not a subtle difference; it’s a different order of magnitude.

Now place those signatures inside what TLS often sends: a certificate chain plus CT‑related material. Cloudflare notes that today’s WebPKI/CT system can involve up to five signatures and two public keys per handshake.

Do the arithmetic: a web handshake that once carried small signature artifacts can swell into kilobytes — multiplied across billions of connections.
2,420 bytes
Cloudflare’s cited example size for a post‑quantum signature, versus about 64 bytes for current signature algorithms.
Up to 5
Cloudflare notes WebPKI/CT can involve up to five signatures (and two public keys) per TLS handshake.

The practical consequences: latency, cost, fragility

At web scale, extra bytes become:

- Latency, especially on high‑loss networks and mobile radios
- Bandwidth and CDN cost, multiplied by repeated handshakes
- Operational brittleness, as systems hit size limits or timeout behavior
- Log growth and verification overhead for transparency systems

Cloudflare has also argued that broad trust of post‑quantum certificates is unlikely before 2027, reflecting ecosystem pace rather than algorithm readiness.

The tension is straightforward: post‑quantum signatures are needed for long‑lived trust, yet their size makes them hard to deploy in the web’s most performance‑sensitive path.

Case study: crypto fear grabs headlines, but the web’s trust chain is the bigger target

Google’s revised resource estimate drew attention because Bitcoin and Ethereum are culturally legible. People understand “a quantum computer might break crypto.” That story travels.

The less clickable story is the one that keeps security teams up at night: signature forgery in the systems everyone relies on even if they never touch a blockchain.

What a forged signature enables

With Shor‑capable quantum machinery, the attacker’s dream is not reading your old messages. It’s signing new ones as if they were legitimate:

- A forged certificate chain could enable site impersonation.
- A forged code‑signing key could push a malicious software update that looks authentic.
- A forged attestation chain could make compromised hardware appear clean.
- Forged CT‑related artifacts could undermine the auditability that helps keep the PKI honest.

Google’s security framing — emphasizing authentication and integrity alongside confidentiality — reflects a sober assessment of where systemic harm scales fastest.

Why “harvest now, decrypt later” still matters — but isn’t the only risk

Confidentiality threats remain real: intercepted encrypted traffic might be stored and decrypted later if key exchange is not quantum‑safe. Yet many encryption contexts are session‑based; systems can migrate by updating handshakes and negotiating new parameters.

Trust artifacts are not so forgiving. A signature on a software release, a firmware image, or a certificate chain can sit in the wild long after issuance. If the signing method becomes forgeable, old trust can be retroactively poisoned.

What organizations should do now: prioritize signature migration where trust must persist

Most readers don’t run a browser PKI. Many do run systems that depend on long‑lived signatures: internal certificate hierarchies, update pipelines, device fleets, regulated archives, and third‑party dependencies.

The actionable takeaway is not panic; it’s sequencing.

Practical takeaways: where to start

Focus on where a forged signature would produce irreversible harm:

- Software update and code‑signing pipelines
Inventory what keys sign what artifacts, where they live, and how they rotate.
- Certificate authorities and internal PKI
Track certificate lifetimes, chain complexity, and CT requirements where applicable.
- Hardware identity and attestation
Map which certificates assert device identity or state and how long relying parties trust them.
- Long‑term validation requirements
Identify documents, signatures, or audit records that must remain verifiable for years.

Then align with standardized primitives. NIST’s ML‑DSA and SLH‑DSA exist specifically for signatures; ML‑KEM exists for key establishment. The engineering work lies in implementation, interoperability, and performance — but the cryptographic direction is no longer guesswork.

Start Here: Signature-First PQ Readiness

  • Inventory code-signing keys and rotation paths
  • Map internal PKI certificate lifetimes and chain complexity
  • Identify hardware attestation chains and relying-party trust windows
  • Flag long-term validation artifacts that must verify for years
  • Align pilots to NIST ML-DSA/SLH-DSA (signatures) and ML-KEM (key establishment)

Multiple perspectives: “move fast” vs. “don’t break the web”

Some security leaders argue for rapid adoption wherever feasible, particularly in internal systems where performance budgets can be managed. Others point out that premature, fragmented deployment creates operational risk and compatibility failures.

