Tech giants race to secure data with post-quantum cryptography by 2029
The first post-quantum standards are here, and Google, Cloudflare and others are treating 2029 as the deadline for protecting data that quantum machines could someday crack.

The countdown has already started
Quantum risk is no longer a theoretical debate reserved for cryptographers. Google and Cloudflare are both aiming to finish post-quantum protection by 2029, and that makes the transition a live infrastructure problem for banks, hospitals, government systems, and anyone storing encrypted data that must remain private for years. The key danger is not only a future machine that can break today’s security, but the present-day practice NIST calls “harvest now, decrypt later,” where attackers collect encrypted material now and wait for quantum computers to unlock it.
That changes the meaning of Q-Day. If powerful quantum systems begin breaking widely used public-key methods, the damage would not stop at one sector or one product line. It would reach the long tail of sensitive records, including financial archives, clinical data, legal files, communications, and intellectual property that need to stay confidential far beyond the life of a single network session.
NIST has already set the baseline
The United States has not waited for the threat to become visible. On August 13, 2024, the National Institute of Standards and Technology finalized its first three post-quantum cryptography standards and said they are ready for immediate use. Those standards are ML-KEM, ML-DSA, and SLH-DSA, giving agencies and vendors a concrete starting point instead of a vague future roadmap.
NIST’s Migration to Post-Quantum Cryptography Project is designed to move that work from standards to deployment. It is working with industry, academia, and federal partners to identify vulnerable systems, support interoperable solutions, and develop migration guidance. That matters because the shift is not just about choosing new algorithms. It is about replacing trust assumptions across software, hardware, identity systems, and long-lived records without breaking existing operations.
Why 2029 has become the industry deadline
Google’s March 2026 announcement put a clear date on a problem many organizations had treated as distant. The company introduced a 2029 timeline for post-quantum cryptography migration, saying the schedule reflects progress in quantum hardware development, quantum error correction, and quantum factoring resource estimates. In practical terms, Google is signaling that waiting for a cryptographically relevant quantum computer would be too late for high-value data that must stay protected well into the future.
Cloudflare followed with its own April 2026 target for full post-quantum security by 2029, and it widened the scope beyond key exchange. Its plan includes post-quantum authentication, which is a crucial signal because identity and trust are just as exposed as encryption in transit. Cloudflare also said it moved its roadmap up in response to recent research and the growing challenge of authentication migration, an acknowledgment that the hardest part of the transition is often not the first cipher, but everything built around it.
The companies moving early are buying time, not publicity
Google says it has been taking proactive steps to protect customer data against future quantum computers, and its security team points to a decade of preparation, including post-quantum cryptography testing in Chrome in 2016. That long runway matters because browser, cloud, and enterprise systems do not switch algorithms overnight. They have to support mixed environments, preserve interoperability, and avoid breaking the traffic that still depends on older standards.
Google’s security leadership has treated the issue as an engineering program, not a marketing slogan. The company’s work has involved Heather Adkins, Sophie Schmieg, Royal Hansen, and Phil Venables, reflecting how broad the transition has become inside a major platform company. Cloudflare’s posture has been similarly technical, with Christiane Peters and Bas Westerbaan associated with its post-quantum Internet work as the company tries to move the web toward new defaults rather than isolated pilot projects.
Microsoft and Apple are pushing the ecosystem forward
Microsoft moved the market in November 2025 when it announced post-quantum cryptography APIs were generally available on Windows Server 2025, Windows 11, and .NET 10. That is more than a product update. It gives developers and administrators a way to begin integrating quantum-safe tools into the software stacks they already use, which is exactly how large-scale migration starts.
Apple has also started preparing developers. Its WWDC 2025 sessions included quantum-secure cryptography, a sign that the company sees post-quantum readiness as part of the platform story, not a narrow security add-on. When operating system vendors expose the tools directly, they help shorten the distance between standards work and real-world deployment across apps, devices, and managed fleets.
Why the risk is broader than a future break of RSA and ECC
The immediate concern is not only that RSA and elliptic-curve cryptography could eventually be broken. The more urgent risk is that sensitive data is already being stockpiled for future decryption, which makes long-lived confidentiality the central issue. That is why the transition has become a national infrastructure story rather than a niche tech race: a patient attacker does not need quantum hardware today if the target data is still valuable tomorrow.
That is also why banks, hospitals, and public agencies face different clocks but the same problem. Transaction systems need trust now, medical and legal records need privacy for years, and government archives often need protection over decades. The organizations that move first will be the ones that can inventory dependencies, update authentication paths, and replace vulnerable cryptography before the harvest-now strategy matures into a mass decryption event.
The real race is against delay
By 2029, the companies and institutions that have already started will have had time to test, patch, and migrate without panic. Those that wait will face a much harder task: retrofitting security into systems that were never designed for a quantum threat, while also protecting data already collected and stored. The practical lesson is simple. Post-quantum cryptography is no longer about preparing for a distant future. It is about whether today’s encrypted world can survive long enough to matter.
Sources:
Know something we missed? Have a correction or additional information?
Submit a Tip

