What Y2K Can Teach Us About Q-Day

(The Quantum Algorithms Institute is an IYQ sponsor.)

Quantum computers are a powerful emerging technology that could solve some of the world’s most complex problems. Unfortunately, one of those problems includes breaking our most widely used encryption algorithms, compromising massive amounts of data worldwide. 

But in 2025, this should not be news. The quantum threat to cybersecurity has been a hot topic for years, with many organizations working to remediate it. Recently, the US National Institute of Standards and Technology (NIST) has released three standardized “quantum safe” encryption algorithms, marking a huge milestone in post-quantum cybersecurity development. So, with these new safe encryption mechanisms, isn’t this threat now neutralized? Unfortunately, not yet.

The emergence of new encryption standards and national migration guidelines is only the first step in the post-quantum security process; getting organizations to implement these new standards in time, before large-scale quantum computers emerge, is a far more daunting task. 

Due to the unpredictable nature of quantum computing progress, skepticism about the validity of the quantum threat, and, most importantly, the lack of a distinct Q-Day deadline, the atmosphere surrounding post-quantum cryptography migration shows a considerable lack of urgency that could prove detrimental in the future. 

PQC Inaction and Comparison to Y2K

In 1999, as the world was speeding towards a new millennium, the Y2K Bug was on everyone’s mind. Because computers at the time stored the current year as only two numbers (99 for 1999, 98 for 1998, and so on), the fear was that once the year 2000 hit, computer systems around the world would interpret “00” as “1900” rather than “2000.” This bug was predicted to shut down critical infrastructure technology unless taken care of. 

The hard deadline of January 1st, 2000, pushed organizations and governments to solve the problem before it was too late. An estimated $300 billion USD was spent worldwide to fix the bug, and, due to the hard work of thousands of workers behind the scenes, the impact of the Y2K bug was largely mitigated.

The Y2K bug is eerily similar to the newly dubbed Q-Day, the day quantum computers will break modern encryption. If/when this breakthrough event does occur, the implications will be far greater than those of Y2K, rendering the majority of modern encryption obsolete. So, why aren’t we seeing the same urgency to solve the Q-Day problem?

Quantum Doubt and Portrayal in Media

Unlike Y2K, quantum computing’s timeline and image make it harder to mobilize. There were a few traits to Y2K that enabled it to be taken seriously by not only the technology workers trying to fix the problem, but most importantly, by influential company executives. 

The tangible deadline certainly helped executives take the problem seriously. Significant pressure was applied, pushing organizations to act sooner rather than later. In contrast, because Q-Day could be anywhere from 3 to 15 years away, according to analysts, it is challenging to convince organizations to allocate resources to the problem now. 

The way that the Y2K problem was comparatively easy to understand and quantify also had a large impact on how it was handled. The Y2K bug was easy to take seriously in part due to its mundane nature. In contrast, the quantum threat may seem technologically far-out to most, with some dismissing it entirely as science fiction due to the often-inaccurate portrayal of quantum technologies in popular media. Superhero movies, sci-fi adventures, and space operas all use the term “quantum” to describe just about anything adjacent to magic, causing “quantum” and “sci-fi” to share the same brain space. 

This portrayal makes it difficult for outsiders to take quantum seriously. Ella Meyer, a quantum computing outreach coordinator at the University of British Columbia, told GeekWire that media portrayals like this are making it “harder than ever to get people to properly engage with this world.”

Executives and key decision makers around the world are still trying to wrap their heads around the equally sci-fi-like world of AI, and now they’re being told they must start dealing with seemingly outlandish quantum threats. 

Image: IMDb

Because of the lack of a hard deadline and the fantastical portrayal of quantum in fictional media, it is easy to see how difficult it can be for non-technical decision-makers to take the quantum threat seriously. 

Call to Action

It is vital to the security of all organizations to get executive minds on board with the quantum threat. This isn’t simply something to be ignored. Already, national post-quantum migration roadmaps have been released by the likes of Canada, the USA, and the UK.

