What happened
Google announced a public 2029 target to migrate key systems to post-quantum cryptography (PQC). In its update, Google said it accelerated its timeline because of ongoing progress in quantum hardware, quantum error correction, and factoring research.
The company also called out the current “store now, decrypt later” risk model: attackers can steal encrypted data today and hold it until future quantum capabilities can break older crypto methods.
Why this matters
This is a practical signal for IT and security teams: if a company at Google’s scale is setting a hard migration date, smaller orgs should stop treating PQC as “future planning” and start treating it as roadmap work now.
Even if large-scale quantum break capability is not immediate, migration takes years (inventory, compatibility, certificate lifecycle, key management, testing, rollout).
How to check if you’re affected
You should treat this as relevant if your environment relies on long-lived encrypted data, digital signatures, or internet-facing authentication services.
Inventory where classical public-key crypto is still in use
- Identify systems using RSA/ECDSA/ECDH for TLS, certificates, signatures, firmware signing, code signing, VPNs, and identity systems.
Classify “decrypt-later” exposure
- Prioritize data that must remain confidential for many years (legal, health, IP, customer identity data).
- If long-retention encrypted traffic/logs exist, mark these as high-priority PQC transition candidates.
Check vendor/product PQC readiness
- Confirm whether key vendors (IDP, PKI, VPN, endpoint, cloud, HSM) have published PQC support timelines and migration guides.
Review authentication/signature dependencies
- Map systems that rely on digital signatures or auth token trust chains, since these are a critical part of migration sequencing.
Create a dated migration plan now
- Set internal milestones (inventory complete, pilot, staged rollout, deprecation of legacy algorithms) instead of waiting for emergency deadlines.
Immediate defensive actions
- Start a cryptographic asset inventory this quarter.
- Require PQC roadmap statements from strategic security vendors.
- Add a “quantum-readiness” checkpoint to architecture and procurement decisions.
- Prioritize migration planning for systems protecting long-lived sensitive data.
Sources
- https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/
- https://blog.google/innovation-and-ai/technology/safety-security/the-quantum-era-is-coming-are-we-ready-to-secure-it/
- https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
Bottom line
No one needs panic migration tomorrow — but waiting until quantum risk is “obviously urgent” is exactly what makes transition programs fail. 2026 is the right time to inventory, prioritize, and begin staged PQC adoption.
