Quantum Computing "Countdown": New Study Says RSA Encryption Could Be Cracked in 5 Years

Advanced Quantum Technologies Institute releases study saying quantum computers could crack RSA encryption 5 years earlier than expected. This means global banking, military communications, and even Bitcoin could be exposed to risk within a decade. Time is running out.

Quantum Computing "Countdown": New Study Says RSA Encryption Could Be Cracked in 5 Years

Washington — March 2, the Advanced Quantum Technologies Institute released a report that shook the security industry. The core conclusion is unsettling: quantum computers could crack current RSA encryption five years earlier than previously expected.

"This is no longer a question of 'if' but 'when,'" the report authors wrote. "We recommend all relevant parties immediately initiate post-quantum cryptography migration plans."

A Postponed "Doomsday"

The story begins in 2019.

That year, Google announced "quantum supremacy" — its 53-qubit processor completed a calculation in 200 seconds that would take a traditional supercomputer 10,000 years. Although this specific problem had no practical application, it proved quantum computing could indeed disrupt existing encryption systems.

At that time, the consensus among security experts was: cracking RSA-2048 (the most widely used encryption standard today) would require about 10 million qubits, with an estimated timeline — the 2030s.

But the Advanced Quantum Technologies Institute's new research suggests this timeline may be overly optimistic.

"Our model shows that if quantum computing development maintains its current pace, the capability to crack RSA-2048 could arrive as early as 2031," project leader Dr. Sarah Chen said at a press conference. "This is five years earlier than previous consensus."

Why Is This the "Worst Case"?

Quantum computing development isn't linear.

Traditional computers follow Moore's Law, doubling performance every 18 months. But quantum computing is different — it relies on qubit quality and quantity, and progress in both is often non-linear, sometimes hitting "plateaus."

"The problem is, we don't know when the next breakthrough will come," Dr. Chen explained. "It could be next year, or it could be ten years from now. But if we wait until we're 'certain' to act, it's too late."

This is why the NSA and NIST have been heavily promoting post-quantum cryptography (PQC) standardization over the past few years.

An Invisible "Arms Race"

Actually, this race began long ago.

In 2016, NIST launched its post-quantum cryptography standardization initiative; in 2022, the first standards were officially published; in 2024, the U.S. government required all federal systems to complete migration by 2030.

But corporate response has been uneven.

"Big tech companies are generally proactive," said a cybersecurity executive. "But small and medium businesses are largely indifferent. They think the 'quantum threat' is still far away, and migration costs are high."

This mindset is similar to the "Y2K" problem 20 years ago — many people thought nothing would happen on December 31, 1999, but the result was global spending hundreds of billions on fixes.

"History always repeats," the executive said. "But people always forget the lesson."

Who Is Most at Risk?

If quantum computers can truly crack RSA encryption, the following areas face the greatest risk:

Financial systems: Interbank SWIFT communications, credit card transactions, even Bitcoin blockchain all rely on encryption

Military communications: Government communications encryption could become plaintext overnight

Medical records: Personal health data encryption protection will fail

Government secrets: Long-term security of classified documents cannot be guaranteed

Financial systems: Interbank SWIFT communications, credit card transactions, even Bitcoin blockchain all rely on encryption

Military communications: Government communications encryption could become plaintext overnight

Medical records: Personal health data encryption protection will fail

Government secrets: Long-term security of classified documents cannot be guaranteed

"Interestingly, the Bitcoin community is actually more nervous than traditional finance," noted a cryptocurrency researcher. "Because traditional finance can rely on law and regulation, but decentralized systems can only rely on themselves."

Is China Ready?

As the world's second-largest economy and an important player in quantum computing, China's situation also deserves attention.

On one hand, China leads globally in quantum communication — the "Micius" quantum satellite and quantum secure communication networks are already deployed; on the other hand, China lags relatively in post-quantum cryptography standardization.

"This is a delicate situation," said a domestic cryptography expert. "We have advantages in quantum communication but started later in post-quantum cryptography. Now we must speed up."

The good news is China has begun acting. According to sources, relevant departments are formulating national post-quantum cryptography standards, expected to be completed by 2027.

Epilogue

Back to the Advanced Quantum Technologies Institute's report.

At the end, Dr. Chen wrote something thought-provoking:

"Quantum computing is a beautiful technology that could solve some of humanity's greatest challenges — climate change, drug discovery, materials science. But it's also a double-edged sword. If we don't prepare security in time, the cost could be catastrophic.

We still have 5-8 years. That's not short, but it's not long either."

Reference: Quantum Zeitgeist, NIST PQC Standardization, Wired