We are close to solving problems once considered impossible in areas such as drug discovery, materials science, and energy.
This progress is thanks to quantum computers, which can solve problems that even the best supercomputers cannot. They can look at many possibilities at once. However, the same power means they could also break through our current digital protections, such as public-key cryptography systems that keep bank transfers, messages, trade secrets, and classified information private.
Simply put, the encryption we use today to keep our information safe could be broken by a large quantum computer in the next few years.
Even though we do not have those quantum computers yet, some bad actors are not waiting. They are probably already saving encrypted data now, planning to unlock it later when quantum computers become available.
So, what should we do? In short, we need to prepare.
Today, we want to share an update on our efforts to keep users safe as quantum technology advances, along with some suggestions for how policymakers can help improve security for everyone.
First, some background: The security-eminent community has been actively striving to address the risk of future quantum-powered attacks rather than just watching as threats grow.
Experts in cryptography have already developed post-quantum cryptography algorithms designed to resist attacks from upcoming quantum computers. After years of international work, the National Institute of Standards and Technology (NIST) in the US released the first set of these standards in 2024.
As Quantum Computation Technology advances, Google has not relied solely on current guidelines. Since 2016, we have been preparing for a post-quantum world by testing post-quantum cryptography, adding these features to our products, and sharing our knowledge through research and technical papers.
Getting ready for the quantum era means concentrating on both research and action. We are fully committed to both, so let’s look at each one:
When researching and updating PQC timelines (when it is safe to do so), we will share research that shows what is needed to break asymmetric cryptography, including asymmetric encryption and digital signatures. This work helps explain how PQC migration timelines may change and how a CRQC could affect sectors like health and finance.
Completing PQC Migrations: We are on schedule to finish our PQC migration safely, following NIST’s guidelines. We have started using PQC in our internal systems and products. To make this transition successful, we are focusing on three main areas:
- Being flexible with cryptography
- Securing important shared infrastructure
- Helping the wider ecosystem adapt
These steps will help build stronger security for the future.
These efforts demonstrate our strong commitment to keeping the digital economy secure in the long term. Still, we know that security in the quantum area will require teamwork. Here are five recommendations intended for policymakers to help manage this change:
Five Steps Policymakers Can Take to Get Ready for the Quantum Era
- Drive Momentum Across Society, Especially For Critical Infrastructure: policymakers should look beyond public-sector networks and address gaps and challenges, including workforce needs, in key areas such as energy, telecommunications, and healthcare. It is also important to protect the trust systems behind digital networks, working closely with certificate authorities. We need to move faster.
- Make sure AI is designed with PQC in mind: cryptography keeps AI systems secure as we use them; it is even more important to protect their foundations. PQC should be seen as a key part of supporting the long-range growth of AI.
- Reduce global fragmentation: We need to work together with a unified approach. The NIST standards for quantum-proof cryptography offer a global, scalable, and secure benchmark. If widely used, these standards can help us move faster and avoid incomplete or insecure solutions.
- Promote cloud-first modernization: Adopting new cryptographic standards will be a major undertaking, and PQC gives us another reason to use the cloud. Instead of spending public money to update old systems and hard-coded cryptography, governments should focus on moving these systems to the cloud. This way, they can benefit from the work that providers like Google Cloud are already doing to enable PQC worldwide. Rely on experts to avoid getting caught off guard. A CRQC is not always 10 years away, while we cannot say exactly when it will arrive. Staying in touch with experts from research institutions and teams such as Google’s Quantum AI Research Group will help policymakers stay ahead of emerging threats.
Here’s the bottom line: Quantity computing can help form a brighter tomorrow. But we need an all-hands-on-deck approach to make sure breakthroughs, not breakdowns, define the quantum era. Working together, we can prepare today and promote greater security tomorrow.
Source: The quantum era is coming. Are we ready to secure it?










