Blog
Google Just Moved the Deadline. Is Your Infrastructure Ready?

Three years ago, the post-quantum conversation was dominated by a single question: which algorithms?
NIST answered that in August 2024 when it finalized the first post-quantum cryptography standards, FIPS 203, FIPS 204, and FIPS 205. The math is settled.
Now Google has answered the next question, how fast?, and the answer should make every CISO, CTO, and infrastructure leader uncomfortable.
The 2029 Line in the Sand
Last week, Google announced it is targeting 2029 for full-scale migration to post-quantum cryptography across its systems. Not as an aspiration. As a deadline.
That timeline reflects something important: Google isn't just a cloud provider making recommendations from the sidelines. It builds quantum computers. It operates one of the largest digital infrastructures on the planet. When Google shortens its own migration window, it's telling you something about what it sees on the horizon.
As Google's VP of Security Engineering Heather Adkins and Senior Staff Cryptography Engineer Sophie Schmieg wrote: the timeline reflects accelerating progress in quantum hardware development, quantum error correction, and quantum factoring resource estimates. Those developments compressed what many assumed was a comfortable runway.
To put the pace of change in perspective: in 2019, Google estimated it would take 20 million qubits to break RSA encryption. By May 2025, that estimate had dropped to 1 million. And in early 2026, researchers at Australia's Iceberg Quantum suggested only 100,000 physical qubits might be needed.
2029 is three years away.
The Real Shift: From Encryption to Identity
What's most significant about Google's announcement isn't the timeline itself, it's where Google is pointing its urgency.
The conventional post-quantum narrative has focused on data encryption, protecting information in transit and at rest. Google is now placing greater emphasis on something more foundational: digital signatures.
Digital signatures are the cryptographic backbone of identity and trust. They verify who sent a message, whether software is legitimate, and whether a certificate can be trusted. If an attacker can forge a digital signature, they don't need to decrypt your data. They can impersonate your systems, distribute malicious updates, and compromise authentication at scale.
Unlike encrypted data, where the "harvest now, decrypt later" threat gives organizations some buffer, signatures must be quantum-resistant before a cryptographically relevant quantum computer (CRQC) exists. There is no retroactive fix. Once a signature scheme is broken, every system that relied on it is compromised in real time.
Google's decision to prioritize authentication migration, and to ship ML-DSA digital signature protection in Android 17, reflects this shift. It's a signal that the industry's center of gravity is moving from "protect the data" to "protect the trust layer."
Three Years Is Not What It Sounds Like
For most organizations, three years sounds manageable. In practice, it isn't.
Post-quantum migration is not a software update. It requires discovering every cryptographic dependency in your environment; certificates, key exchanges, TLS configurations, embedded libraries, legacy integrations. Most organizations have never conducted a comprehensive cryptographic inventory.
The data tells the story:
91% of security professionals across the U.S. and Europe have no formal PQC roadmap in place, according to the Trusted Computing Group's State of PQC Readiness report (surveying 1,500 cybersecurity professionals, December 2025).
81% of those same professionals believe their current crypto libraries and hardware security modules are not ready for PQC integration (TCG, 2025).
Only 30% of organizations with $250M+ in revenue have conducted a full cryptographic inventory of their applications, data, and services, according to an IBM and Cloud Security Alliance survey of 750 executives (October 2025).
Then comes the operational work: selecting algorithms, testing interoperability, updating hardware that may not support new key sizes, retraining teams, and coordinating with vendors and partners across supply chains.
The U.S. government estimated that migrating prioritized federal systems alone will cost approximately $7.1 billion over a decade. For enterprises with global operations, legacy infrastructure, and complex vendor ecosystems, the challenge is no less significant.
Three years to complete a migration is ambitious. Three years to begin a migration and still finish in time? That's the real math most organizations should be doing.
The Quantum Debt Problem
At QVH, we've been talking about this operational gap for a while. We call it Quantum Debt, the accumulated weight of cryptographic decisions that were never tracked, documented, or designed for change.
Every forgotten certificate. Every hardcoded key exchange. Every TLS configuration that lives in a system no one wants to touch. That's Quantum Debt. And every organization is carrying more of it than they think.
Google's announcement doesn't change the physics. A cryptographically relevant quantum computer may arrive in 2029, or 2032, or 2035. As Google itself clarified, the 2029 target doesn't assume a CRQC will exist by then, it reflects what the company describes as a prudent approach to risk management in the face of uncertain but advancing capabilities.
What the announcement does change is the operational calculus. The largest technology company on the planet just told the industry that waiting is no longer a defensible strategy.
The question isn't whether you agree with the 2029 timeline. It's whether your organization can answer a much simpler question: Where is your cryptography right now?
What Comes Next
Google has set a marker. NIST has provided the standards. The EU is targeting 2030 for high-risk system migration and 2035 for full transition. The UK's NCSC has published a three-phase roadmap with complete adoption by 2035. Canada requires departments to submit migration plans by 2026. The theoretical phase of post-quantum readiness is over.
What remains is the work, the unglamorous, operational, deeply infrastructure-level work of inventorying, auditing, and transitioning real systems to post-quantum standards.
That's the work QVH was built for. Not the algorithm debate. The infrastructure reality.
The organizations that lead the next era of digital trust won't be the ones who waited for certainty. They'll be the ones who started before the deadline made them.
Sources
Google Security Blog, "Setting a timeline for post-quantum cryptography migration to 2029," March 25, 2026 - blog.google
NIST, "NIST Releases First 3 Finalized Post-Quantum Encryption Standards," August 13, 2024 - nist.gov
Trusted Computing Group, "State of PQC Readiness Report" (1,500 cybersecurity professionals surveyed), December 2025 - trustedcomputinggroup.org
IBM & Cloud Security Alliance, survey of 750 executives on cryptographic readiness, October 2025 - cited via Network World
The Quantum Insider, "Google Shortens Timeline for Quantum-Safe Encryption Transition," March 25, 2026 - thequantuminsider.com
CSO Online, "Google: The quantum apocalypse is coming sooner than we thought," March 2026 - csoonline.com
Help Net Security, "Google races to secure encryption before quantum threats arrive," March 26, 2026 - helpnetsecurity.com
European Commission, "Coordinated Implementation Roadmap for PQC Transition" - digital-strategy.ec.europa.eu
PQShield, "PQC Roadmaps and Transition Guidance" (aggregating UK NCSC, EU, and Canadian government timelines) - pqshield.com
CybelAngel, "Quantum-Safe Cybersecurity: Essential CISO 2025 Guide" (citing U.S. OMB $7.1B federal migration estimate) - cybelangel.com
Forward Looking Statement
This article contains forward-looking information within the meaning of applicable Canadian securities laws, including statements regarding the development of post quantum security infrastructure, anticipated industry migration toward post quantum cryptography, and the potential impact of evolving computational capabilities on cybersecurity frameworks.
Forward-looking information reflects management’s current expectations, estimates, projections, and assumptions as of the date of publication and is subject to known and unknown risks and uncertainties that could cause actual results to differ materially from those expressed or implied. Such risks include, but are not limited to, technological development risks, regulatory developments, adoption timelines for post-quantum standards, competitive factors, supply chain considerations, capital requirements, and general economic conditions.
Readers are cautioned not to place undue reliance on forward-looking information. Quantum Vision Holdings undertakes no obligation to update or revise forward looking information except as required by applicable securities laws.
more news