The migration to post-quantum cryptography will be long and arduous for most organizations. Convincing an executive team to commit to a multi-year-long project defending against such a fluid threat will be difficult, but it is entirely necessary. 

When discussing the quantum threat with executives, make sure to speak their language. Don’t get caught up in superposition and qubit count, but instead point to government migration guidelines and the post-quantum security plans of large corporations.

Additionally, highlight how migrating to post-quantum cryptography will improve an organization’s security posture beyond the quantum threat. Upgrading to new, improved cryptography, developing ways to become cryptographically agile, and undergoing a cryptographic discovery process will all help defend governments, businesses, and utilities against both quantum and classical threats. 

An organization’s post-quantum cryptography migration doesn’t have to be handled entirely in-house, either. Recently, new and established vendors, such as IBM, PQShield, and SandboxAQ, have begun offering cryptographic discovery and post-quantum remediation services. For organizations with small security teams, such vendors provide essential assistance. 

Conclusion 

In a world where the status quo on security and technology is constantly changing, it can be challenging to sift through the noise and find what will truly make an impact. The Y2K bug was taken seriously because it was perfectly positioned to cut through that noise due to its hard deadline and grounded nature. 

The quantum threat to cybersecurity is different. There is no hard deadline, no immediate observable impact, and it is obstructed by the mythological portrayal of a very real technology. Nevertheless, actions to mitigate this threat must be taken.

Every delay in migration extends the period in which critical data remains exposed to future decryption. The growing concern of “harvest now, decrypt later” attacks—where adversaries stockpile encrypted data anticipating quantum capabilities—makes early action essential.

The threat must be properly communicated to executive minds. Point to existing government migration guidelines, avoid getting caught up in the technical weeds, and make it clear that this is a threat that cannot be ignored.

Sources

Securing the Quantum Future Demands Action Today

(IYQ partners)

With quantum technologies shifting from theoretical potential to real-world deployment, we believe the urgency to secure our digital future has never been greater.

Our modern world runs on digital infrastructure, financial systems, healthcare networks, energy grids, and national security, all secured by cryptographic designs for classical computing. These systems have served us well for decades, but they are not equipped to withstand the disruptive power of quantum computing.

Quantum computing is redefining what’s possible in computation. Unlike classical machines, which process information in binary bits, quantum machines rely on qubits that can exist in multiple states simultaneously. This extraordinary capability enables them to solve certain problems exponentially faster than traditional counterparts, advancing areas such as drug discovery, climate modeling, and logistics optimization. Yet, the same power that makes quantum computing so promising also poses a direct threat to the cryptographic algorithms that safeguard digital communications and data.

The greatest near-term threat lies in public-key cryptography. Algorithms such as RSA and ECC, which rely on the difficulty of factoring large numbers and the discrete logarithm problem over elliptic curves, respectively, are particularly susceptible to quantum attacks. Using Shor’s algorithm, quantum computers will eventually be capable of breaking these encryption schemes in a fraction of the time required by classical machines.

This is not a distant threat. The concept of harvest now, decrypt later is already being employed, where malicious actors collect encrypted data today with the intention of decrypting it once quantum capabilities become available. Sensitive information, from personal health records to classified communications, is being stockpiled, awaiting the moment when quantum decryption becomes possible. The implications are profound: breaches that occur years from now could expose data that was once assumed to remain secure for decades.

Transitioning to quantum-resilient systems is therefore not optional—it is essential. Post-quantum cryptography (PQC) offers one of the most promising paths forward, featuring algorithms designed to resist quantum attacks while remaining compatible with existing infrastructure.

