TheMurrow

Google Just Moved ‘Q‑Day’ Up—and the Part Everyone Gets Wrong Is That It Won’t Start With Bank Accounts

Google didn’t predict the year quantum breaks the internet—it set a 2029 deadline to finish migrating to post-quantum cryptography. The scarier first cracks may be forged signatures that fake trust, not stolen secrets.

By TheMurrow Editorial
April 16, 2026
Google Just Moved ‘Q‑Day’ Up—and the Part Everyone Gets Wrong Is That It Won’t Start With Bank Accounts

Key Points

  • 1Reframe 2029 as a migration deadline: Google is targeting completion of PQC rollout, not predicting the year quantum breaks encryption.
  • 2Prioritize signatures first: Google’s updated threat model warns forged authentication could undermine updates, certificates, and trust chains before secrets decrypt.
  • 3Track shrinking resource estimates: RSA‑2048 and ECDLP‑256 quantum cost projections dropped sharply, tightening planning timelines even without a near-term CRQC.

Google didn’t “move up Q‑Day.” Google moved up something more concrete: a deadline.

On March 25, 2026, Google published a corporate security post with a crisp line that ricocheted across the internet: “We’re setting a timeline for post-quantum cryptography migration to 2029.” The authors—Heather Adkins, Google’s VP of Security Engineering, and Sophie Schmieg, a Senior Staff Cryptography Engineer—weren’t predicting the exact year a quantum machine will crack the internet. They were doing something more operational: setting a target date to finish the work.

The nuance matters because panic is easy and planning is hard. “Q‑Day” headlines turn a sprawling technical transition into a single apocalyptic moment, usually framed as “banks” or “bitcoin” waking up one morning to find their locks picked. Google’s message was less cinematic and more unsettling: some of the most damaging failures won’t be about secrets getting revealed. They’ll be about trust getting faked.

“Google didn’t announce the end of encryption. It announced the end of procrastination.”

— TheMurrow Editorial

What changed isn’t just Google’s calendar. It’s Google’s threat model—what it believes attackers will target first—and its willingness to say, out loud, that the migration clock should run faster than many organizations have assumed.

Google’s 2029 date is a migration deadline, not a prophecy

Google’s March 25, 2026 post—titled “Quantum frontiers may be closer than they appear”—sets a “timeline for post-quantum cryptography migration to 2029.” That sentence is both specific and easy to misread. Google frames 2029 as the point by which it aims to have its systems transitioned to post-quantum cryptography (PQC), not as a guarantee that a cryptographically relevant quantum computer (CRQC) will exist by then.

Google also tells readers why it accelerated the timeline. The post links the shift to three developments:

- Progress in quantum hardware development
- Progress in quantum error correction
- Updated quantum factoring resource estimates

That last point—resource estimates—often gets lost in mainstream coverage, yet it’s the most measurable driver. Resource estimates translate abstract quantum capability into questions operators can understand: How many qubits? How long does a computation take? How expensive is the attack?

Adkins and Schmieg don’t present 2029 as a cliff edge. They present it as a planning horizon. If an organization needs years to update protocols, rotate keys, re-issue certificates, upgrade hardware, and test interoperability, the right time to start is not “when quantum computers arrive.” It’s now—because the migration itself is the slow part.

“A deadline is not a doomsday forecast. It’s a recognition that migration takes longer than denial.”

— TheMurrow Editorial

“Q‑Day” is a slippery term—and it obscures the first real failures

“Q‑Day” has become shorthand for the moment a CRQC can break widely deployed public-key cryptography—typically RSA‑2048 or common elliptic‑curve systems. The term is convenient for headlines and misleading for planning. Even Google tends to speak in the more precise language of “cryptographically relevant quantum computers” and the cost of particular attacks, rather than setting a single calendar date.

The problem with “one day” framing is that cryptographic risk doesn’t arrive as a singular event. It arrives as a series of asymmetries. Early quantum capability—scarce, expensive, and specialized—will be pointed at targets that produce maximum leverage.

