Skip to main content
Insights

Quantum Computers Are Not a Future Problem

The decisions you make about trust infrastructure in 2026 will determine whether your organisation is ready for quantum -- or scrambling to catch up.

April 12, 2026 · [cyphrs] Team · 16 min read

The conversation around post-quantum cryptography has shifted. For years it sat in the "important but not urgent" category -- something to monitor, something to plan for eventually. That changed in August 2024 when NIST published its first three finalised post-quantum cryptographic standards, and it has accelerated sharply since.

Government mandates are landing. Browser vendors are shipping hybrid quantum-safe connections in production. The CA/Browser Forum has voted unanimously to compress certificate lifetimes to 47 days. And adversaries are already collecting encrypted traffic to decrypt later.

For CTOs and security leaders, the question is no longer whether post-quantum cryptography matters. It is whether your infrastructure can absorb the change -- or whether you are building on a foundation that will need to be torn up and replaced.

What actually happened at NIST

In August 2024, after an eight-year evaluation process, NIST released three finalised standards for post-quantum cryptography. These are not drafts or candidates. They are approved, ready-to-deploy algorithms.

FIPS 203

ML-KEM. A lattice-based key encapsulation mechanism -- the replacement for the key exchange protocols (RSA, ECDH) that protect data in transit today. If you use TLS, this is the algorithm that will eventually secure your handshakes against quantum attack.

FIPS 204

ML-DSA. A lattice-based digital signature algorithm -- the replacement for the signature schemes (RSA, ECDSA) that authenticate certificates, sign code, and verify identity. If you issue certificates, this is the algorithm your trust chain will eventually depend on.

FIPS 205

SLH-DSA. A hash-based backup signature scheme, designed as a safety net in case the lattice-based approach in ML-DSA proves vulnerable.

In March 2025, NIST added HQC as a fifth algorithm -- a code-based backup for ML-KEM, with finalisation expected in 2027. The critical point: these standards are published, approved, and implementable today. The gap is no longer in the cryptography. It is in the infrastructure.

Harvest now, decrypt later is not hypothetical

The most immediate quantum risk is not that someone will break your encryption tomorrow. It is that someone is recording your encrypted traffic today, storing it cheaply, and waiting for a cryptographically relevant quantum computer (CRQC) to make decryption trivial.

Intelligence agencies in multiple countries have warned publicly that this is already happening at scale. For any data with multi-year sensitivity -- intellectual property, financial records, strategic communications, cryptographic key material -- the effective security window may already be closing.

If your data needs to remain confidential for ten years, and a CRQC arrives in twelve, the data you encrypted today is already at risk. The window for protection is now -- not when the threat materialises.

The timeline for a CRQC varies by estimate. IonQ's roadmap targets 2028. Forrester's 2026 assessment places Q-Day as a plausible risk by 2030. The Global Risk Institute considers a CRQC quite possible within ten years and likely within fifteen. It does not matter which estimate is right. What matters is whether your infrastructure can adapt before it has to.

The regulatory pressure is real and accelerating

Governments are not waiting for Q-Day to set deadlines.

NSA CNSA 2.0

All new national security systems acquisitions must be post-quantum compliant by January 2027. All deployed software and firmware must use CNSA 2.0 signatures by 2030. Full enforcement across all national security systems by 2035.

CANADA

Federal departments must submit PQC migration plans by April 2026, with critical systems prioritised by 2031 and complete migration by 2035.

CA/B FORUM

Ballot SC-081v3 passed unanimously in April 2025 -- 29 votes in favour, zero opposed. Certificate lifetimes compress to 200 days by March 2026, and 47 days by 2029. This forces exactly the automation and infrastructure agility that PQC migration demands.

Apple deployed PQ3 -- a post-quantum protocol -- in iMessage starting with iOS 17.4. And Google has made the most consequential move of all -- one that reshapes the entire landscape for certificate infrastructure.

Google just declared X.509 isn't enough

In February 2026, Google made an announcement that should have been front-page news for every security team: Chrome will not adopt post-quantum-signed X.509 certificates for public trust. The signatures are too large and the performance cost too high for the open internet.

Instead, Chrome is building an entirely new certificate format: Merkle Tree Certificates (MTCs). Under this model, a CA signs a single "Tree Head" representing potentially millions of certificates, and the "certificate" sent to the browser is a lightweight proof of inclusion in that tree. The result: quantum-resistant TLS authentication data shrinks from roughly 14,700 bytes down to as little as 736 bytes -- potentially smaller than today's classical certificate chains.

