Future Trends

Future Trends in Quantum Computing
& Cryptography

Quantum computing is no longer a future technology — it is a present-tense engineering and security problem. In March–April 2026, concurrent papers from Google Quantum AI and the Caltech–Oratomic collaboration sharply compressed the estimated timeline for quantum computers to break elliptic curve cryptography, triggering Cloudflare to accelerate its migration deadline to 2029. Meanwhile, Microsoft and Atom Computing are delivering the world's first commercial error-corrected quantum computer (Magne) to Denmark's QuNorth initiative. The fault-tolerant era has begun.

Fault Tolerance Neutral Atoms ML-KEM / ML-DSA HQC Backup Standard Quantum–HPC Hybrid Q-Day 2029 Projection CNSA 2.0 Deadline 2027
⚠ Compressed CRQC Timeline — April 2026: On March 30, 2026, Google Quantum AI published a whitepaper and Caltech–Oratomic published a concurrent preprint (arXiv:2603.28627) showing the physical qubit threshold to break P-256 elliptic curve cryptography may be as low as 10,000–26,000 neutral-atom qubits — roughly a 20× reduction from prior estimates. AI was instrumental in deriving the algorithm, per lead author Dolev Bluvstein of Oratomic. Cloudflare announced the same week it is accelerating its post-quantum deadline to 2029. Nature reported: “the world could be caught off guard by quantum hackers before the end of this decade.”

The Three-Level Framework: Where 2026 Fits

IEEE Spectrum's 2026 Top Tech report describes a framework developed by Microsoft Quantum mapping progress into three levels. Level 1 — today's machines — are noisy, intermediate-scale quantum (NISQ) devices: roughly 1,000 physical qubits, error-prone, without sustained error correction. Level 2 — the target for 2026 — are small error-corrected machines running a quantum error correction protocol reliably enough for customers to use. Level 3 is the transformative endgame: hundreds of thousands to millions of error-corrected qubits capable of millions of high-fidelity logical operations.

2026 is the year Level 2 arrives commercially. Microsoft and Atom Computing are delivering Magne — a 1,200-physical-qubit neutral-atom system producing up to 50 logical qubits — to QuNorth in Denmark, backed by €80 million from the Danish Export and Investment Fund and the Novo Nordisk Foundation. This is the first commercial deployment of a machine powered by logical qubits outside a research setting. Atom Computing's 2026 outlook targets a third-generation system with 10,000 physical qubits, and both QuEra and Atom Computing project scaling to 100,000 atoms per vacuum chamber within a few years — a path that runs directly through the qubit counts relevant to breaking ECC.

Why neutral atoms are leading: Both first-generation Level 2 machines are built on neutral atoms, not superconducting qubits. Neutral-atom platforms offer all-to-all qubit connectivity (any two qubits can be brought adjacent), long coherence times, and a radical error-correction efficiency advantage. Oratomic's March 2026 analysis showed neutral atoms require only 3–4 physical qubits per logical qubit for their ECC-breaking algorithm, versus roughly 1,000 for superconducting surface codes. That 250–333× overhead advantage is what makes 10,000-qubit neutral-atom systems threat-relevant at a scale superconducting architectures are not yet approaching.

Dec 2024

Google Willow: Below Threshold

First below-threshold error correction: error rates decrease exponentially as qubit count scales. 105 qubits. October 2025: Quantum Echoes algorithm achieves first verifiable quantum advantage, 13,000× faster than HPC on molecular simulation.

2026

Magne: First Commercial Logical-Qubit Machine

Microsoft + Atom Computing deliver Magne (50 logical qubits, 1,200 physical neutral-atom qubits) to Denmark's QuNorth. First error-corrected quantum computer outside a research lab. Delivery expected turn of 2026/27.

Mar–Apr 2026 ⚠

ECC Timeline Compressed by AI

Google + Oratomic/Caltech papers reduce P-256 break estimate to ~10,000–26,000 neutral-atom qubits using AI-assisted algorithm discovery. Cloudflare accelerates PQC deadline to 2029. IBM Quantum Safe cannot rule out moonshot attacks by 2030.