Google’s March 2026 post makes a notable adjustment: it says its threat model now prioritizes authentication and digital signatures as an earlier focus area than confidentiality-only “store-now-decrypt-later” risks. That’s a subtle but profound shift in emphasis.

Why signatures change the stakes

Encryption protects secrecy; signatures protect identity and integrity. If attackers can forge signatures:

- Software updates can be made to look legitimate.
- Signed documents can be forged with believable provenance.
- Long-lived certificates and trust chains can be compromised.

Encryption failures are often about delayed harm: adversaries can “store now, decrypt later.” Signature failures can be immediate and systemic: they undermine the mechanism societies use to decide what to trust.

External “countdowns” that assign a year—2029, 2030, 2035—mix government guidance, vendor roadmaps, and expert judgment. Those are scenarios, not settled dates. Google’s contribution is narrower and more actionable: it’s translating updated technical estimates into an internal timeline and nudging the broader ecosystem toward earlier migration.

The driver behind the alarm: resource estimates got much smaller

If you want to understand why 2029 suddenly appears in a corporate security post, look less at science fiction and more at spreadsheets. The most important recent change isn’t a surprise breakthrough in quantum computing. It’s an evolving understanding of what it would take—under specific assumptions—to run Shor’s algorithm at scale against real-world cryptosystems.

RSA‑2048: Google’s 2025 estimate dropped by a factor of 20

On May 23, 2025, Google’s Online Security Blog published “Tracking the Cost of Quantum Factoring.” The headline detail is stark: under the paper’s assumptions, a quantum computer with about 1 million noisy qubits running for about one week could theoretically break a 2048‑bit RSA key.

Google highlights how different that is from its earlier view. The post describes a 20‑fold decrease from a 2019 estimate of about 20 million physical qubits (under comparable physical assumptions).

That is one of the most consequential statistics in the current debate—not because it proves RSA will fall next year, but because it shifts planning math. When the rough order of magnitude moves, timelines move.
20×
Google described a 20-fold drop from a 2019 estimate (~20 million physical qubits) to a 2025 estimate (~1 million noisy qubits) for theoretically breaking RSA‑2048 under stated assumptions.
~1,000,000
Google’s 2025 RSA‑2048 estimate: about 1 million noisy qubits running for about one week, under the paper’s assumptions.

The operational twist: signature keys can be harder to replace

The 2025 post also points to something security teams know in practice: signature keys can be harder to replace than encryption keys. Rotating a TLS certificate is a routine operation for many organizations. Replacing the signing infrastructure for firmware updates, package managers, or long-lived identity systems can be slower, riskier, and more brittle.

If early quantum compute is scarce, attackers will choose high-value keys. Google argues signature keys may be especially attractive targets “when quantum compute is scarce,” because one compromised signing key can unlock many downstream victims.

“Quantum risk won’t land where it’s loudest. It will land where one key buys a thousand compromises.”

— TheMurrow Editorial

Elliptic curves and crypto wallets: Google’s 2026 ECDLP estimate raised eyebrows

If RSA estimates moved the enterprise conversation, elliptic-curve estimates hit a different nerve: cryptocurrency and modern authentication.

In late March/early April 2026, Google Research published “Safeguarding cryptocurrency by disclosing quantum vulnerabilities responsibly,” summarizing a new whitepaper with updated quantum circuits for ECDLP‑256, the elliptic-curve discrete logarithm problem that underpins many elliptic-curve systems used in cryptocurrency and elsewhere.

Google states it compiled two circuits implementing Shor’s algorithm for ECDLP‑256:

- Under 1,200 logical qubits with about 90 million Toffoli gates
- Under 1,450 logical qubits with about 70 million Toffoli gates

Those numbers matter because they describe the “logical” workload—what you’d need on an ideal, error-corrected machine. The bridge to reality is physical qubits and error correction.

