QCecuring - Enterprise Security Solutions
Q-Day Predictions: When Will Quantum Computers Break RSA?
Q-Day Predictions: When Will Quantum Computers Break RSA?

What Is Q-Day?

Q-Day is the date a quantum computer first breaks RSA-2048 in practical time. On that day, every RSA and ECC key in production becomes a liability. Digital signatures lose their guarantees. TLS handshakes become theater.

Nobody knows the exact date. But credible estimates are converging, and they all point to the same conclusion: organizations that wait for certainty will run out of time.

The Current Estimates

Government Timelines

The NSA issued CNSA 2.0 guidance in 2022, directing National Security Systems to adopt post-quantum algorithms by 2035. That deadline implies the NSA expects cryptographically relevant quantum computers (CRQCs) within that window.

NIST finalized three post-quantum standards in 2024: ML-KEM (FIPS 203) for key encapsulation, ML-DSA (FIPS 204) for digital signatures, and SLH-DSA (FIPS 205) as a hash-based signature backup. NIST does not publish a specific Q-Day estimate, but the urgency of their standardization timeline speaks volumes.

Researcher Estimates

Michele Mosca, a leading quantum computing researcher, has consistently placed the probability of a CRQC by 2033 at roughly one in six. By 2040, that probability rises above 50%.

A 2023 Global Risk Institute survey of quantum experts found the median estimate for breaking RSA-2048 falls between 2035 and 2040. Some respondents placed it as early as 2030. None ruled it out before 2035.

IBM, Google, and other quantum hardware vendors publish roadmaps targeting thousands of logical qubits by the early 2030s. Error correction remains the bottleneck, but progress is accelerating.

The Range That Matters

SourceEarliest EstimateMost Likely Range
NSA (CNSA 2.0)Implied by 2035 deadline2030–2035
Mosca (GRI Survey)20302033–2040
Industry Consensus20302035–2045

The spread is wide. The floor is not.

Why the Exact Date Does Not Matter

Fixating on a precise Q-Day misses the point. Three factors make the exact date irrelevant for planning.

Mosca’s Theorem

Michele Mosca formalized this with a simple inequality. If your data must stay confidential for x years, and migrating your cryptography takes y years, you must start migrating when x + y > z, where z is the time until Q-Day.

For most enterprises, x exceeds 10 years. Medical records, financial data, government secrets, and intellectual property all carry long confidentiality windows. Migration timelines (y) for large organizations run 5 to 10 years. Even optimistic Q-Day estimates (z) sit around 10 to 15 years.

The math is clear: x + y already exceeds z for many organizations.

Harvest-Now-Decrypt-Later

Adversaries do not need to wait for Q-Day. State-level actors are capturing encrypted traffic today and storing it for future decryption. This harvest-now-decrypt-later (HNDL) threat means your data is already at risk if it has a long confidentiality requirement.

Every day you delay migration extends the window of vulnerable data.

Migration Complexity

Replacing RSA and ECC across an enterprise is not a weekend project. Certificate inventories span thousands of endpoints. Key management systems touch every application. Code signing pipelines embed algorithm assumptions deep in CI/CD workflows.

QCecuring’s CLM platform provides the certificate inventory and automated renewal capabilities that make this migration tractable. Without centralized visibility into your certificate estate, you cannot even scope the migration.

What the Predictions Mean for Your Planning

Start With Inventory

You cannot migrate what you cannot find. Build a complete inventory of every RSA and ECC certificate, key, and signing operation in your environment. QCecuring’s Certificate Lifecycle Management automates discovery across cloud, on-premises, and hybrid environments.

Classify by Confidentiality Window

Not all data faces equal risk. Rank your cryptographic assets by how long the protected data must remain confidential. Assets protecting data with 15-year or longer windows are already in the HNDL danger zone.

Adopt Crypto-Agility Now

Crypto-agility means your infrastructure can swap algorithms without a forklift upgrade. This requires automated certificate management, centralized key rotation, and algorithm-aware policy enforcement.

SSH Key Lifecycle Management handles key rotation for SSH infrastructure. Combined with CLM for certificates, you build the foundation for rapid algorithm transitions.

Plan for Hybrid Deployments

NIST recommends hybrid key exchange during the transition period. Hybrid mode combines a classical algorithm (like ECDH) with a post-quantum algorithm (like ML-KEM) in a single handshake. This protects against both classical and quantum attacks during migration.

Your certificate lifecycle management platform must support hybrid certificate profiles as CAs begin issuing them.

Set Internal Deadlines

Do not wait for a government mandate. Set your own migration milestones:

  • 2025–2026: Complete cryptographic inventory and risk classification
  • 2027–2028: Deploy hybrid TLS in test environments, begin ML-KEM pilot
  • 2029–2030: Production hybrid deployments for high-value assets
  • 2031–2033: Full PQC migration for all certificate and key infrastructure

These dates align with CNSA 2.0 guidance and give buffer against optimistic Q-Day scenarios.

The Cost of Waiting

Every year of delay compounds the risk. The HNDL window grows. The migration backlog deepens. The talent pool for PQC expertise shrinks as demand spikes.

Organizations that start now spread the cost and complexity over years. Organizations that wait face a compressed, high-risk migration under deadline pressure.

Q-Day predictions vary. The need to act does not.

Next Steps

Review your cryptographic posture today. QCecuring’s CLM platform gives you the visibility and automation to start your post-quantum migration. Explore our PQC fundamentals guide for a deeper technical foundation.

Related Resources for: Q-Day Predictions: When Will Quantum Computers Break RSA?

If you want to automate certificate lifecycle and eliminate outages, explore QCecuring CLM.