The danger of the millennium bug, or Y2K, was that computers would not be able to represent years beyond 1999, misinterpreting 2000 as 1900. This would have caused widespread crashes to major computer systems. On the other hand, quantum day, or Q-Day, refers to the point at which a cryptographically relevant quantum computer (CRQC) becomes capable enough to break the public-key cryptography that currently secures most of the world’s digital data. Unlike Y2K, which had a deadline, the timing of Q-Day is uncertain.
In a recently published New Scientist article, Rebecca Krauthamer, CEO and Co-Founder of QuSecure, highlights “harvest now, decrypt later” as a major emerging risk, where adversaries collect data now with the intent to later decrypt it with a quantum computer. This poses significant concern for sensitive information across national security, healthcare, and banking.
Additionally, recent research from Google has accelerated Q-Day timelines toward 2029. As a result, organizations are increasingly recognizing the urgency of the threat and shifting towards post-quantum cryptography (PQC), algorithms designed to protect against quantum attacks. As Rebecca acknowledges,
“This is one of the biggest catalyst moments I’ve seen.”
Although banking and telecommunications are driving a growing wave of migration efforts, others, such as hospitals, still lag behind. Y2K was addressed through a large, global remediation effort to find, fix, and update software systems. Similarly, Q-Day can follow a comparable course if governments and organizations take proactive action.
“There needs to be a lot more bottom-up pressure from people using services. They should say, ‘Hey, to trust that you’re going to keep my data safe today and tomorrow, I need to see that you are adopting post-quantum cryptography.’”
The quantum threat is complex, with uncertainty surrounding timing and impact. Identifying vulnerabilities in networks, legacy systems, and devices is a challenge that will take time. However, those who prepare early, with post-quantum cryptography, turn this challenge into an opportunity: protecting high-value assets, reducing long-term risk, and future-proofing digital infrastructure. Acting now isn’t just about preparation, but about preventing a future crisis.
Read the Full Article
Learn how post-quantum cryptography is reshaping cybersecurity and why organizations need to act now in the full New Scientist article.