Published Apr 21, 2026
When will quantum computing break cryptography?
If you mean RSA, Diffie-Hellman, and elliptic-curve cryptography, the honest short answer is: probably not in 2026, probably not all at once, but very plausibly in the 2030s.
That is the part most people care about because those systems protect TLS handshakes, VPNs, SSH, certificates, passkeys, and blockchain signatures.
The other important part is this: you do not need to wait for a quantum computer to exist before the problem becomes real. If an attacker can copy encrypted traffic today and store it, they may be able to decrypt it later once a cryptographically relevant quantum computer exists. CISA, NSA, and NIST explicitly warn about this “harvest now, decrypt later” model.
So the practical answer is simple:
- if your data only needs to stay secret briefly, the risk is later
- if it needs to stay secret for
5to15years, the risk is already here - if you still depend heavily on
RSAorECC, your migration clock has started
TL;DR
Shor's algorithmbreaks the public-key systems the internet relies on most:RSA,DH,ECDH,ECDSA, and similar schemes.AESand hash functions are in better shape.Grover's algorithmweakens them in theory, but it does not create the same practical emergency, and it does not mean everyone now needs bigger symmetric keys.- The scary part is not that a giant quantum computer exists today. It is that the resource estimates for breaking
RSA-2048andECC-256have been falling fast. - In
2019, a widely cited estimate putRSA-2048at about20 millionnoisy physical qubits. In2025, Craig Gidney cut that to less than1 millionnoisy qubits under similar surface-code assumptions. - In
2026, Google researchers estimated that breakingsecp256k1-styleECC-256could take about1200to1450logical qubits and fewer than500,000physical qubits on a fast superconducting architecture. NISTalready finalized the first core post-quantum standards in2024: ML-KEM (FIPS 203), ML-DSA (FIPS 204), and SLH-DSA (FIPS 205).- NIST’s draft transition plan says common quantum-vulnerable public-key schemes should be deprecated after
2030and disallowed after2035. - The best plain-English answer is: treat the
2030sas the danger window for public-key cryptography, and plan as if long-lived secrets are already exposed.
Which crypto breaks first
Quantum computing does not threaten every cryptosystem equally.
| Crypto | What quantum does | Practical result |
|---|---|---|
RSA, DH, ECDH | Shor's algorithm solves the math directly | Broken once a large enough fault-tolerant machine exists |
ECDSA, EdDSA, ECC | Shor's algorithm solves discrete logs too | Also broken, and often with fewer resources than RSA |
AES-128 | Grover's algorithm gives limited practical help | Still broadly considered safe |
AES-256 | Grover gives even more margin | Also safe, but not required as a PQ migration step |
SHA-256 | Grover helps with preimage search in theory | Still broadly considered safe |
This distinction matters because a lot of headlines say “quantum breaks encryption” as if every lock on the internet fails on the same day. The main break is in public-key cryptography: the part used to agree on keys, prove identity, sign software, and authenticate transactions. Once that layer falls, a lot of higher-level systems fall with it.
Symmetric crypto is a different story. Quantum attacks help, but they do not give the same kind of clean knockout. That is why agencies like the NSA’s CNSA 2.0 guidance still keep strong symmetric primitives while replacing RSA and ECC.
Why the timeline feels closer now
For years, the easy answer was “don’t worry, we would need millions of qubits.” That was never the whole story, and it has aged badly. What changed is not just hardware. The attack cost estimates got better much faster. Researchers found better arithmetic, better circuit layouts, and better ways to pay the error-correction overhead.
A short version of the trend:
- In
2019, Gidney and Ekerå estimatedRSA-2048could be factored in about8hours with roughly20 millionnoisy physical qubits. - In
2025, Gidney updated that estimate to less than a week with less than1 millionnoisy physical qubits under similar assumptions. - In
2026, Google researchers estimatedECC-256oversecp256k1at1200to1450logical qubits, under500,000physical qubits, and roughly9to12minutes on a fast-clock superconducting machine.
Those are not minor edits. They are order-of-magnitude moves.
They also reinforce an awkward point: ECC may fall before RSA in many real systems. The reason is simple. Shor cares a lot about key size, and elliptic-curve systems use much smaller keys than RSA for the same classical security.
That means modern systems that moved from RSA to ECDH or ECDSA for efficiency did the right thing for the classical internet, but may have moved into an easier quantum target.
Why this does not mean “the internet breaks next year”
Because these papers are not attacks you can run on today’s hardware.
They assume a machine with:
- many error-corrected logical qubits
- low enough physical error rates
- stable control systems
- enough scale to run large fault-tolerant circuits end to end
Current systems are making real progress in quantum error correction, which is the hard part. For example, Quantinuum reported experiments with 48 to 94 logical qubits in 2026. That is a real milestone, but it is still far from the thousands of logical qubits, deep circuits, and industrial-scale reliability needed for practical cryptanalysis.
