Google Just Moved ‘Q‑Day’ Up—and the Part Everyone Gets Wrong Is That It Won’t Start With Bank Accounts
Google didn’t predict the year quantum breaks the internet—it set a 2029 deadline to finish migrating to post-quantum cryptography. The scarier first cracks may be forged signatures that fake trust, not stolen secrets.

Key Points
- 1Reframe 2029 as a migration deadline: Google is targeting completion of PQC rollout, not predicting the year quantum breaks encryption.
- 2Prioritize signatures first: Google’s updated threat model warns forged authentication could undermine updates, certificates, and trust chains before secrets decrypt.
- 3Track shrinking resource estimates: RSA‑2048 and ECDLP‑256 quantum cost projections dropped sharply, tightening planning timelines even without a near-term CRQC.
Google didn’t “move up Q‑Day.” Google moved up something more concrete: a deadline.
On March 25, 2026, Google published a corporate security post with a crisp line that ricocheted across the internet: “We’re setting a timeline for post-quantum cryptography migration to 2029.” The authors—Heather Adkins, Google’s VP of Security Engineering, and Sophie Schmieg, a Senior Staff Cryptography Engineer—weren’t predicting the exact year a quantum machine will crack the internet. They were doing something more operational: setting a target date to finish the work.
The nuance matters because panic is easy and planning is hard. “Q‑Day” headlines turn a sprawling technical transition into a single apocalyptic moment, usually framed as “banks” or “bitcoin” waking up one morning to find their locks picked. Google’s message was less cinematic and more unsettling: some of the most damaging failures won’t be about secrets getting revealed. They’ll be about trust getting faked.
“Google didn’t announce the end of encryption. It announced the end of procrastination.”
— — TheMurrow Editorial
What changed isn’t just Google’s calendar. It’s Google’s threat model—what it believes attackers will target first—and its willingness to say, out loud, that the migration clock should run faster than many organizations have assumed.
Google’s 2029 date is a migration deadline, not a prophecy
Google also tells readers why it accelerated the timeline. The post links the shift to three developments:
- Progress in quantum hardware development
- Progress in quantum error correction
- Updated quantum factoring resource estimates
That last point—resource estimates—often gets lost in mainstream coverage, yet it’s the most measurable driver. Resource estimates translate abstract quantum capability into questions operators can understand: How many qubits? How long does a computation take? How expensive is the attack?
Adkins and Schmieg don’t present 2029 as a cliff edge. They present it as a planning horizon. If an organization needs years to update protocols, rotate keys, re-issue certificates, upgrade hardware, and test interoperability, the right time to start is not “when quantum computers arrive.” It’s now—because the migration itself is the slow part.
“A deadline is not a doomsday forecast. It’s a recognition that migration takes longer than denial.”
— — TheMurrow Editorial
“Q‑Day” is a slippery term—and it obscures the first real failures
The problem with “one day” framing is that cryptographic risk doesn’t arrive as a singular event. It arrives as a series of asymmetries. Early quantum capability—scarce, expensive, and specialized—will be pointed at targets that produce maximum leverage.
Google’s March 2026 post makes a notable adjustment: it says its threat model now prioritizes authentication and digital signatures as an earlier focus area than confidentiality-only “store-now-decrypt-later” risks. That’s a subtle but profound shift in emphasis.
Why signatures change the stakes
- Software updates can be made to look legitimate.
- Signed documents can be forged with believable provenance.
- Long-lived certificates and trust chains can be compromised.
Encryption failures are often about delayed harm: adversaries can “store now, decrypt later.” Signature failures can be immediate and systemic: they undermine the mechanism societies use to decide what to trust.
External “countdowns” that assign a year—2029, 2030, 2035—mix government guidance, vendor roadmaps, and expert judgment. Those are scenarios, not settled dates. Google’s contribution is narrower and more actionable: it’s translating updated technical estimates into an internal timeline and nudging the broader ecosystem toward earlier migration.
The driver behind the alarm: resource estimates got much smaller
RSA‑2048: Google’s 2025 estimate dropped by a factor of 20
Google highlights how different that is from its earlier view. The post describes a 20‑fold decrease from a 2019 estimate of about 20 million physical qubits (under comparable physical assumptions).
That is one of the most consequential statistics in the current debate—not because it proves RSA will fall next year, but because it shifts planning math. When the rough order of magnitude moves, timelines move.
The operational twist: signature keys can be harder to replace
If early quantum compute is scarce, attackers will choose high-value keys. Google argues signature keys may be especially attractive targets “when quantum compute is scarce,” because one compromised signing key can unlock many downstream victims.
“Quantum risk won’t land where it’s loudest. It will land where one key buys a thousand compromises.”
— — TheMurrow Editorial
Elliptic curves and crypto wallets: Google’s 2026 ECDLP estimate raised eyebrows
In late March/early April 2026, Google Research published “Safeguarding cryptocurrency by disclosing quantum vulnerabilities responsibly,” summarizing a new whitepaper with updated quantum circuits for ECDLP‑256, the elliptic-curve discrete logarithm problem that underpins many elliptic-curve systems used in cryptocurrency and elsewhere.
Google states it compiled two circuits implementing Shor’s algorithm for ECDLP‑256:
- Under 1,200 logical qubits with about 90 million Toffoli gates
- Under 1,450 logical qubits with about 70 million Toffoli gates
Those numbers matter because they describe the “logical” workload—what you’d need on an ideal, error-corrected machine. The bridge to reality is physical qubits and error correction.
Google then offers a striking operational estimate: these circuits could run on a superconducting-qubit CRQC with under 500,000 physical qubits in a few minutes, under “standard assumptions” consistent with some of Google’s quantum processors. Google characterizes this as roughly a 20× reduction in required physical qubits versus prior work for this problem.