2027–2029

Mandate + Fault-Tolerance Horizon

CNSA 2.0 requires all new NSS acquisitions to be quantum-safe by Jan 1, 2027. IBM Starling (fault-tolerant proof-of-concept) targeted 2028. Cloudflare, Google target full PQC migration by 2029. Q-Day risk window opens.

AI × Quantum: An Accelerant Nobody Fully Modeled

The most consequential development of early 2026 is structural, not just technical: AI-assisted quantum algorithm discovery has compressed CRQC resource estimates non-linearly, and this dynamic was not part of most threat timeline models. Oratomic's Dolev Bluvstein confirmed AI was instrumental in the team's ECC-breaking algorithm results, with a follow-up paper on AI methodology planned. Google posted a job for a quantum researcher to develop AI-based “discovery pipelines” in early March 2026 — weeks before the concurrent publications. Prior resource estimates for breaking ECC were derived by human researchers hand-optimizing Shor's algorithm over decades. AI search over circuit-space can iterate orders of magnitude faster.

IBM Quantum Safe's CTO noted the results make it impossible to rule out quantum “moonshot attacks” on high-value targets using hardware plausibly available by 2030. Cloudflare cybersecurity researcher Bas Westerbaan described it as “a real shock.” The 2025 Global Risk Institute survey found a 39% probability that RSA-2048 could be broken within a decade; the 2026 AI-acceleration results push the probability distribution toward the near end. This is not a hypothetical — it is a changing risk calculus, driven by software improvements independent of any further hardware advance.

The Revised Threat Model and What It Requires Now

The dominant assumption in PQC planning through 2025 was that breaking RSA-2048 or P-256 required millions of physical qubits and was likely more than a decade away. The March 2026 papers restructure this in two distinct ways. First, Oratomic's resource estimate for P-256 drops to roughly 10,000–26,000 neutral-atom qubits — a threshold Atom Computing's third-generation roadmap approaches by 2027. Second, Google's team reduced the physical qubit estimate for ECC by approximately 20× independently, using a different algorithmic improvement. Both advances are software-side; neither required better hardware. The implication is that further AI-driven optimization rounds could reduce estimates further still.

The policy responses confirm that major actors have updated their models. Cloudflare moved its PQC completion target to 2029. Google called for urgent preparation in February 2026. Boston Consulting Group warned that starting migration in 2030 will already be too late. Multiple cryptocurrency projects — Bitcoin, Ethereum, Tron, StarkWare, Ripple — announced preliminary quantum-resistance initiatives in April 2026 following the publications.

The harvest now, decrypt later threat compounds all of this: adversaries capturing ECC-encrypted traffic today can store it and decrypt it once the hardware exists. For data that must remain confidential past 2029, ECC migration is not optional and cannot wait for further hardware milestones to clarify the timeline.

Algorithm Classical Security Quantum Threat (updated Apr 2026) Status
P-256 (ECC) ~128-bit equivalent Revised Apr 2026: Google + Oratomic estimate ~10,000–26,000 neutral-atom qubits; timeline compressed to potentially 2029–2030 on current roadmaps. Urgent
RSA-2048 ~112-bit equivalent Google whitepaper (Mar 2026) reduces estimate ~20× to <500,000 physical qubits. Harder than P-256 but subject to same AI-acceleration dynamic. Vulnerable
AES-128 128-bit Grover's algorithm halves effective key length to ~64-bit equivalent Weakened
AES-256 256-bit Grover's: ~128-bit effective — still strong post-quantum Adequate
SHA-256 / SHA-3 256-bit collision resistance Grover reduces pre-image to ~128-bit; collision resistance holds Adequate
ML-KEM (FIPS 203) Lattice (Module-LWE) No known quantum speedup. Production PKI vendor support shipping 2026. Required under CNSA 2.0 for NSS key establishment. Quantum-Safe
ML-DSA (FIPS 204) Lattice (Module-LWE/SIS) No known quantum speedup. Required under CNSA 2.0 for NSS digital signatures by Jan 2027. Quantum-Safe
HQC (backup KEM) Code-based (syndrome decoding) No known quantum speedup. Selected Mar 2025; finalization 2026–2027. Provides diversity against lattice cryptanalysis. In Standardization

The 2026 Regulatory Landscape: Mandates Now in Effect

CNSA 2.0 — January 1, 2027: All new National Security System acquisitions must be CNSA 2.0 compliant. RSA and ECC are no longer permissible for key establishment in any newly procured classified system. Defense contractors and federal suppliers are in scope; supply chain pressure extends this to any organization with significant federal contracts.

