Google Urgently Accelerates Quantum-Readiness Deadline to 2029, Warning the Entire Industry

Google is dramatically accelerating its timeline for preparing for the advent of "Q Day," the hypothetical moment when quantum computers will possess the capability to break current public-key cryptography algorithms. This shift represents a significant tightening of readiness deadlines, with implications for decades’ worth of sensitive data belonging to governments, militaries, financial institutions, and individuals worldwide. In a recent post, Google announced it is setting a new internal target of 2029 for full preparedness, a move that serves as a stark warning to the broader technology industry, urging a swifter transition to post-quantum cryptography (PQC) algorithms to safeguard against the impending obsolescence of current standards like RSA and elliptic curves.
The Impending Quantum Threat and Google’s Ambitious Timeline
The accelerated deadline underscores Google’s acknowledgment of the growing threat posed by quantum computing to the foundational security protocols that underpin the digital world. Current encryption methods, including RSA and elliptic curve cryptography (ECC), which have secured sensitive communications and transactions for decades, are vulnerable to the powerful computational capabilities of future quantum computers. Peter Shor’s groundbreaking work in the mid-1990s first illuminated this threat by demonstrating that a sufficiently powerful quantum computer could efficiently factor large numbers, the mathematical basis of RSA encryption. Subsequent research revealed similar vulnerabilities for ECC, which relies on the difficulty of solving the discrete logarithm problem.
In its official blog post, Google’s VP of Security Engineering, Heather Adkins, and Senior Cryptography Engineer, Sophie Schmieg, stated, "As a pioneer in both quantum and PQC, it’s our responsibility to lead by example and share an ambitious timeline. By doing this, we hope to provide the clarity and urgency needed to accelerate digital transitions not only for Google, but also across the industry." This sentiment highlights Google’s dual role as a developer of quantum technology and a major implementer of cryptographic security.
The company’s commitment extends to its flagship mobile operating system. In a separate announcement, Google detailed its plan to integrate PQC into Android, marking the first public discussion of such support for the platform. Starting with the beta version of Android 17, the operating system will incorporate ML-DSA, a digital signing algorithm standardized by the National Institute of Standards and Technology (NIST). This integration will be woven into Android’s hardware root of trust, empowering developers to utilize PQC keys for signing applications and verifying software integrity. Google has already integrated ML-DSA into the Android Verified Boot library, a critical component that safeguards the boot sequence from unauthorized modifications. Furthermore, Google engineers are actively working on migrating remote attestation functionalities to PQC. Remote attestation is a vital security feature that allows devices to cryptographically prove their current state to remote servers, ensuring that only secure operating system versions are running on corporate networks, for instance.

The Android Keystore will also receive ML-DSA support, enabling developers to generate and securely store PQC keys within the device’s hardware. This move is a significant step towards securing the entire Android ecosystem against quantum threats. The Play Store and the digital signatures of every application listed within it are also slated for migration to PQC, a move that will likely necessitate substantial adaptation and workload for Android developers.
The Shifting Quantum Computing Landscape and "Q Day" Estimates
The urgency behind Google’s accelerated timeline stems from a continuously evolving understanding of quantum computing’s progress and its potential impact. Historically, estimates for the arrival of a "cryptographically relevant quantum computer" (CRQC), capable of breaking current encryption, have been a subject of ongoing debate and frequent revision. In 2012, estimates suggested that a 2048-bit RSA key could be broken by a quantum computer with approximately one billion physical qubits. By 2019, this estimate had been significantly revised downward to around 20 million physical qubits. This constant downward revision has led to a long-standing joke among researchers: "Q Day" has always been perceived as being 10 to 20 years away.
However, recent research has further narrowed this perceived window. In June of the previous year, Google published research, led by Craig Gidney, that drastically lowered the expected threshold for breaking RSA. This study demonstrated that a 2048-bit RSA integer could be factored in less than a week using a quantum computer equipped with just one million "noisy qubits." Noisy qubits are inherently prone to errors due to environmental interference that disrupts their quantum state. This research, in particular, has fueled concerns about the imminent threat and the need for accelerated migration to quantum-resistant solutions.
Industry Reactions and the Path Forward with PQC
Google’s aggressive 2029 deadline has surprised many in the cryptography community, including those who have been actively involved in the PQC transition for years. Brian LaMacchia, a cryptography engineer who previously led Microsoft’s post-quantum transition and now advises Farcaster Consulting Group, commented on the accelerated timeline, noting, "That is certainly a significant acceleration/tightening of the public transition timelines we’ve seen to date, and is accelerated over even what we’ve seen the US government ask for. The 2029 timeline is an aggressive speedup but raises the question of what’s motivating them."
While Google has not publicly detailed the specific factors driving this revised threat model, the company’s emphasis on "store-now-decrypt-later" attacks is a critical concern. This threat involves adversaries collecting encrypted data today, with the intention of decrypting it in the future once sufficiently powerful quantum computers become available. This makes the migration of authentication services, which rely heavily on digital signatures, particularly time-sensitive.

The development of PQC algorithms has been a concerted effort within the cryptographic community. These new algorithms are designed to run on classical computers but are resistant to attacks from quantum computers. Two prominent approaches include lattice-based cryptography, which relies on the difficulty of solving mathematical problems related to lattices, and stateless hash-based digital signature schemes. NIST has been instrumental in advancing several PQC algorithms, with ML-DSA and ML-KEM (used in encryption) being among the leading candidates for standardization.
Government entities are also actively pushing for quantum readiness. In 2022, the National Security Agency (NSA) set a deadline of 2033 for PQC readiness in national security systems, with specific applications requiring readiness by 2030. More recently, executive orders from both the Biden and Trump administrations have prioritized quantum readiness, with the NSA currently adhering to a 2031 deadline.
The adoption of PQC is not entirely new; it has been gradually implemented in various products and protocols. Last year, the Signal messenger integrated ML-KEM-768, an implementation of the CRYSTALS-Kyber algorithm, into its encryption engine. Major technology companies like Google, Apple, and Cloudflare, along with numerous other software and service providers, have also begun incorporating PQC solutions into their offerings.
Google’s explicit recommendation for other engineering teams to follow suit underscores the industry-wide nature of this challenge. The transition to PQC represents a significant undertaking, requiring not only the development and standardization of new algorithms but also the widespread deployment and integration across diverse technological infrastructures. The stakes are exceptionally high, as a failure to adequately prepare for the quantum threat could result in a catastrophic breach of digital security, compromising sensitive information and undermining trust in digital systems globally. Google’s accelerated timeline serves as a critical call to action, urging a more rapid and concerted effort from all stakeholders to secure the future of digital communication and data integrity.







