Google Warns 'Q-Day' Could Arrive by 2029 as Quantum Computers Threaten to Crack Global Encryption
The tech giant moved its internal post-quantum cryptography deadline six years ahead of the federal government's, warning that 'store now, decrypt later' attacks may already be underway.
Google has issued an urgent warning that quantum computers capable of breaking today's widely used encryption systems could emerge as early as 2029 — six years ahead of the federal government's own transition deadline — and that businesses and governments that wait to upgrade their cryptographic systems face catastrophic data security risks. The announcement, made by Google security executives Heather Adkins and Sophie Schmieg, reflects what the company described as "faster than expected advances in several quantum fields" and represents the technology industry's most explicit and high-profile warning yet that the so-called "Q-Day" — when quantum computers become cryptographically dangerous — is approaching far sooner than most had assumed.
The core concern centers on the vulnerability of RSA encryption, which underpins the vast majority of internet security, financial transactions, government communications, and corporate data protection worldwide. RSA's security relies on the computational difficulty of factoring very large numbers — a problem classical computers take an astronomical amount of time to solve but that quantum computers, using Shor's algorithm, could theoretically solve exponentially faster. Until recently, most estimates suggested that cracking RSA encryption would require quantum computers with at least 20 million error-corrected qubits — a machine far beyond current capabilities. Researchers at Iceberg Quantum and other institutions have now found that the required qubit count may fall to approximately 100,000 with recent advances in error correction and algorithm efficiency, representing a 200-fold reduction that dramatically compresses the timeline to a credible threat.
Google's internal deadline of 2029 represents a striking departure from federal guidance. The National Institute of Standards and Technology, which has been standardizing post-quantum cryptographic algorithms since 2022, set a 2035 deadline for federal agencies to complete their transitions. By moving its own internal deadline six years earlier, Google is sending a market signal that the industry should treat the federal deadline as an absolute floor, not a benchmark to aspire toward. The company has called on all businesses — particularly those handling sensitive financial, health, or government data — to begin migration now rather than waiting for regulatory mandates. Google's Chrome browser and internal services have already begun implementing NIST-approved post-quantum algorithms.
One particularly alarming risk that Google's executives highlighted is what cybersecurity professionals call "store now, decrypt later" attacks. In these scenarios — which security firms believe may already be actively underway — adversaries harvest and store vast quantities of encrypted data today, even data they cannot currently decrypt, with the intention of decrypting it once sufficiently powerful quantum computers become available. This means that data encrypted today with state-of-the-art classical methods could be vulnerable to future quantum decryption if organizations do not transition to quantum-resistant algorithms quickly. Intelligence agencies, financial institutions, and healthcare systems are considered particularly high-risk targets given the long-term value of their data.
The warning comes as Chinese laboratories have demonstrated breakthroughs across multiple quantum computing fields, including error correction and quantum factoring, raising concerns in U.S. intelligence circles that the timeline to cryptographically relevant quantum computers may be even shorter for state-sponsored programs than commercial projections suggest. Governments including the United States, United Kingdom, France, Germany, and the Netherlands have all published national strategies urging accelerated post-quantum transitions. Google's announcement effectively transforms what had been a theoretical long-term threat into an operational planning imperative, with the implication that any company still relying on RSA encryption in 2029 could find its historical data exposed. The post-quantum cryptography market is now expected to expand rapidly through the rest of the decade as enterprises race to implement NIST-approved algorithms before Q-Day arrives.
Originally reported by CyberScoop.