Saturday, April 4, 2026
Logo

Quantum Computing Breakthroughs Could Crack Encryption by 2030, Warn Cybersecurity Experts

Leading researchers reveal that quantum computers may soon crack widely used encryption standards, threatening global cybersecurity. Two new studies challenge previous timelines, suggesting risks emerge within this decade.

BusinessBy Robert Kingsley1d ago3 min read

Last updated: April 4, 2026, 4:17 AM

Share:
Quantum Computing Breakthroughs Could Crack Encryption by 2030, Warn Cybersecurity Experts

The digital infrastructure underpinning global commerce, finance, and communication could face an existential threat sooner than anticipated, as quantum computing emerges as a viable weapon against long-standing encryption protocols. In two groundbreaking research papers published on March 30, scientists at Google and Pasadena-based startup Oratomic demonstrated that quantum computers capable of breaking widely used security standards—including those protecting cryptocurrencies and credit card transactions—may become operational within this decade, not the 2040s as previously believed. The findings, which have sent shockwaves through the cybersecurity community, suggest that organizations must act urgently to transition to quantum-resistant encryption technologies to avert a potential catastrophe.

  • Quantum computers could crack current encryption standards like P-256 within this decade, not the 2040s as previously thought.
  • Cloudflare and other cybersecurity firms are re-evaluating their defenses against quantum hacking, citing the new research as a "real shock."
  • The Oratomic study demonstrates that cracking P-256 encryption may require as few as 10,000 qubits, far fewer than the millions previously estimated.
  • Experts warn that financial systems, cryptocurrencies, and internet communications are at immediate risk if quantum-proof measures aren’t adopted soon.
  • The findings have intensified calls for accelerated development and deployment of post-quantum cryptography standards.

Why Quantum Computers Pose an Imminent Threat to Global Cybersecurity

The vulnerability of modern encryption to quantum computers stems from the fundamental difference in how quantum machines process information. Unlike classical computers, which rely on binary bits (0s and 1s), quantum computers use quantum bits, or qubits, which can exist in multiple states simultaneously thanks to a property called superposition. Additionally, quantum computers leverage entanglement—where qubits become interconnected—to perform calculations at speeds exponentially faster than conventional supercomputers for specific problems, including factoring large numbers.

This computational power poses a dire threat to widely used encryption algorithms like RSA and elliptic curve cryptography (ECC), including the P-256 standard, which secures everything from HTTPS web traffic to blockchain transactions. These algorithms rely on the mathematical difficulty of factoring large prime numbers or solving discrete logarithms—tasks that quantum computers could theoretically solve in hours rather than millennia. Until now, the consensus among researchers was that such quantum attacks remained decades away, with estimates suggesting that a functional quantum computer capable of breaking RSA-2048—one of the most secure standards—would require millions of error-corrected qubits.

The Oratomic Breakthrough: How Fewer Qubits Could Break P-256

The preprint published by Oratomic, a spin-off from the California Institute of Technology, challenges these long-held assumptions by demonstrating a novel approach to quantum computing that drastically reduces the number of qubits needed to crack P-256 encryption. The study, authored by Dolev Bluvstein and his team, found that leveraging trapped-ion quantum computers—where ions are manipulated using lasers—could enable a quantum attack with as few as 10,000 qubits. This figure is orders of magnitude lower than the previously accepted estimate of millions.

“I had gone around giving talks saying that you needed millions of qubits. We were quite surprised to find that our estimate ended up being so far below the accepted wisdom.” — Dolev Bluvstein, co-founder of Oratomic

The Oratomic team’s method combines several recent advancements in quantum hardware and software, including improved error correction techniques and optimized algorithms. By focusing on trapped-ion systems, which are known for their precision and low error rates, the researchers were able to streamline the computational process. This breakthrough not only accelerates the timeline for quantum threats but also opens new avenues for practical quantum computing beyond cryptography, including applications in materials science and machine learning.

Google’s White Paper: A Parallel Warning from a Tech Giant

Simultaneously, a white paper authored by researchers at Google’s Quantum AI lab provided further evidence that quantum computing capabilities are advancing faster than anticipated. While the Google team did not focus on the specific qubit requirements for cracking encryption, their findings underscored the rapid progress in quantum hardware and the potential for near-term practical applications. Scott Aaronson, a prominent quantum-computing researcher at the University of Texas at Austin, referred to these developments as “quantum computing bombshells” in a blog post, signaling the gravity of the situation.

