Top 10 Quantum Events for Government in 2026 

Quantum computing is an operational reality that is rapidly reshaping national security, cryptography and mission-critical data processing across the Public Sector. As adversaries accelerate their own quantum cryptography standards and explore quantum networking architectures, Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, is proud to support Government stakeholders at the forefront of this transformation. Together with our network of leading quantum technology partners, Carahsoft is committed to connecting Government agencies with the expertise, solutions and community they need to navigate the quantum landscape with confidence. Below, we highlight the top quantum events of 2026 and how Carahsoft is helping drive the mission forward. 

Convening to Act: Accelerating U.S. Post-Quantum Cryptography Adoption 

March 17, 2026 | Hyattsville, MD | In-Person Event 

Join the National Cryptologic Foundation for an event centered on Quantum-Resistant Cryptography (QRC) adoption where toady’s cyber leaders unite to accelerate the nation’s transition to post-quantum security. This high-impact forum brings together experts from Government, industry and academia to explore best practices for cryptography inventory and modernization, learn how leading organizations are transitioning to QRC standards and experience live demonstrations showcasing advanced migration tools and techniques. Through strategic dialogue and real-world insights, attendees gain clarity and momentum needed to act on emerging standards and mandates. 

Carahsoft will have a tabletop presence at Convening to Act. Carahsoft partners in attendance include: SafelogicSandboxAQQanapiISARAEntrust and QuSecure. Carahsoft’s involvement in this event supports published national security priorities by empowering commercial, defense and Intelligence Community (IC) participants to understand and operationalize newly released Federal guidance on Post-Quantum Cryptography (PQC) deployment. Our team will be present to help organizations strengthen their future-proofing strategies and contribute to securing the nation’s digital infrastructure. 

ATARC Quantum Speaker Series: Accelerating Quantum Innovation Through Standardization 

March 24, 2026 | 1:30-2:30pm ET | Virtual Event 

Join the Advanced Technology Academic Research Center (ATARC) for a high-impact session in its Quantum Speaker Series. This focused 30-minute webinar highlights the work of the Advancing Standardization for Critical and Emerging Technologies (ASCET) Center of Excellence, an initiative dedicated to strengthening U.S. leadership in international quantum standards. Attendees will gain insight into how ASCET is broadening participation in quantum standardization, cultivating the next generation of quantum experts and supporting U.S. Private Sector priorities through training, tools and strategic initiatives. 

Carahsoft recommends attending this webinar from the ATARC Quantum Speaker Series, reinforcing our dedication to advancing U.S. quantum competitiveness. The webinar format provides a platform that enables quantum experts to share their experiences and insights with a broad Government audience, making PQC knowledge accessible to agencies regardless of their location or resources. 

Golden Dome: Quantum Proofing America’s Shield 

April 23, 2026 | 3:00-5:00pm ET | Virtual Event 

The “Golden Dome” for America has moved from vision to reality, creating a massive, interconnected architecture of space-based sensors, kinetic interceptors and Command and Control (C2) networks. However, this “system of systems” is only as strong as the data paths that connect it. As adversaries accelerate their quantum computing capabilities, the encryption protecting on-orbit capabilities, satellite links, ground-based systems and decision-support chains faces an existential threat. 

Quantum-Proofing the Golden Dome is a practical, mission-focused deep dive into hardening the nation’s shield. The architects of the initiative will come together with the builders of the technology to define a clear path for quantum-resilient security in the next 12–24 months. 

Sessions to Look Out For: 

  • The Golden Dome Architecture: Security at Every Segment – A high-level view of the interoperability requirements across the Golden Dome segments. Bob Gourley, CTO at OODA LLC, will outline why the single attack surface of missile defense, space and C2 demands quantum-resilient security. From radar feeds to firmware signing, the specific data paths that are most at risk today will be identified. 

Carahsoft is proud to host Golden Dome: Quantum Proofing America’s Shield at the Carahsoft Conference & Collaboration Center in Reston, VA, bringing together the architects and builders of the nation’s most critical missile defense initiative to chart a clear path toward quantum-resilient security. We are excited to provide a platform for experts in the quantum community to share their critical, real-world insights with Government leaders, defense professionals and technology innovators. 

Quantum Tech World 

June 25-26, 2026 | Boston, MA | In-Person Event  

Step into the future at Quantum Tech World 2026, the premier global summit where quantum computing, artificial intelligence (AI) and high-performance computing (HPC) converge to redefine what is possible. This event unites more than 1,000 innovators, industry leaders, policymakers and researchers from 40+ countries to explore the breakthroughs shaping the next era of technology. Attendees will have the chance to listen to expert speakers, participate in trainings and earn certifications that will provide the insights, tools and connections needed to drive quantum adoption at enterprise scale. 

