
Hello,
For years, the cybersecurity community has comforted itself with the belief that cryptographically relevant quantum computers (CRQC) were a distant threat, something on the far horizon, always decades away. That belief is simply no longer defensible, and discounting the risk posed by CRQCs is no longer rational. Q‑day is no longer a theoretical milestone. It is approaching, rapidly, and from multiple directions at once.
Two very recent developments make this very clear.
The first comes from Caltech. In a new paper, the authors demonstrate that “Shor’s algorithm can be executed at cryptographically relevant scales with as few as 10,000 reconfigurable atomic qubits,” and that “the runtime for discrete logarithms on the P‑256 elliptic curve could be just a few days for a system with 26,000 physical qubits.” These are not speculative architectures. They build directly on neutral‑atom experiments that have already demonstrated arrays of more than 6,000 coherent qubits and universal fault‑tolerant operations on hundreds.
The second comes from Google. Their team shows that Shor’s algorithm for the elliptic‑curve cryptography underlying modern cryptocurrencies can be executed with “≤ 1200 logical qubits and ≤ 90 million Toffoli gates,” or with a variant requiring “≤ 1450 logical qubits and ≤ 70 million Toffoli gates.” On superconducting hardware, the fastest architecture currently under development, they estimate that these circuits could run “in minutes using fewer than half a million physical qubits.”
Taken together, these papers collapse previous industry assumptions and estimates regarding timelines, feasibility, and scale. They show that two very different quantum computing architectures, neutral atoms and superconducting qubits, are converging on the same point. That is to say, the resource barrier to breaking real cryptography is falling far faster than expected.
This is not a cause for panic or alarm. It is a call to responsibility.
For American cybersecurity organizations, and for the investors who partner with them, these developments are not curiosities. They are signals. They tell us that the window for orderly migration to post‑quantum cryptography is narrowing. They tell us that continuity planning must now assume that adversaries will have access to cryptographically relevant quantum machines sooner than previously modeled. And they tell us that the cost of inaction will not be measured in abstract risk, but in the integrity of the connectivity and systems that underpin the digital economy and national security.
Developing and fielding systems that are ready for the quantum era is not simply a technical upgrade. It is a civic obligation. It is the work of ensuring that the freedoms, markets, and institutions that rely on digital trust remain intact when the cryptographic foundations of the last half‑century are no longer secure. It is the work of protecting not just data, but the continuity of commerce, governance, and communication in a quantum era.
The choice before us is binary, black and white. We can treat these papers as warnings and accelerate and embrace the transition to post‑quantum architectures, or we can wait until the first CRQC forces the issue on terms advantageous to an American adversary. One path preserves resilience. The other invites regret.
Build it right, America.
![]()
Adam Firestone
Editor-in-Chief
Leave a Comment