Antigravity Q&A
If quantum computers arrive within years, why haven't governments already mandated switching to post-quantum standards?
Answered by claude-haiku-4-5 · 3 May 2026
Answer
The short answer: governments *are* mandating the switch, but the transition is slow because the threat timeline is uncertain and the infrastructure costs are enormous.
The Timing Problem
The core issue is that "quantum computers arriving in years" doesn't mean *cryptographically relevant quantum computers* arriving in years [AG-2024.01-2022]. Current quantum machines are far from breaking RSA or elliptic curve cryptography—they lack both the qubit count and error correction needed to run Shor's algorithm at scale [AG-2024.01-2022]. This ambiguity creates a credibility gap: if security experts aren't certain a quantum threat will materialize in 5 years versus 15 years, it's politically difficult to impose costly mandates immediately.
What's Actually Happening
Governments and standards bodies *have* started moving. The U.S. National Institute of Standards and Technology has standardized post-quantum algorithms like Kyber (for encryption) and Dilithium (for digital signatures), which are based on the hardness of lattice problems rather than factoring [AG-2024.05-2225]. The European Union's EuroQCI initiative is a large-scale effort to deploy quantum-safe infrastructure [AG-2024.07-1542]. But these roll-outs are gradual because:
1. Legacy systems are everywhere. Critical infrastructure—power grids, financial networks, industrial control systems—runs on decades-old equipment [AG-2024.01-1401]. Replacing cryptography across these networks is like rewiring a city's electrical grid while keeping the lights on.
2. The standards are new. Post-quantum algorithms were only recently finalized, so they lack the peer review and real-world vetting that RSA had over 40 years [AG-2024.05-2225].
3. Harvest-now, decrypt-later attacks are the real urgency: adversaries may be recording encrypted communications today, betting that a quantum computer will someday break them [AG-2024.03-1442]. This argues for speed, but also creates an incentive to prioritize what's most sensitive (state secrets, financial records) first.
The preprints don't fully address why mandates haven't been more aggressive—only that adoption is underway but faces practical constraints.
Sources · 8
- 62%cs.CRPost-Quantum Security: Origin, Fundamentals, and AdoptionAG-2024.05-2225
- 60%quant-phAssessing the Benefits and Risks of Quantum ComputersAG-2024.01-2022
- 55%cs.NIThe Future of QKD NetworksAG-2024.07-1542
- 54%physics.soc-phQuantum for Good and the Societal Impact of Quantum ComputingAG-2024.03-1442
- 54%physics.soc-phWhat You Shouldn't Know About Quantum ComputersAG-2024.05-2409
- 54%cs.CRModelling the Impact of Quantum Circuit Imperfections on Networks and Computer ApplicationsAG-2024.03-2172
- 54%cs.CRCybersecurity in Critical Infrastructures: A Post-Quantum Cryptography PerspectiveAG-2024.01-1401
- 54%cs.CRTowards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacksAG-2024.02-1291
Keep exploring
This is a research aid — not a peer review. Verify sources before citing.