So there are two facts to hold at once:
- A quantum computer that can break mainstream cryptography does not exist today.
- The distance to one looks shorter than it did a few years ago.
That is why the serious debate is no longer “if,” but “how wide the remaining window is.”
The most honest timeline
No one can give you a real date, and anybody who says ”2033” or ”2041” with confidence is pretending. But we can still say useful things.
NIST’s migration FAQ says estimates for a cryptographically relevant quantum computer range from around 2030 on the aggressive end, to 15 to 20 years, to 30+ years on the slow end.
The Global Risk Institute’s 2024 expert survey found a significant chance within 10 years and a majority view that it becomes likely within 15 years.
Germany’s BSI, taking a conservative mainstream view, says a cryptographically relevant quantum computer is likely within 15 years and reasonably expected by about 2040, with faster progress possible if newer qLDPC error-correction methods work well.
I also think Filippo Valsorda’s timeline piece adds a useful way to think about the uncertainty. He puts it like this:
The bet is not ‘are you 100% sure a CRQC will exist in 2030?’, the bet is ‘are you 100% sure a CRQC will NOT exist in 2030?’
That is a better framing than arguing over one magic year. Security teams do not need certainty. They need to decide whether the downside of being late is acceptable.
Put that together and the practical forecast looks like this:
- Before
2030: possible but still an aggressive case 2030to2035: a serious planning window, not a sci-fi one- Late
2030s: plausible even under more conservative assumptions - After
2040: still possible, but not a safe excuse to delay
That is why NIST IR 8547 proposes deprecating common quantum-vulnerable public-key schemes after 2030 and disallowing them after 2035.
Those dates are not proof that Q-Day is 2035. They are what a responsible migration schedule looks like when the risk window is uncertain and the replacement takes years.
Symmetric crypto is not the urgent problem
The common shortcut is: Grover gives a square-root speedup, so AES-128 becomes “really” 64 bits, therefore everybody should move to AES-256.
That is too simple. Grover attacks do not parallelize the way normal brute force does, which makes the practical cost much worse than the slogan suggests.
Filippo Valsorda’s note on 128-bit keys says it plainly:
“AES-128 is safe against quantum computers. SHA-256 is safe against quantum computers. No symmetric key sizes have to change as part of the post-quantum transition.”
That matches NIST’s PQC FAQ, which says it is quite likely Grover will provide little or no practical advantage against AES, and that current applications can continue using AES-128, AES-192, or AES-256.
Do not let arguments about symmetric key sizes slow down the migration away from RSA, ECDH, and ECDSA. The urgent work is on the public-key side.
What “break” really means in practice
For most companies, there are three separate questions hiding inside the headline.
1. When can attackers decrypt traffic they recorded earlier?
This is the earliest real risk for sensitive long-lived data. If your TLS sessions today use quantum-vulnerable key exchange, an attacker who records the traffic now may be able to read it later. That matters for diplomatic traffic, health records, corporate secrets, long-lived credentials, and anything with a long confidentiality shelf life. That is why key exchange is the first migration priority.
2. When can attackers forge signatures?
This comes later, but it is worse in some ways.
Once a machine can break ECDSA, RSA, or similar signature schemes quickly enough, it can forge software updates, fake identities, impersonate certificate holders, or steal from systems that expose public keys on-chain or in protocols.
That is a direct integrity problem, not just a privacy problem.
3. When does the average website need to care?
Honestly, not every site needs to panic today.
If you run a small site with short-lived sessions and no high-value archived data, quantum risk is not your top fire.
But if you operate infrastructure, VPNs, SSH fleets, PKI, code signing, hardware lifecycles, regulated data, or long-lived secrets, you should already be planning.
What to do now
The hard part is not choosing a year. The hard part is reducing dependence on RSA and ECC before the date matters.
A sane short checklist:
- Inventory where you use public-key cryptography:
TLS,VPN,SSH, certificates, code signing, hardware roots of trust, document signing, blockchain keys. - Separate key exchange from signatures in your plan. They migrate on different timelines.
- Move long-lived confidentiality use cases to the front of the queue.
- Prefer
AES-256and strong hashes for symmetric components. - Start testing the NIST standards: ML-KEM, ML-DSA, and SLH-DSA.
- Expect hybrid deployments first. In many systems, the first practical step is hybrid
TLSkey exchange, not a full overnight switch of every certificate and signature stack. - Build for crypto agility. The teams that suffer most will be the ones that hard-coded one algorithm family into everything.
My bottom line
If you want the shortest honest answer to the title question, here it is:
Quantum computing probably breaks the big public-key cryptosystems in the 2030s, with enough uncertainty that anyone protecting long-lived secrets should act now, not when the first machine shows up.
RSA and ECC are living on borrowed time. AES-256 is not the main problem. The migration has already started. The only thing still uncertain is whether the industry finishes in an orderly way or gets forced into it late.
Leave the right message behind
Set up encrypted messages, files, and instructions for the people who would need them most if something happened to you.