In the UAE, we are taking proactive steps to prepare for this new frontier. The UAE CyberSecurity Council and the Technology Innovation Institute (TII)have joined forces on CyberQ, an event dedicated to advancing research, standards, and readiness for quantum-safe cybersecurity. CyberQ is designed to help organizations across both the public and private sectors identify their quantum vulnerabilities, evaluate post-quantum cryptographic solutions, and accelerate the transition to secure communication systems that withstand future quantum threats. Through CyberQ, we are combining policy leadership and advanced scientific capability to strengthen the UAE’s role as a global contributor to quantum security. Together, CSC and TII are collaborating with international experts, industry partners, and standards bodies to safeguard our digital infrastructure and protect the critical assets that underpin our nation’s security in the quantum era.

However, adoption across industries remains uneven. Too often, quantum threats are seen as speculative when, in reality, the groundwork for future breaches is being laid today.

The challenge is not merely technical. It is strategic.

Cryptographic systems are deeply embedded in our digital fabric, and transitioning to new standards will require coordination across sectors and sustained and decisive leadership.

Policy frameworks must evolve in tandem with technological advancements. Governments must update regulatory frameworks to guide the adoption of PQC, incentivize migration, and support public-private partnerships that accelerate readiness.

International cooperation is also essential. Quantum threats do not respect borders, and fragmented responses will leave critical gaps in global security.

Just as crucial is fostering crypto-agility, the readiness to evolve cryptographic systems as threats emerge. Now is the time for organizations to evaluate their vulnerabilities, map their cryptographic assets, and prepare for a hybrid era where classical and quantum-safe algorithms work side by side.

The quantum future is not a distant horizon; it is approaching rapidly. The decisions we make today will determine whether our digital infrastructure remains resilient or becomes a casualty of technological progress.

Through initiatives like CyberQ, we are committed to leading this transformation, combining policy, research excellence, and international collaboration to secure the quantum future, starting now.

As leaders in cybersecurity and advanced research, we share a single goal: to ensure that the world approaches the quantum future with foresight, responsibility, and cooperation.

Protecting digital trust in the quantum age will demand global resolve and shared responsibility, as what we build together today will determine the security and integrity of the digital world for generations to come.

Quantum Women’s Netwik

We are delighted to invite you to our inaugural event of the Quantum Women’s Network in New York City!

​Quantum Women’s Network is a community dedicated to supporting women and girls who work — or aspire to work — in the field of quantum technologies. We celebrate and value diverse contributions to this growing field, spanning education, business development, advocacy, partnerships, strategy, hardware innovation, and algorithm design.

​Our mission is to build a supportive network that empowers women and girls to thrive in quantum technologies, each from their own perspective. To achieve this, we organize various initiatives, including networking events where we come together to connect, share experiences, and strengthen our community.

​This inaugural gathering marks the beginning of our journey, and we plan to host these events monthly in NYC moving forward.

​📩 If you would like to learn more about our plans or get involved, feel free to reach out at quantumwomennetwork@gmail.com.

​We look forward to seeing you there and building this network together!

CyberQ

CyberQ 2025 is the UAE’s flagship summit for cybersecurity and quantum technologies, hosted by the UAE Cybersecurity Council and the Technology Innovation Institute (TII). Under the theme “Future-Proofing Digital Defenses,” the event will explore how quantum computing, artificial intelligence, and emerging technologies are transforming the global cybersecurity landscape.
For the second year running, the CyberQ Summit 2025: Future-Proofing Digital Defenses is providing a global forum for government, industry leaders and those at the cutting-edge of emerging quantum technologies to explore the dangers they pose to current cryptographic systems, the opportunities that post quantum cryptography is creating and the best ways to integrate new cryptographic solutions to ensure a smooth transition, without disrupting operations.

UNESCO International Year of Quantum Symposium

On September 19, Columbia University will welcome experts from industry and academia who will share their insights into recent quantum research and the development of emerging quantum technologies.