FIPS 140-2 Sunset — September 21, 2026: NIST's CMVP moves all remaining FIPS 140-2 certificates to Historical status. Only FIPS 140-3 validated modules may be used in new federal procurement after this date. This constrains HSM and cryptographic appliance timelines — not all HSMs support ML-KEM or ML-DSA yet, and vendors are racing to achieve NIST PQC validation in 2025–2026.

NIST IR 8547 deprecation timeline (draft): RSA and ECC deprecated for new federal use by 2030; disallowed entirely by 2035. HQC — selected as backup KEM in March 2025 — expected finalization 2026–2027. NIST CSWP 39 (finalized December 19, 2025) defines cryptographic agility as a mandatory architectural capability, introducing a formal maturity model. CSWP 48 maps PQC migration to NIST CSF 2.0 and SP 800-53, enabling governance teams to express migration progress as auditable risk outcomes.

Cryptographic agility as the design imperative: A system built in 2026 with hardcoded ECC will require a full code rewrite to migrate. A system built with algorithm-agile design — where algorithm and key configuration are external to business logic — can migrate by updating configuration. The BCG warning that starting in 2030 will be too late reflects the 42–54-month average enterprise migration timeline: organizations beginning now are on the edge of feasibility; organizations beginning in 2028 are not.

Aug 2024

FIPS 203 / 204 / 205 Finalized

NIST publishes the first three post-quantum standards: ML-KEM, ML-DSA, SLH-DSA. Migration clock starts.

Dec 2025

CSWP 39: Cryptographic Agility Standard

NIST finalizes the crypto-agility maturity model. Systems must be designed to swap algorithms without rearchitecting.

Mar 2026

⚠ Google + Oratomic: P-256 Breakable at ~10k Qubits

AI-assisted algorithm discovery cuts ECC resource estimates by 20×. Cloudflare moves PQC deadline to 2029. Nature: “the world could be caught off guard.”

Sep 2026

FIPS 140-2 Sunset

All FIPS 140-2 certificates move to Historical status. New federal procurement requires FIPS 140-3 validated modules only.

2026–27

HQC Backup KEM Finalization Expected

Code-based alternative to ML-KEM. Provides algorithmic diversity against potential lattice cryptanalysis.

Jan 2027

CNSA 2.0: All New NSS Acquisitions Must Be Quantum-Safe

RSA and ECC no longer permissible in any newly procured National Security System. Defense supply chain fully in scope.

2029

IBM Starling: First Large-Scale Fault-Tolerant QC & Q-Day Risk Window Opens

IBM targets 200 logical qubits and 100M logical gates. Probabilistic Q-Day risk window: 2029–2033.

2030

RSA / ECC Deprecated for New Federal Use

Per NIST IR 8547 draft. All new systems must use PQC algorithms.

2035

RSA / ECC Disallowed in All Federal Systems

Full deprecation. NCSC, ENISA, and partner nations align to same horizon.

The revised imperative — May 2026: The April 2026 results do not mean encryption breaks tomorrow. Today's neutral-atom machines have hundreds to low thousands of physical qubits; 10,000–26,000 high-fidelity logical qubits remains years away. What has changed is the confidence interval. The question is no longer “whether” or “if this decade,” but “which end of the 2029–2033 window.” For any data that must remain confidential past that window, migration from P-256 and RSA is not optional. BCG's warning that starting in 2030 will already be too late reflects the 42–54-month enterprise migration timeline — organizations beginning now are barely on schedule; organizations waiting are not.