Google has given the industry a deadline, not a prediction: migrate to post-quantum cryptography by 2029, or accept the consequences of arriving late to a threat that will not wait for board approval.
TLDR
Google has moved its internal deadline for post-quantum cryptography migration to 2029, one year ahead of prior industry guidance. New research from Google's security team shows that breaking the elliptic curve cryptography protecting most blockchains and banking systems may require fewer than 500,000 physical qubits on a superconducting machine, down from earlier estimates of roughly 10 million. The attack runs in minutes once a capable machine exists. Quantum computers are nowhere near that threshold today, but the 2029 deadline is not a prediction of when one arrives: it is a recognition that migrating at scale takes years, and those years are running.
KEY TAKEAWAYS
The numbers behind that warning are stark. Google Research published new circuit designs showing a sufficiently advanced quantum computer could crack Bitcoin's elliptic curve cryptography in approximately nine minutes. Roughly four million Bitcoin sit at addresses where the public key is already exposed on-chain, making them theoretically attackable the moment a capable machine exists. At current prices, that exposure runs into the hundreds of billions of dollars. Google Cloud offers quantum-resistant key management today. Bitcoin has no agreed migration path.
Kent Walker, Google's president of global affairs, made the 2029 announcement in early 2026. Walker told journalists the goal is to provide "clarity and urgency" to drive faster industry-wide adoption of quantum-safe standards before the threat window narrows further. The infrastructure is "already available and deployable" for any organisation prepared to prioritise the migration, he said, directing the comment squarely at organisations that have treated this as a 2030 problem and done nothing.
Google Research disclosed two new circuit designs for Shor's algorithm targeting ECDLP-256. The research team's position is direct: "future quantum computers may break the elliptic curve cryptography that protects cryptocurrency." Circuit one needs "less than 1,200 logical qubits and 90 million Toffoli gates." Circuit two runs under 1,450 logical qubits and 70 million gates. That is a 20-fold reduction in the physical qubit requirement from prior estimates, achieved through circuit optimisation alone, without any advances in quantum hardware.
Google's security team said in its disclosure that "most blockchain technologies and cryptocurrencies currently rely on ECDLP-256 for critical aspects of their security." The word most is doing no heavy lifting there. The accurate word is essentially all. Google Research said the work was released while "balancing security awareness against providing bad actors with actionable intelligence," using a zero-knowledge proof designed so results "can be verified without providing a roadmap for bad actors."
What precisely will a crypto executive paid $500,000 per year in compensation do about a migration problem their protocol has no clean answer for? The Ethereum Foundation, Coinbase, and Stanford's Institute for Blockchain Research are all listed as Google's partners on this disclosure. None has published a concrete migration timeline.
Quantum Insider reporting in March 2026 found that Google's accelerated deadline reflects updated modelling of hardware progress, not a single breakthrough event. Efficiency gains in Shor's algorithm implementations compound with each improvement in quantum error correction, and what looked like a decade-away problem two years ago now looks like five. In two more years, it may look closer still.
Bruce Schneier, writing on his security blog in April 2026, said the push reflects sound cryptographic practice. "Crypto-agility is always a good thing," Schneier said. Organisations able to swap cryptographic primitives without rebuilding their entire stack are more resilient in every threat scenario, quantum or otherwise.
NIST finalised three post-quantum standards in 2024: ML-KEM, ML-DSA, and SLH-DSA. Google Chrome already runs post-quantum key exchange. Android 17 ships ML-DSA digital signatures as default. The key point is not when a capable quantum machine arrives. The key point is that migration at enterprise scale takes three to five years, and a bank with cryptographic dependencies across payment rails, core banking systems, authentication layers, and API gateways cannot execute a post-quantum transition in a quarter. Most cannot do it in two years even starting today.
Google has given the industry the clearest signal it can deliver without publishing a functional attack. The organisations acting now will be ready by 2029. The ones waiting will be explaining to their boards why they did not.
FREQUENTLY ASKED QUESTIONS
When will quantum computers actually be able to break today's encryption?
Is Bitcoin at immediate risk from quantum computers?
What should businesses do right now?
Why does Google say digital signatures matter more than encrypted data?
SOURCES & CITATIONS
- Google Blog: The quantum era is coming. Are we ready to secure it?
- Google Research: Safeguarding cryptocurrency by disclosing quantum vulnerabilities responsibly
- Bruce Schneier: Google wants to transition to post-quantum cryptography by 2029
- The Quantum Insider: Google shortens timeline for quantum-safe encryption transition
- PYMNTS: Why Google thinks crypto is vulnerable to quantum progress



