Google Moves Up ‘Q Day’ to 2029, Sounding Alarm on Quantum Threat to Encryption
Google now projects quantum computers could break standard encryption by 2029, four years earlier than previous estimates, urging urgent migration to post-quantum cryptography.

Google has issued its starkest warning yet: quantum computers could crack today’s encryption as soon as 2029—years ahead of previous forecasts. The tech giant’s new timeline for ‘Q Day’—the moment quantum machines can break widely used encryption—raises the stakes for banks, governments, and anyone relying on digital security.
Why does this matter? RSA and elliptic curve (EC) cryptography underpin trillions of dollars in global transactions and sensitive communications. If quantum computers reach the required scale, intercepted data—even if encrypted today—could be decrypted retroactively, exposing everything from financial records to state secrets.
From 2033 to 2029: The Quantum Clock Accelerates
Until now, most industry estimates pegged Q Day at 2033 or later. Google’s revised projection, reported by Ars Technica, moves that horizon up by at least four years. The company cites rapid progress in quantum hardware and error correction as key drivers behind the accelerated timeline.
“The threat is no longer theoretical or decades away,” Google’s security engineering team wrote. “We need to act with urgency.”
Encryption at Risk: RSA and EC in the Crosshairs
RSA and EC cryptography—deployed everywhere from HTTPS websites to payment systems—are especially vulnerable to quantum attacks. Shor’s algorithm, running on a sufficiently powerful quantum computer, could factor large numbers and break these schemes in hours or minutes.
For context: RSA-2048, considered secure against classical attacks, would be trivial for a quantum computer with a few thousand error-corrected qubits. That’s no longer a distant prospect. Google’s 2029 estimate reflects real-world advances in scaling quantum systems and reducing error rates.
Migration Headwinds: Complexity and Coordination
Shifting to post-quantum cryptography is not a simple patch. It’s a multi-year, global effort that touches every layer—hardware, firmware, software, and network protocols. Legacy systems, IoT devices, and critical infrastructure pose particular challenges, given their long lifecycles and patching difficulties.
“If you’re not already planning your migration, you’re late,” warns Google. The company is urging the tech industry to accelerate adoption of quantum-resistant algorithms, highlighting the risk that encrypted data stolen today could be decrypted in the future—a scenario known as ‘harvest now, decrypt later.’
NIST: The Race to Standardize Post-Quantum Algorithms
The U.S. National Institute of Standards and Technology (NIST) has been leading the charge since 2016, running a global competition to select and standardize post-quantum cryptographic algorithms. Final standards are expected by the end of 2024, but widespread deployment will take years.
- NIST’s process: Began in 2016, final standards due 2024
- Google’s Q Day estimate: 2029, up from 2033+
- Encryption at risk: RSA, EC—core to trillions in global commerce
Some tech giants, including Google and Microsoft, have already started integrating experimental post-quantum algorithms into their products. But the vast majority of the world’s digital infrastructure remains on legacy cryptography.
What to Watch: Countdown to Q Day
Google’s revised timeline should be a wake-up call for CISOs, policymakers, and anyone with a stake in digital trust. The migration to post-quantum cryptography is no longer an academic exercise—it’s a race against the clock, with global economic and security implications.
Expect to see accelerated investment in quantum-safe security, new compliance mandates, and a scramble to inventory and upgrade vulnerable systems. The window for a smooth transition is narrowing. If Google’s projections hold, the next five years will define the future of secure digital communication.
Bottom line: The quantum threat is arriving faster than expected. The industry’s response—or lack thereof—will shape the next era of cybersecurity.
TopWire is reader-supported.
Pro members get extended analysis and weekly deep-dives — and keep independent tech journalism running. $8/month.