Cloudflare is accelerating its post-quantum roadmap. We now goal 2029 to be totally post-quantum (PQ) safe together with, crucially, post-quantum authentication.
At Cloudflare, we consider in making the Web non-public and safe by default. We began by providing free common SSL certificates in 2014, started making ready our post-quantum migration in 2019, and enabled post-quantum encryption for all web sites and APIs in 2022, mitigating harvest-now/decrypt-later assaults. Whereas we’re excited by the truth that over 65% of human site visitors to Cloudflare is post-quantum encrypted, our work shouldn’t be completed till authentication can also be upgraded. Credible new analysis and fast {industry} developments counsel that the deadline emigrate is far before anticipated. It is a problem that any group should deal with with urgency, which is why we’re expediting our personal inside Q-Day readiness timeline.
What occurred? Final week, Google introduced that they had drastically improved upon the quantum algorithm to interrupt elliptic curve cryptography, which is broadly used to safe the Web. They didn’t reveal the algorithm, however as an alternative supplied a zero-knowledge proof that they’ve one.
This isn’t even the largest breakthrough. That very same day, Oratomic revealed a useful resource estimate for breaking RSA-2048 and P-256 on a impartial atom laptop. For P-256, it solely requires a surprisingly low 10,000 qubits. Google’s motivation behind their current announcement to additionally pursue impartial atoms alongside superconducting quantum computer systems turns into clear now. Though Oratomic explains their fundamental method, they nonetheless miss essential particulars on function.
These unbiased advances prompted Google to speed up their post-quantum migration timeline to 2029. What’s extra, of their announcement and different talks, Google has positioned a precedence on quantum-secure authentication over mitigating harvest-now/decrypt-later assaults. As we focus on subsequent, this precedence signifies that Google is worried about Q-Day coming as quickly as 2030. Following the bulletins, IBM Quantum Secure’s CTO is extra pessimistic and may’t rule out quantum “moonshot attacks” on excessive worth targets as early as 2029.
The quantum risk is well-known: Q-Day is the day that sufficiently succesful quantum computer systems can break important cryptography used to guard knowledge and entry throughout methods immediately. Cryptographically related quantum computer systems (CRQCs) don’t exist but, however many labs the world over are pursuing totally different approaches to constructing one. Till lately, progress on CRQCs has been principally public, however there isn’t any cause to count on that may proceed. Certainly, there’s ample cause to count on that progress will depart the general public eye. As quantum laptop scientist Scott Aaronson warned on the finish of 2025:
[A]t some level, the folks doing detailed estimates of what number of bodily qubits and gates it’ll take to interrupt truly deployed cryptosystems utilizing Shor’s algorithm are going to cease publishing these estimates, if for no different cause than the chance of giving an excessive amount of info to adversaries. Certainly, for all we all know, that time might have been handed already.
That time has now handed certainly.
Why now: unbiased progress on three fronts
We’d wish to spend some phrases on why it’s troublesome to foretell progress on quantum computing. Sudden “quantum” leaps in understanding, just like the one we witnessed final week, can happen even when every part occurs within the public eye. Merely put, breaking cryptography with a quantum laptop requires engineering on three unbiased fronts: quantum {hardware}, error correction, and quantum software program. Progress on every entrance compounds progress on the others.
{Hardware}. There are lots of totally different competing approaches. We talked about impartial atoms and superconducting qubits, however there are additionally ion-trap, photonics, and moonshots like topological qubits. Complementary approaches may even be mixed. Most of those approaches are pursued by a number of labs all over the world. All of them have their distinct engineering challenges and issues to resolve earlier than they will scale up. A number of years in the past, all of them had an extended checklist of open challenges, and it was unclear if any of them would scale. Right this moment most of them have made good progress. None have been demonstrated to scale but: if that they had, we wouldn’t have a few years left. However these approaches are a lot nearer now, particularly impartial atoms. To disregard this progress, you’d should consider that each single method will hit a wall.
