Quantum Threat Accelerates Cryptography Timelines

Quantum Threat Accelerates Cryptography Timelines

6 April 2026

What happened

A cryptography engineer, Filippo Valsorda, has revised his position on the urgency of quantum-resistant cryptography following new research. Google's paper dramatically reduced estimated logical qubits and gates required to break 256-bit elliptic curves, enabling attacks in minutes on fast-clock architectures. Separately, Oratomic demonstrated breaking 256-bit elliptic curves with 10,000 physical qubits using non-local connectivity. These developments, alongside expert warnings from Heather Adkins, Sophie Schmieg, and Scott Aaronson, establish an aggressive 2029 deadline for post-quantum cryptographic migration.

Why it matters

The accelerated timeline for cryptographically relevant quantum computers demands immediate post-quantum cryptography deployment. Security architects and platform engineers must now assume non-PQ key exchange is a potential active compromise, requiring user warnings. This necessitates shipping existing ML-DSA solutions, even if suboptimal, and abandoning hybrid authentication strategies. This prioritises rapid migration to pure ML-DSA-44 over protocol optimisation, compressing a previously anticipated 2035 completion to 2029.

AI generated content may differ from the original.

Published on 6 April 2026

Subscribe for Weekly Updates

Stay ahead with our weekly AI and tech briefings, delivered every Tuesday.

Quantum Threat Accelerates Cryptography Timelines