The Performance Problem MTCs Solve

Post-quantum signatures (ML-DSA) are approximately 40x larger than classical signatures -- roughly 2,500 bytes per signature versus 64 bytes for ECDSA. A typical X.509 certificate chain carries three signatures (root, intermediate, leaf). At post-quantum sizes, that's 7,500+ bytes of signature data alone, plus the larger public keys, pushing a single TLS handshake to ~14,700 bytes of authentication data. That's untenable for the open web, particularly on mobile networks and constrained devices.

How MTCs Work

MTCs replace per-certificate signatures with hash-based inclusion proofs. A CA collects certificates into a Merkle tree and signs just the tree head using ML-DSA. The browser verifies a compact proof that the certificate exists in the signed tree -- not a full signature chain. Certificate Transparency is integrated directly into issuance rather than bolted on after the fact.

The Timeline

Phase 1 (now): Feasibility study with Cloudflare, testing live MTC connections. Phase 2 (Q1 2027): CT Log operators begin bootstrapping public MTCs. Phase 3 (Q3 2027): Chrome finalises requirements for its new Quantum-resistant Root Store (CQRS) -- which will accept only MTCs, not X.509. The work is being standardised through the IETF's PLANTS working group.

What This Means for Every Organisation

Google has drawn a line: the future of public web authentication is not X.509 with bigger signatures. It is an entirely new format. Every public CA -- DigiCert, Sectigo, Let's Encrypt, all of them -- will need to fundamentally reinvent how they issue certificates for browser trust. This transition is years away and introduces its own complexity. But private infrastructure does not have the same constraints.

The real problem is not algorithms -- it is infrastructure

The cryptographic algorithms are ready. The challenge is that most organisations' trust infrastructure was not designed to absorb this kind of change.

Consider what a post-quantum migration actually involves. Every certificate in your estate -- root, intermediate, and leaf -- eventually needs to support post-quantum algorithms. Every system that validates a certificate needs to understand the new signature formats. Every key exchange in every TLS handshake needs to negotiate post-quantum parameters. Every piece of signed code, every firmware image, every authentication token needs to be re-evaluated.

And the hardest part is not the leaf certificates. The 47-day lifetime mandate will force automation for anyone who has not already adopted it. Leaf certificates are replaceable by design.

The hard part is the foundation.

Root certificates are created once and trusted for ten years or more. A root certificate created today will still be in active use in 2036 -- well within the window where post-quantum cryptography is expected to be necessary. Unlike leaf certificates, root certificates cannot be rotated on a schedule. Replacing a root requires coordinated updates across every system, service, and dependency that trusts it. Done under pressure, it is one of the most disruptive operations in infrastructure security.

Most PQC migration planning focuses on leaf certificates and TLS handshakes -- the visible, automatable surface -- while leaving the trust foundation untouched. When enforcement arrives, the entire trust chain depends on classical cryptography that cannot be upgraded in place.

The hybrid approach: future-proofing without disruption

The practical solution is hybrid certificates -- certificates that carry both a classical signature (ECDSA or RSA) and a post-quantum signature (ML-DSA) simultaneously.

This is not a compromise. It is a deliberate engineering strategy. A hybrid certificate works with every existing system today because those systems validate the classical signature and ignore what they do not recognise. When post-quantum validation becomes enforceable, systems can verify the embedded post-quantum signature without any certificate reissuance.

Public web (uncertain)

Chrome will not adopt PQC-signed X.509

New format (Merkle Tree Certs) years away

Waiting for browser vendor consensus

PQC signatures too large for open web

Private infrastructure (ready now)

You control both CA and endpoints

Hybrid X.509 works today

No waiting for browser support

Existing tooling, zero disruption

Inside your own trust boundaries -- internal APIs, service-to-service communication, Kubernetes workloads, air-gapped environments -- you control both the issuing CA and the validating endpoints. You are not waiting for browser vendors to agree on a new format. You are not waiting for the IETF to finalise MTC specifications. You are not waiting for CAs to rebuild their infrastructure around Merkle trees. Hybrid X.509 certificates work today, in your infrastructure, with your existing tooling.