Error correction. All quantum computer systems are noisy and require error-correcting codes to carry out significant computation. This provides fairly a little bit of overhead, although how a lot depends upon the structure. Extra noise requires extra error correction, however extra curiously, improved qubit connectivity permits for far more environment friendly codes. For a way of scale: usually round a thousand bodily qubits are required for one logical qubit for the superconducting quantum computer systems which are noisy and solely have neighbor qubit connectivity. We knew “reconfigurable qubits” resembling these of neutral-atom machines enable for an order of magnitude higher error-correcting codes. Surprisingly, Oratomic confirmed the benefit is even bigger: solely about 3-4 bodily impartial atom qubits are required per logical qubit.
Software program. Lastly, the quantum algorithms to crack cryptography may be improved. That is Google’s breakthrough: they massively sped up the algorithm to crack P-256. On high of that, Oratomic confirmed additional structure particular optimizations for reconfigurable qubits.
The image comes collectively: in 2025 impartial atoms turned out to be extra scalable than anticipated, and now Oratomic discovered find out how to do a lot better error-correcting codes with such extremely related qubits. On high of that, breaking P-256 requires a lot much less work. The result’s that Q-Day has been pulled ahead considerably from typical 2035+ timelines, with impartial atoms within the lead, and different approaches not far behind.
In earlier weblog posts we’ve mentioned how totally different quantum computer systems examine on bodily qubit rely and constancy, in comparison with the conservative goalpost of cracking RSA-2048 on a superconducting qubit structure. This evaluation provides us a tough concept of how a lot time we’ve got, and it’s actually higher than monitoring quantum factoring information, but it surely misses architecture-specific optimization and software program enhancements. What to look at for now’s when the ultimate lacking capabilities for every structure are achieved.
It’s time to give attention to authentication
Traditionally, the {industry}’s give attention to post-quantum cryptography (PQC) has been based mostly largely on PQ encryption, which stops harvest-now/decrypt-later (HNDL) assaults. In an HNDL assault, an adversary harvests delicate encrypted community site visitors immediately and shops it till a future date when it could possibly use a robust quantum laptop to decrypt the info. HNDL assaults are the first risk when Q-Day is much away. That’s why our focus, to date, has been on mitigating this danger, by adopting post-quantum encryption by default in our merchandise since 2022. Right this moment, as we talked about above, most Cloudflare merchandise are safe in opposition to HNDL assaults, and we’re working to improve the remainder as we communicate.
The opposite class of assaults is in opposition to authentication: adversaries armed with functioning quantum computer systems impersonate servers or forge entry credentials. If Q-Day is much off, authentication shouldn’t be pressing: deploying PQ certificates and signatures doesn’t add any worth, solely effort.
An imminent Q-Day flips the script: knowledge leaks are extreme, however damaged authentication is catastrophic. Any ignored quantum-vulnerable remote-login secret is an entry level for an attacker to do as they need, whether or not that’s to extort, take down, or snoop in your system. Any automated software-update mechanism turns into a distant code execution vector. An energetic quantum attacker has it straightforward — they solely want to search out one trusted quantum-vulnerable key to get in.
When consultants within the subject of constructing quantum computer systems begin patching authentication methods, we must always all pay attention. The query is now not “when will our encrypted data be at risk?” however “how long before an attacker walks in the front door with a quantum-forged key?”
Prioritizing essentially the most susceptible methods
If quantum computer systems arrive within the subsequent few years, they are going to be scarce and costly. Attackers will prioritize high-value targets, like long-lived keys that unlock substantial property or persistent entry resembling root certificates, API auth keys and code-signing certs. If an attacker is ready to compromise one such key, they keep indefinite entry till they’re found or that secret is revoked.
