A cryptography engineer's perspective on quantum computing timelines

Reading & learning resources

  • A recently updated general cryptography book with a post‑quantum chapter is recommended for those catching up.
  • Commenters note that practical deployment details are very new and not yet well documented.

Business and deployment aspects

  • Some see “PQ migration as a service” as a startup opportunity.
  • Others argue it’s too deep in the stack, hard to value, and security is a “vitamin not an aspirin,” making sales difficult.

Hybrid vs non‑hybrid PQC

  • One side: hybrids (classical + PQ) are essential because PQ schemes are newer, less battle‑tested, and side‑channel or structural breaks are still plausible.
  • Other side: if you believe CRQCs will be usable soon, classical ECDH becomes nearly worthless quickly; hybrids add complexity, bikeshedding, and slow standards work for little long‑term benefit.
  • There is disagreement on how comparable the risks are: “CRQC soon” vs “lattice/PQ break soon.”

Timelines and quantum progress

  • Some argue new fault‑tolerance and error‑correction results materially shorten the “Q‑day” timeline; migrations must start now due to slow standards, tooling, and hardware cycles.
  • Skeptics point out that factoring demonstrations remain tiny, progress is uneven, and error‑correction requirements are still enormous; they see predictions as speculative.
  • Others stress that once scalable error correction exists, going from small to large keys is mostly an engineering scaling problem.

What to migrate first: key exchange vs signatures

  • Earlier consensus: prioritize PQ key exchange (to stop “store now, decrypt later”), treat signatures as less urgent.
  • Newer view in the thread: timelines may now be tight enough that authentication/signature migration also has to start immediately.
  • Some propose preparing PQ certificates and infrastructure now, but only switching fully when necessary; others warn you cannot rely on being able to “fast switch” later.

Symmetric crypto and AES key size

  • Many agree symmetric crypto is largely safe; the article’s view is that AES‑128 is sufficient even post‑quantum.
  • Several commenters push back, arguing AES‑256 is cheap, already widely supported, and avoids long debates about whether 128‑bit keys remain “enough.”
  • There are practical constraints in some environments (e.g., embedded hardware only supporting AES‑128).

Hardware roots of trust and authenticators

  • TEEs, TPMs, firmware signing keys, and attestation roots are widely non‑PQ; replacing them could require large‑scale hardware refreshes.
  • Some note firmware/TPM implementations are often “soft” and may be partially upgradable, but many boot and attestation chains still depend on classical signatures.
  • Hardware security keys (e.g., for FIDO/WebAuthn, SSH) are considered safe for authentication against “record now, break later,” but unsafe for long‑term encryption keys once CRQC exists.
  • There is interest in PQ‑capable tokens and secure elements, but they are not yet broadly available.

WebPKI, standards, and rollout complexity

  • Commenters highlight a long supply chain: standards bodies, certificate rules, HSM vendors, CAs, browsers, and finally sites.
  • This argues for starting deployment well before any clear public evidence of CRQCs.
  • Some suggest partial mitigations (central authorities using PQ for revocation and updates) but acknowledge broad PQ certificate deployment remains hard.

Cryptocurrencies and PQ threat

  • Several discuss cryptocurrencies as early, high‑value CRQC targets due to direct financial upside.
  • For Bitcoin and others, larger PQ signatures would reduce throughput and bloat chains, making migration slow.
  • Some note ongoing work on PQ‑suitable signature schemes tailored to constrained blockchains, while warning about fraudsters using “quantum Bitcoin theft” narratives to raise money.

Trust, agencies, and standards

  • Thread revisits historical episodes where national agencies influenced or weakened algorithms, and debates whether current PQ standards could hide “NOBUS” backdoors.
  • Some argue current ML‑KEM/ML‑DSA designs leave little room for secret backdoors; others remain wary of any scheme strongly pushed by intelligence agencies.
  • Overall, there is tension between the need to move fast on PQC and skepticism about motives and assurances from governments and large vendors.