Google then offers a striking operational estimate: these circuits could run on a superconducting-qubit CRQC with under 500,000 physical qubits in a few minutes, under “standard assumptions” consistent with some of Google’s quantum processors. Google characterizes this as roughly a 20× reduction in required physical qubits versus prior work for this problem.
< 1,200
Google’s ECDLP‑256 estimate includes a Shor circuit under 1,200 logical qubits with about 90 million Toffoli gates.
< 500,000
Google estimated ECDLP‑256 circuits could run with under 500,000 physical qubits in a few minutes under standard assumptions, describing ~20× fewer physical qubits than prior work.

Multiple perspectives: what the estimate does—and doesn’t—prove

Skeptics will rightly emphasize what the research post itself implies: estimates depend on assumptions. “A few minutes” doesn’t mean “available next quarter.” Physical qubit counts don’t translate cleanly into deployable machines; engineering realities constrain coherence, connectivity, fabrication yields, and error-correction overhead.

Still, planning decisions live downstream of estimates. Google is not saying “we can do this today.” Google is saying: under plausible assumptions, the resource bar for breaking widely used elliptic-curve systems looks lower than many prior estimates. That changes how seriously operators should treat signature migration in the near term—even if “near” still means years.

Why Google is prioritizing signatures over “store-now-decrypt-later”

The default public framing of quantum risk is confidentiality: state actors harvesting encrypted traffic today so they can decrypt it later when quantum machines mature. That risk remains real for long-lived secrets. Google’s March 2026 post, however, says its threat model now prioritizes authentication / digital signatures as an earlier focus area.

That is a strategic choice. It reflects a view of attacker incentives and organizational friction.

The asymmetric payoff of forged trust

Forged signatures attack the scaffolding of modern computing:

- Software distribution pipelines rely on signed packages.
- Operating systems rely on signed updates.
- Enterprises rely on signed identities and certificates.

An attacker who can forge a trusted signature doesn’t need to break into every target individually. The attacker can poison what targets voluntarily install, trust, and propagate.

The migration problem: signatures are sticky

Even organizations that rotate encryption keys regularly often have “sticky” signature dependencies:

- Embedded devices that can’t be easily updated
- Long-lived signed artifacts (documents, contracts, audit logs)
- Complex certificate hierarchies and cross-signed ecosystems

Google’s emphasis is a warning about operational inertia. Some of the most painful work isn’t “add a new cipher.” It’s “replace the trust anchor without breaking everything that depends on it.”

Key Insight

Google’s most consequential shift isn’t the year “2029”—it’s the priority change: treat signature forgery as an early, high-leverage failure mode.

The real-world migration challenge: the internet doesn’t switch all at once

A 2029 target can sound aggressive until you look at how long crypto transitions have historically taken. Even without importing outside examples, the logic is self-evident: public-key cryptography is not a single component. It’s baked into browsers, mobile OSes, APIs, hardware security modules, certificate authorities, enterprise identity systems, and the “set it and forget it” firmware inside industrial equipment.

Google’s post sets a date because multi-year coordination is unavoidable. Migration includes:

- Inventorying where RSA and elliptic-curve algorithms are used
- Updating protocols and libraries to support PQC
- Re-issuing certificates and rotating keys
- Testing interoperability across vendors and legacy systems

Case study: signed software updates as a high-leverage target

Consider a software update channel. Many users never verify anything manually; they rely on the signature checks built into their operating system or app ecosystem. If a future attacker can forge those signatures, a malicious update can look indistinguishable from a legitimate one.

That is why Google’s threat model shift matters to ordinary readers, not just security engineers. The issue isn’t “your encrypted messages from 2024 get read in 2032.” The issue is “a trusted update mechanism becomes a vector for mass compromise.”

Cryptocurrency provides another concrete example because its ownership mechanisms are often signature-based. Google’s ECDLP-256 post is explicit about why it disclosed the vulnerability work: to give ecosystems time to plan responsibly. Whether or not one believes a CRQC will exist by 2029, the planning horizon has shortened for systems that depend on elliptic-curve signatures and cannot easily change once deployed.

What readers and organizations should do with this information

Google’s timeline is not a universal mandate, and it isn’t proof of imminent quantum collapse. It is, however, a credible signal from a company with deep cryptography and systems expertise that the migration window should be treated as tight.