This implies long-lived keys ought to be prioritized. That’s actually true if the quantum assault of a single secret is costly and sluggish, which is to be anticipated for the primary era of impartial atom quantum computer systems. That’s not the case for scalable superconducting quantum computer systems and later generations of impartial atom quantum computer systems, which might effectively crack keys a lot sooner. Such quick CRQCs flip the script once more, and an adversary with one may focus purely on HNDL assaults in order that their assaults stay undetected. Google’s Sophie Schmieg compares this situation to Enigma’s cryptanalysis that modified the path of World Struggle II.
Including assist for PQ cryptography shouldn’t be sufficient. Methods should disable assist for quantum-vulnerable cryptography to be safe in opposition to downgrade assaults. In bigger, particularly federated methods resembling the online, this isn’t possible as a result of not each shopper (browser) will assist post-quantum certificates, and servers must hold supporting these legacy purchasers. Nonetheless, downgrade safety for HTTPS continues to be achievable utilizing “PQ HSTS” and/or certificates transparency.
Disabling quantum-vulnerable cryptography shouldn’t be the final step: as soon as completed, all secrets and techniques resembling passwords and entry tokens beforehand uncovered within the quantum-vulnerable system have to be rotated. Not like post-quantum encryption, which takes one large push, migrating to post-quantum authentication has an extended dependency chain — to not point out third-party validation and fraud monitoring. This can take years, not months.
It’s pure for organizations studying this to hurry out and take into consideration which inside methods they should improve. However that’s not the tip of the story. Q-day threatens all methods. As such, it’s essential to grasp the affect of a possible Q-day on third-party dependencies, each direct and oblique. Not simply the third-parties you communicate cryptography to, but additionally any third events which are vital enterprise dependencies like monetary companies and utilities.
With Q-day approaching on a shorter timeline, post-quantum authentication is high precedence. Lengthy-term keys ought to be upgraded first. Deep dependency chains and the truth that everybody has third-party distributors means this effort will tackle the order of years, not months. Upgrading to post-quantum cryptography shouldn’t be sufficient: to stop downgrades, quantum-vulnerable cryptography should even be turned off.
Cloudflare’s roadmap to full post-quantum safety
Right this moment, Cloudflare gives post-quantum encryption for almost all of our merchandise mitigating harvest-now/decrypt-later. That is the product of labor we began over a decade in the past to guard our clients and the Web at giant.
We’re focusing on full post-quantum safety together with authentication for our total product suite by 2029. Right here we’re sharing some intermediate milestones we’ve set, topic to vary as our understanding of the chance and deployment challenges evolve.
For companies, we suggest making post-quantum assist a requirement for any procurement. Frequent finest practices, like maintaining software program up to date and automating certificates issuance, are significant and can get you fairly far. We suggest assessing vital distributors early for what their failure to take motion would imply for what you are promoting.
For regulatory companies and governments: main by setting early timelines has been essential for industry-wide progress to this point. We at the moment are in a pivotal place the place fragmentation in requirements and energy between and inside jurisdictions might put progress in danger. We suggest that governments assign and empower a lead company to coordinate the migration on a transparent timeline, keep security-focused, and promote using present worldwide requirements. Governments needn’t panic, however can lead migration with confidence.
For Cloudflare clients, with respect to our companies, you don’t want to take any mitigating motion. We’re following the newest developments in quantum computing carefully and taking proactive steps to guard your knowledge. As we’ve got completed previously, we are going to activate post-quantum safety by default, with no switches to flip. What we don’t management is the opposite aspect: browsers, functions, and origins must improve. Company community site visitors on Cloudflare needn’t fear: Cloudflare One affords end-to-end safety when tunnelling site visitors by means of our post-quantum encrypted infrastructure.
Privateness and safety are desk stakes for the Web. That is why each post-quantum improve we construct will proceed to be out there to all clients, on each plan, at no extra price. Making post-quantum safety the default is the one option to defend the Web at scale.
Free TLS helped encrypt the online. Free post-quantum cryptography will assist safe it for what comes subsequent.