A mature posture splits the difference: pilot aggressively, deploy deliberately. Build PQ readiness into procurement and roadmaps now, so migration doesn’t begin when external pressure becomes unbearable.

Sequencing Beats Panic

Prioritize long-lived authenticity first (updates, cert chains, attestations), because forged signatures create irreversible trust failures—even if confidentiality can be upgraded session-by-session.

The uncomfortable timeline truth: the switch will be slow, and that’s the danger

The public likes clean arcs: discovery, invention, disruption. Cryptography migrations are long, messy, and full of partial measures.

Google’s reported estimate — <500,000 physical qubits to break ECC, ~20× lower than a prior commonly cited estimate — does not provide a deadline. It does, however, shrink the margin of error planners believed they had.

What “slow migration” means in real systems

Web trust depends on many moving parts: browsers, certificate authorities, CT logs, servers, clients, middleboxes, embedded devices, and compliance regimes. Even small changes can take years to propagate.

Now layer in the bloat problem. If post‑quantum certificates add kilobytes and multiply across chains — Cloudflare’s figures (~2,420 bytes versus ~64 bytes, and potentially up to five signatures and two public keys per handshake) — then engineering teams must reduce size, manage handshake complexity, and avoid regressions that users experience as “the web got slower.”

The risk is not that everyone waits until the last second. The risk is that everyone starts late because the work is unpleasant, and because the threat feels abstract until it is not.

The Murrow view: treat signatures as critical infrastructure

Post‑quantum readiness is often framed as a future‑proofing exercise. A better framing: it is maintenance for the internet’s identity system. When identity fails, everything built on top — finance, governance, communication, commerce — inherits that uncertainty.

If Q‑Day arrives as capability rather than ceremony, signature systems are where the tremors will register first.
T
About the Author
TheMurrow Editorial is a writer for TheMurrow covering technology.

Frequently Asked Questions

What is “Q‑Day,” exactly?

“Q‑Day” is shorthand for the arrival of cryptographically relevant quantum computers (CRQCs) able to break widely used public‑key cryptography like RSA and ECC using Shor’s algorithm. It is not a single official date. It’s a capability threshold that depends on quantum hardware scale, error correction, and engineering progress.

Did Google say it can break Bitcoin now?

No. Reporting (Forbes, March 31, 2026) described a Google Quantum AI resource estimate suggesting breaking the ECC used by Bitcoin/Ethereum might require fewer than 500,000 physical qubits on a superconducting architecture. That’s an estimate about required resources, not a claim of a working attack or a declared timeline.

Why are digital signatures a bigger early problem than encryption?

Encryption failures often relate to confidentiality, and many systems can upgrade key exchange in new sessions. Digital signatures underpin long‑lived trust: certificates, CT proofs, software updates, and hardware attestations. A quantum adversary could forge classical signatures (RSA/ECDSA), enabling impersonation and malicious updates — an integrity crisis, not just a privacy one.

Are post‑quantum standards finalized yet?

Yes. NIST finalized the first three PQC standards on August 13, 2024: FIPS 203 (ML‑KEM) for key establishment, and FIPS 204 (ML‑DSA) plus FIPS 205 (SLH‑DSA) for digital signatures. The standards hurdle is largely cleared for initial deployments; ecosystem rollout remains challenging.

Why is upgrading the web’s certificate system so hard?

Post‑quantum signatures are much larger than classical ones. Cloudflare’s reporting cites about 2,420 bytes for a post‑quantum signature compared with about 64 bytes for current signature algorithms, and notes that WebPKI/CT can involve up to five signatures and two public keys per handshake. Those size increases strain latency, bandwidth, and operational limits at web scale.

When will post‑quantum certificates be widely trusted by browsers?

There’s no single agreed date, but Cloudflare has suggested broad trust of post‑quantum certificates is unlikely before 2027. That reflects ecosystem coordination and deployability constraints more than a lack of algorithms. Expect incremental steps and hybrid approaches rather than a sudden global switchover.

More in Technology

You Might Also Like