Practical takeaways for security leaders

Start with actions that reduce regret even if timelines slip:

- Inventory: identify where RSA‑2048 and elliptic-curve cryptography appear in products, internal systems, and vendor dependencies.
- Prioritize signatures: map the signing keys that would be catastrophic if forged—software updates, CI/CD pipelines, certificate authorities, identity providers.
- Plan for long-lived artifacts: signed documents, audit logs, and firmware often outlive typical IT refresh cycles.
- Track standards and interoperability: PQC migration is as much about ecosystem compatibility as it is about picking an algorithm.

Low-regret actions to start now

  • Inventory RSA‑2048 and elliptic-curve usage across products, internal services, and vendors
  • Prioritize signing keys with high blast radius (updates, CI/CD, CA, identity)
  • Identify long-lived signed artifacts (documents, logs, firmware) that outlast refresh cycles
  • Track PQC standards, library support, and interoperability testing plans

Practical takeaways for everyone else

If you aren’t running a PKI or building firmware, quantum cryptography can feel abstract. The concrete implication is trust hygiene: the systems you depend on will undergo a slow cryptographic swap. Expect years of hybrid modes and transitional complexity, and be wary of vendors selling simplistic “quantum-proof” claims without clear migration details.

Google’s message, read carefully, is sober: the responsible move is to migrate before anyone can prove you waited too long.

The most interesting part of the 2029 line isn’t the year. It’s the implicit admission that cryptography is now a supply chain issue. When trust mechanisms fail, the harm spreads faster than any one organization can patch.

“Google didn’t ‘move up Q‑Day.’ Google moved up something more concrete: a deadline.”

— TheMurrow Editorial
T
About the Author
TheMurrow Editorial is a writer for TheMurrow covering technology.

Frequently Asked Questions

Did Google say “Q‑Day” will happen in 2029?

No. Google said it is “setting a timeline for post-quantum cryptography migration to 2029,” in a March 25, 2026 post by Heather Adkins and Sophie Schmieg. That’s a migration target—when Google aims to transition its systems—not a firm prediction that a cryptographically relevant quantum computer will exist by that date.

What is “Q‑Day,” technically speaking?

Most coverage uses “Q‑Day” as shorthand for the point when a cryptographically relevant quantum computer can break widely deployed public-key cryptography, often RSA‑2048 or common elliptic-curve schemes, at practical cost and time. Google tends to avoid a single date and instead discusses resource estimates: qubits, gates, and runtime assumptions.

Why does Google now emphasize digital signatures over encryption?

Google’s March 2026 post says it adjusted its threat model to prioritize authentication / digital signatures earlier than confidentiality-only “store-now-decrypt-later” risks. Forged signatures can undermine software updates and trust chains immediately, while decryption risks often depend on whether someone harvested data years earlier and whether that data remains valuable.

What did Google say about breaking RSA‑2048 with quantum computers?

In a May 23, 2025 post, Google said a 2048-bit RSA key could theoretically be broken by a quantum computer with about 1 million noisy qubits running for about one week, under the paper’s assumptions. Google compared this to a 2019 estimate of about 20 million physical qubits, describing a 20× decrease.

What did Google say about breaking elliptic-curve cryptography (ECDLP‑256)?

In late March/early April 2026, Google Research summarized work compiling Shor’s algorithm circuits for ECDLP‑256 using under 1,200 logical qubits and ~90 million Toffoli gates, or under 1,450 logical qubits and ~70 million Toffoli gates. Google estimated the circuits could run with under 500,000 physical qubits in a few minutes under standard assumptions.

What’s the most sensible response to Google’s 2029 migration timeline?

Treat it as a serious planning signal, not a countdown clock. Organizations should inventory cryptographic dependencies, prioritize signature-related systems, and start staged migration planning toward post-quantum cryptography. Individuals should be skeptical of simplistic “quantum-proof” marketing and expect a multi-year transition period where reliability depends on careful engineering and compatibility testing.

More in Technology

You Might Also Like