While some Big Tech players accelerate PQC readiness, others stay the course
By Dan Goodin
Published on April 17, 2026.
The article discusses the 2010 incident where a sophisticated malware, Flame, hijacked the mechanism Microsoft used to distribute updates to millions of Windows computers worldwide. The attack involved an exploit of MD5, a cryptographic hash function Microsoft was using to authenticate digital certificates. Since 2004, MD5 has been known to be vulnerable to “collisions” which allows adversaries to generate two distinct inputs that produce identical output. This vulnerability was discovered in 2012 and has led to a significant increase in new algorithms being developed to replace RSA and elliptic curves. Google and Cloudflare have both increased their internal deadline for PQC (post-quantum computing/computer) readiness to 2029, an extension of roughly five years. However, experts suggest an industry-wide acceleration is necessary given the high stakes and difficulty of transitioning the Internet to post-Quantum computing. The Defense Department is requiring all national security systems to use quantum-safe algorithms by December 31, 2031, and the National Institute of Standards and Technology is urging the deprecation of vulnerable algorithms by 2035.
Read Original Article