The public web's PQC path is uncertain and evolving. Your private trust foundation does not need to wait for it.

This is the approach [cyphrs] has taken with its on-premises certificate authority. The cyphrs-ca tool enables infrastructure teams to create root and intermediate certificates that combine ECDSA with ML-DSA (FIPS 204) post-quantum signatures. The certificates are standard X.509, compatible with existing infrastructure, and carry the post-quantum material as embedded data that becomes verifiable when systems are ready. No migration. No parallel certificate hierarchies. No reissuance under pressure.

Why This Matters Now

While the public web waits for MTCs, private infrastructure can be quantum-ready today. A root certificate created with cyphrs-ca in April 2026 carries both ECDSA (which every system validates today) and ML-DSA (which systems will validate when enforcement arrives). When that root is still in active use in 2036, it will not need to be replaced. The organisations that embed post-quantum capability into their trust foundation now have years of runway. The organisations that wait will face exactly the kind of emergency root rotation that keeps CISOs awake at night.

What a PQC readiness plan actually looks like

For CTOs and security leads evaluating their quantum readiness, the work breaks into four phases -- and the first two should be underway now.

01

Cryptographic inventory

You cannot migrate what you cannot see. Discover every certificate across cloud, on-premises, containers, and edge. Classify which endpoints use public trust and which use private trust. Identify systems depending on cryptographic assumptions that will not survive quantum attack.

02

Foundation hardening

Create new root and intermediate certificates with hybrid classical/post-quantum signatures. Every existing system validates the classical signature. The post-quantum material sits embedded until enforcement arrives. Low risk, high leverage -- and it can be done today.

03

TLS and handshake migration

As browser and server support for ML-KEM matures, enable post-quantum key encapsulation in TLS connections. This protects data in transit against harvest-now-decrypt-later attacks. Start with external-facing endpoints and work inward.

04

Full enforcement

When post-quantum validation is broadly supported -- likely 2028 to 2030 -- switch from hybrid acceptance to post-quantum requirement. Systems that embedded PQC material in Phase 2 transition smoothly. Systems that did not face emergency remediation.

The gap between Phase 2 and Phase 4 is the window where preparation pays off. Organisations that embed post-quantum capability now have years of runway. Organisations that wait will face a compressed, high-pressure migration when enforcement arrives.

Shorter lifetimes and post-quantum are the same problem

The 47-day certificate lifetime mandate and the post-quantum transition are often discussed as separate challenges. They are not. They are converging forces that together reshape how organisations must think about certificate infrastructure.

Shorter lifetimes force automation. You cannot manually manage certificates that expire every 47 days across hundreds or thousands of endpoints. This drives adoption of ACME-based automation, centralised policy management, and continuous monitoring -- exactly the operational capabilities that PQC migration also demands.

Organisations that build this automation now -- using tools like [cyphrs] ACME ARI for public certificate lifecycle and [cyphrs] Trust CA for private certificate issuance -- are simultaneously building the infrastructure they will need for PQC migration. The automation that renews a certificate every 47 days is the same automation that can rotate a certificate to a post-quantum algorithm when the time comes.

And mutual TLS adds another dimension. As machine-to-machine communication grows -- particularly with the rapid expansion of AI agents and autonomous systems -- every service and every agent becomes an identity that needs certificate-based authentication. Post-quantum readiness is not just about protecting web traffic. It is about ensuring that the identity layer for your entire infrastructure is built on cryptography that will survive the quantum transition.

The cost of waiting

The Boston Consulting Group has warned that starting PQC migration in 2030 will already be too late. The market for enterprise cryptographic migration is projected to exceed $15 billion by 2030, and the organisations paying the most will be those migrating under deadline pressure rather than on their own schedule.

The actions available today -- cryptographic inventory, hybrid root certificates, automated lifecycle management -- are low-cost, low-disruption, and high-leverage. They do not require betting on a specific quantum timeline. They simply ensure that the infrastructure you build now is the infrastructure that carries you through the transition, whenever it arrives.

The foundation of trust should outlast the assumptions behind it. That means building it with post-quantum cryptography today -- not retrofitting it under pressure tomorrow.

Start with your cryptographic inventory

[cyphrs] Scout maps every certificate across your infrastructure, classifies trust domains, and identifies which systems depend on cryptographic assumptions that won't survive quantum attack. The [cyphrs] Score gives you a single number reflecting your readiness.