Google’s Quantum AI lab has been at the forefront of quantum computing research, achieving milestones such as quantum supremacy—where a quantum computer solved a problem that would be infeasible for classical supercomputers—in 2019. The lab’s ongoing work in error correction and scalable quantum architectures suggests that the barriers to building a functional quantum computer capable of breaking encryption are eroding faster than expected. As quantum systems become more stable and scalable, the likelihood of a quantum attack on global cybersecurity infrastructure grows.

The Immediate Fallout: Cybersecurity Firms Race to Adapt

The announcement of these findings has sent ripples through the cybersecurity industry, with companies like Cloudflare—whose services protect roughly one-quarter of the world’s internet traffic—now reassessing their timelines for deploying quantum-resistant encryption. Bas Westerbaan, a mathematician at Cloudflare, described the studies as a “real shock” and admitted that the company is still processing the implications. “We are very concerned,” Westerbaan stated in interviews, highlighting the urgent need for post-quantum cryptography solutions.

Cloudflare is not alone in its concern. Major financial institutions, cryptocurrency exchanges, and government agencies are all evaluating their exposure to quantum threats. The National Institute of Standards and Technology (NIST) has been leading the charge in developing post-quantum cryptographic standards, with a finalized set of algorithms expected by 2024. However, the transition to these new standards will be a massive undertaking, requiring organizations to update their systems without disrupting operations. According to NIST’s estimates, the migration could take a decade or more, leaving a critical window of vulnerability.

The Financial Sector’s Quantum Vulnerability

The financial sector, which relies heavily on public-key cryptography for secure transactions, is particularly exposed to quantum threats. A 2023 report by the Bank for International Settlements (BIS) estimated that the global financial system could face annual losses of up to $200 billion if quantum computing breaks current encryption standards. Major institutions like JPMorgan Chase, Visa, and Mastercard are investing in quantum-resistant technologies, but the scale of the challenge is daunting. For example, Visa’s global payment network processes over 150 billion transactions annually, each secured by encryption that could be rendered obsolete by a quantum attack.

Cryptocurrencies Face a Looming Crisis

Cryptocurrencies, which rely on ECC for wallet security and transaction verification, are another high-profile target. Bitcoin and Ethereum, the two largest cryptocurrencies by market capitalization, use the secp256k1 curve, a variant of P-256, to secure user funds. If quantum computers can crack these keys, the result could be catastrophic: trillions of dollars in digital assets could be stolen or manipulated. The Oratomic study’s findings suggest that such an attack might be feasible within this decade, raising urgent questions about the long-term viability of blockchain security.

The Science Behind the Threat: How Quantum Computers Work

To understand why quantum computers pose such a grave threat to cybersecurity, it’s essential to grasp the underlying principles of quantum computing. At the heart of the issue is Shor’s algorithm, a quantum algorithm developed by mathematician Peter Shor in 1994. Shor’s algorithm can efficiently factor large integers and solve discrete logarithms—mathematical problems that form the backbone of modern public-key cryptography. While classical computers would take millions of years to factor a 2048-bit RSA number, a sufficiently powerful quantum computer could theoretically complete the task in hours.

Another critical factor is quantum error correction. Qubits are notoriously fragile, prone to errors caused by environmental noise and decoherence. To build a functional quantum computer, researchers must develop robust error-correction methods, such as surface codes or topological qubits, to maintain the integrity of computations. The Oratomic and Google studies suggest that these challenges are being overcome faster than anticipated, bringing the reality of quantum attacks closer to fruition.

The Race to Quantum-Resistant Encryption

In response to the looming quantum threat, governments, corporations, and researchers are accelerating efforts to develop and deploy quantum-resistant encryption standards. NIST’s Post-Quantum Cryptography (PQC) project, launched in 2016, has been leading this charge. The project aims to standardize algorithms that are secure against quantum attacks, with a finalized set of standards expected by 2024. Among the leading candidates are lattice-based cryptography, hash-based signatures, and code-based encryption, all of which rely on mathematical problems that quantum computers cannot solve efficiently.

However, the transition to post-quantum cryptography is not without its challenges. Organizations must retrofit existing systems to support new encryption standards without disrupting critical services. This process involves updating hardware, software, and protocols across entire networks—a task that could take years, if not decades, to complete. The Cybersecurity and Infrastructure Security Agency (CISA) has warned that many organizations are underestimating the scale of this transition, leaving them vulnerable to quantum attacks.