Quantum Enabling Technologies Workshop (QETw 2025)

The Quantum Enabling Technologies Workshop (QETw) will take place on November 13, 2025, at iXcampus in Saint-Germain-en-Laye, France. This unique event brings together companies, start-ups, research laboratories, and public stakeholders to explore enabling quantum technologies and their role in driving industrialization and collaboration.

Organized by Systematic Paris Region, Europe’s leading Deep Tech cluster, and its Quantum Hub, QETw is fully embedded in the cluster’s mission to foster innovation, accelerate technology transfer from research to industry, and strengthen its position within European and international initiatives. The Quantum Hub plays a pivotal role in connecting academic and industrial players, shaping collaborative projects, and supporting the growth of a competitive quantum ecosystem.

The program is structured around two main moments. The morning plenary session will feature strategic keynote talks, insights from collaborative projects, and a roundtable addressing public policies, funding opportunities, and industrialization challenges. In the afternoon, thematic matchmaking workshops will provide a space to transform ideas into concrete projects and partnerships, with dedicated sessions on integrated photonics, quantum software and algorithms, sensors and instrumentation, cryogenics and packaging, as well as funding mechanisms.

Beyond scientific and technological discussions, QETw is designed as a platform for meaningful encounters and long-term cooperation. Campus tours and a closing networking cocktail will further enhance opportunities for exchange and collaboration.

Registration page

[Special Exhibition] Quantum Century

A special exhibition at the National Museum of Nature and Science, Tokyo

Quantum Century will be a small-scale display located within the museum’s permanent exhibitions, offering an intimate space to explore the evolution of quantum science from its early 20th-century origins to its modern applications, with a special focus on Japan’s contributions. Visitors will encounter historical artifacts, interactive displays, and multimedia installations that reveal both the foundational breakthroughs and cutting-edge innovations shaping our world. By connecting science, history, and society, the event aims to raise public awareness and foster international and interdisciplinary dialogue on quantum science and technology.

CRESTCon Australia 2025

CRESTCon Australia 2025 is more than just a cybersecurity conference—it is a hub for technical excellence, industry collaboration, and career inspiration. From technical deep dives to thought-provoking panel discussions, this conference offers a rare opportunity to explore the latest innovations, challenges, and solutions in the ever-evolving digital threat landscape.

Quantum technology could potentially transform the threat landscape, but the real risks and what needs to be done are poorly understood.

The conference will feature a talk from Dr Rajiv Shah titled “Security threats from quantum computing—a realistic assessment of the threat, lessons from real-life experience, and practical advice.”

Optics and Its Applications in Quantum Technologies

The advancement of optical science and quantum technologies represents a key area of modern physics with applications in quantum communication, computation, and sensing. International collaboration in these fields is essential for fostering knowledge exchange, innovation, and interdisciplinary research. Given the strong expertise in optics and quantum physics in Germany and Armenia, this binational WE-Heraeus seminar presents a unique opportunity to build synergies between researchers in both countries.

Armenia has a rich tradition in optical and quantum research, with strong contributions in theoretical physics, laser technologies, and photonics. With this seminar, we aim to promote scientific cooperation, strengthen academic ties, and create a platform for discussing recent developments in fundamental and applied optics with a special focus on quantum technologies.

IBM Research Africa Quantum Meetup: A Framework for Secure Financial Transactions with Relativistic Quantum Tokens

We’re excited to welcome Isa Tippens from the University of Western Cape as our featured speaker in this engaging seminar series. The event will be held in a hybrid format, with in-person attendance at Wits, Gatehouse, and online participation available.

Research into quantum money dates back to the 1980s, but its practical implementation has been delayed due to the absence of efficient quantum memory. Isa’s project bridges the gap by integrating quantum and classical techniques to demonstrate a proof-of-concept transaction system. Combining quantum communication and cryptography, the project combines quantum key distribution, hashing, and GPS-based time synchronization protocols to create a secure quantum banknote framework. This approach enables the anonymous generation, exchange, and verification of quantum banknotes while maintaining robust security against counterfeiting.