Multiple perspectives: what the estimate does—and doesn’t—prove
Still, planning decisions live downstream of estimates. Google is not saying “we can do this today.” Google is saying: under plausible assumptions, the resource bar for breaking widely used elliptic-curve systems looks lower than many prior estimates. That changes how seriously operators should treat signature migration in the near term—even if “near” still means years.
Why Google is prioritizing signatures over “store-now-decrypt-later”
That is a strategic choice. It reflects a view of attacker incentives and organizational friction.
The asymmetric payoff of forged trust
- Software distribution pipelines rely on signed packages.
- Operating systems rely on signed updates.
- Enterprises rely on signed identities and certificates.
An attacker who can forge a trusted signature doesn’t need to break into every target individually. The attacker can poison what targets voluntarily install, trust, and propagate.
The migration problem: signatures are sticky
- Embedded devices that can’t be easily updated
- Long-lived signed artifacts (documents, contracts, audit logs)
- Complex certificate hierarchies and cross-signed ecosystems
Google’s emphasis is a warning about operational inertia. Some of the most painful work isn’t “add a new cipher.” It’s “replace the trust anchor without breaking everything that depends on it.”
Key Insight
The real-world migration challenge: the internet doesn’t switch all at once
Google’s post sets a date because multi-year coordination is unavoidable. Migration includes:
- Inventorying where RSA and elliptic-curve algorithms are used
- Updating protocols and libraries to support PQC
- Re-issuing certificates and rotating keys
- Testing interoperability across vendors and legacy systems
Case study: signed software updates as a high-leverage target
That is why Google’s threat model shift matters to ordinary readers, not just security engineers. The issue isn’t “your encrypted messages from 2024 get read in 2032.” The issue is “a trusted update mechanism becomes a vector for mass compromise.”
Cryptocurrency provides another concrete example because its ownership mechanisms are often signature-based. Google’s ECDLP-256 post is explicit about why it disclosed the vulnerability work: to give ecosystems time to plan responsibly. Whether or not one believes a CRQC will exist by 2029, the planning horizon has shortened for systems that depend on elliptic-curve signatures and cannot easily change once deployed.
What readers and organizations should do with this information
Practical takeaways for security leaders
- Inventory: identify where RSA‑2048 and elliptic-curve cryptography appear in products, internal systems, and vendor dependencies.
- Prioritize signatures: map the signing keys that would be catastrophic if forged—software updates, CI/CD pipelines, certificate authorities, identity providers.
- Plan for long-lived artifacts: signed documents, audit logs, and firmware often outlive typical IT refresh cycles.
- Track standards and interoperability: PQC migration is as much about ecosystem compatibility as it is about picking an algorithm.
Low-regret actions to start now
- ✓Inventory RSA‑2048 and elliptic-curve usage across products, internal services, and vendors
- ✓Prioritize signing keys with high blast radius (updates, CI/CD, CA, identity)
- ✓Identify long-lived signed artifacts (documents, logs, firmware) that outlast refresh cycles
- ✓Track PQC standards, library support, and interoperability testing plans
Practical takeaways for everyone else
Google’s message, read carefully, is sober: the responsible move is to migrate before anyone can prove you waited too long.
The most interesting part of the 2029 line isn’t the year. It’s the implicit admission that cryptography is now a supply chain issue. When trust mechanisms fail, the harm spreads faster than any one organization can patch.
“Google didn’t ‘move up Q‑Day.’ Google moved up something more concrete: a deadline.”
— — TheMurrow Editorial
Frequently Asked Questions
Did Google say “Q‑Day” will happen in 2029?
No. Google said it is “setting a timeline for post-quantum cryptography migration to 2029,” in a March 25, 2026 post by Heather Adkins and Sophie Schmieg. That’s a migration target—when Google aims to transition its systems—not a firm prediction that a cryptographically relevant quantum computer will exist by that date.
What is “Q‑Day,” technically speaking?
Most coverage uses “Q‑Day” as shorthand for the point when a cryptographically relevant quantum computer can break widely deployed public-key cryptography, often RSA‑2048 or common elliptic-curve schemes, at practical cost and time. Google tends to avoid a single date and instead discusses resource estimates: qubits, gates, and runtime assumptions.
Why does Google now emphasize digital signatures over encryption?
Google’s March 2026 post says it adjusted its threat model to prioritize authentication / digital signatures earlier than confidentiality-only “store-now-decrypt-later” risks. Forged signatures can undermine software updates and trust chains immediately, while decryption risks often depend on whether someone harvested data years earlier and whether that data remains valuable.
What did Google say about breaking RSA‑2048 with quantum computers?
In a May 23, 2025 post, Google said a 2048-bit RSA key could theoretically be broken by a quantum computer with about 1 million noisy qubits running for about one week, under the paper’s assumptions. Google compared this to a 2019 estimate of about 20 million physical qubits, describing a 20× decrease.
What did Google say about breaking elliptic-curve cryptography (ECDLP‑256)?
In late March/early April 2026, Google Research summarized work compiling Shor’s algorithm circuits for ECDLP‑256 using under 1,200 logical qubits and ~90 million Toffoli gates, or under 1,450 logical qubits and ~70 million Toffoli gates. Google estimated the circuits could run with under 500,000 physical qubits in a few minutes under standard assumptions.
What’s the most sensible response to Google’s 2029 migration timeline?
Treat it as a serious planning signal, not a countdown clock. Organizations should inventory cryptographic dependencies, prioritize signature-related systems, and start staged migration planning toward post-quantum cryptography. Individuals should be skeptical of simplistic “quantum-proof” marketing and expect a multi-year transition period where reliability depends on careful engineering and compatibility testing.