NIST’s Post-Quantum Cryptography Project

NIST’s PQC project began with a call for proposals in 2016, receiving 82 submissions from researchers around the world. After years of evaluation, NIST has narrowed down the field to four finalists: CRYSTALS-Kyber and CRYSTALS-Dilithium, which are lattice-based algorithms, as well as SPHINCS+ and NTRU, which are hash-based and code-based, respectively. These algorithms are designed to be secure against both classical and quantum computers, providing a pathway forward for the cybersecurity community.

The first set of standards is expected to be finalized in 2024, with additional algorithms to follow in subsequent years. Organizations are encouraged to begin testing and integrating these new standards into their systems as soon as possible. However, the adoption of post-quantum cryptography is still in its early stages, with many companies only now beginning to assess their exposure to quantum threats.

The Role of Governments and Regulators

Governments around the world are also stepping up their efforts to address the quantum threat. In the United States, the National Quantum Initiative Act, signed into law in 2018, allocated $1.2 billion in funding for quantum research and development. The act aims to accelerate progress in quantum computing, sensing, and communication technologies, with a focus on ensuring national security and economic competitiveness. Similarly, the European Union’s Quantum Flagship program has committed €1 billion to quantum research, while China has invested heavily in quantum technologies as part of its broader strategy to become a global leader in science and technology.

Regulators are also taking notice. In 2023, the U.S. Department of Homeland Security (DHS) issued a binding operational directive requiring federal agencies to begin transitioning to post-quantum cryptography. The directive mandates that agencies must prioritize the migration of their systems to quantum-resistant standards, with a deadline of 2035. While this timeline provides some breathing room, the directive underscores the urgency of the situation and the need for coordinated action.

What’s Next? Navigating the Quantum Threat

The revelation that quantum computers could crack encryption within this decade has transformed the cybersecurity landscape from a distant concern to an immediate crisis. Organizations across industries must now prioritize the transition to quantum-resistant technologies, but the road ahead is fraught with challenges. From retrofitting legacy systems to training a new generation of quantum-savvy engineers, the task is monumental. However, the alternative—failing to act—could result in catastrophic breaches of global cybersecurity infrastructure, with consequences that ripple through financial markets, critical infrastructure, and individual privacy.

For now, the cybersecurity community is in a state of heightened alert. Companies like Cloudflare, Google, and Oratomic are leading the charge in developing solutions, but the scale of the problem demands a collective effort. Governments, corporations, and researchers must collaborate to ensure that the transition to post-quantum cryptography is smooth and timely. The stakes could not be higher: the security of the digital world hangs in the balance.

Key Takeaways: What You Need to Know About the Quantum Computing Threat

  • Quantum computers could crack widely used encryption standards like P-256 within this decade, not the 2040s as previously thought, according to new research from Google and Oratomic.
  • The Oratomic study found that cracking P-256 encryption may require as few as 10,000 qubits, far fewer than the millions previously estimated, thanks to advancements in trapped-ion quantum computing.
  • Major cybersecurity firms like Cloudflare are reassessing their defenses and expressing concern over the accelerated timeline for quantum threats.
  • The financial sector and cryptocurrencies are particularly vulnerable, with potential annual losses estimated at $200 billion if quantum attacks occur.
  • NIST’s Post-Quantum Cryptography project is finalizing standards by 2024, but organizations must act quickly to integrate these new encryption methods before it’s too late.

Frequently Asked Questions About Quantum Computing and Encryption Risks

Frequently Asked Questions

How soon could quantum computers break encryption?
Researchers now believe that quantum computers capable of cracking current encryption standards could emerge within this decade, not the 2040s as previously thought. New studies from Google and Oratomic suggest that such systems may be feasible sooner than expected.
Which industries are most at risk from quantum attacks?
The financial sector, cryptocurrencies, and internet communications are among the most vulnerable. These industries rely on encryption standards like P-256 and RSA, which could be rendered obsolete by quantum computers.
What is post-quantum cryptography, and how can I prepare?
Post-quantum cryptography refers to encryption methods designed to be secure against quantum attacks. Organizations should begin testing and integrating NIST’s new standards, such as CRYSTALS-Kyber and CRYSTALS-Dilithium, into their systems as soon as possible.
RK
Robert Kingsley

Business Editor

Robert Kingsley reports on markets, corporate news, and economic trends for the Journal American. With an MBA from Wharton and 15 years covering Wall Street, he brings deep expertise in financial markets and corporate strategy. His reporting on mergers and market movements is followed by investors nationwide.

Related Stories