Sessions to Look Out For:  

  • Aerospace & Defense: Mission-Critical Quantum Innovation – Quantum technologies are revolutionizing the mission landscape for aerospace and defense, unlocking capabilities in sensing, navigation and secure communications. This panel gathers global leaders from Government, research and industry to discuss how quantum breakthroughs are enhancing resilience, accelerating innovation and securing critical infrastructure in an increasingly complex world. 

Many of Carahsoft’s leading quantum technology partners will be in attendance—including IBMQuintessenceLabs and ClassIQ—offering attendees direct access to cutting-edge solutions and expertise spanning PQC, quantum networking and quantum sensing. As Carahsoft deepens its engagement with the quantum ecosystem, this event represents a valuable opportunity for Government stakeholders to connect with our partner community and explore solutions best suited to their agency’s mission needs.  

2026 Quantum Computing User Forum 

July 20-24, 2026 | Oak Ridge, TN | In-Person Event 

Get ready to join the global community at the 2026 Quantum Computing User Forum, taking place at Oak Ridge National Laboratory, one of the nation’s premier centers for advanced computing and scientific innovation. The Forum will feature interactive sessions, allowing attendees to explore emerging best practices in quantum application development, software frameworks and simulation techniques. Designed for both current users of the Quantum Computing User Program (QCUP) and the broader research ecosystem, this event offers the opportunity to connect directly with the scientists, developers and technologists shaping the future of quantum computing devices and systems.  

Carahsoft’s expanding quantum portfolio includes a number of partners focused specifically on quantum computing hardware, software and integration, making this an ideal environment for agencies to explore the breadth of available solutions. This forum aligns with our commitment to linking Government agencies with the solutions they need to prepare for the quantum era.  

DoDIIS 

August 9-12, 2026 | Tampa, FL | In-Person Event 

The Department of Defense Intelligence Information System (DoDIIS) is the premier intelligence and defense technology forum hosted by the Defense Intelligence Agency (DIA), convening quantum scientists, engineers and innovators dedicated to shaping how quantum will secure, empower and transform the U.S. defense ecosystem. This year’s theme, “DIA Next: Intelligence Technologies for Battlespace Lethality,” places groundbreaking quantum capabilities at the center of national defense modernization. As intelligence technologies increasingly rely on quantum-inspired algorithms, advanced sensing, secure communications and next-generation computational architectures, DODIIS 2026 offers the opportunity for quantum leaders to engage directly with the mission owners shaping the future of global security. 

Carahsoft is proud to host an expansive partner pavilion at DoDIIS 2026, reinforcing our commitment to connecting Government customers with meaningful connections and a deeper understanding of the solutions available to support their mission. Attendees are encouraged to visit our pavilion, which will feature interactive demo kiosks, exhibitor booths and speaking opportunities, providing access to our broad ecosystem of quantum and intelligence-focused technology partners.  

TechNet Augusta 

August 17-20, 2026 | Augusta, GA | In-Person Event 

TechNet Augusta 2026 is at the center of the nation’s cyber operations dialogue. This principal Armed Forces Communications and Electronics Association (AFCEA) event, developed with assistance from the U.S. Army Cyber Center of Excellence (CCoE), brings together military leaders, Government decision makers and industry innovators to explore the evolving challenges and advances shaping the cyber domain. Across four days of mission-focused programming, attendees will dive deep into the technologies, strategies and operational imperatives driving modern cyber electromagnetic activities and unified land operations. Designed to open the lines of communication between defense stakeholders and the commercial sector, TechNet Augusta provides the opportunity to connect and collaborate with leaders and operators at every level as they chart the future of U.S. cyber superiority. 

Carahsoft is proud to support the Government and defense community at TechNet Augusta, hosting demo kiosks where attendees can explore our partners’ quantum and cybersecurity solutions. Carahsoft’s involvement reflects our ongoing dedication to ensuring Government customers have direct access to the expertise and solutions needed to advance their mission-critical technology strategies. 

Quantum World Congress 

September 22-24, 2026 | College Park, MD | In-Person Event 

Quantum World Congress (QWC) is the gathering where leaders across science, industry, Government, finance and education are shaping the future of quantum technology. Since 2022, QWC has served as an international platform for unveiling innovations, accelerating commercialization and forging the partnerships that move quantum from the lab into the real world. Attendees will explore advancements in communications, computing, sensing, materials, security and cross-sector applications. With the National Quantum Initiative Act (NQIA) Reauthorization signaling long-term Federal momentum, QWC delivers the insights, strategy and connections organizations need to lead in the era of quantum advantage. 

Carahsoft is exploring opportunities to expand our presence for QWC 2026 as we continue to deepen our engagement with the quantum community and expand the resources available to our Government customers and vendor partners. Carahsoft’s growing quantum portfolio spans a broad range of mission-aligned solutions, and the QWC represents an ideal opportunity for attendees to engage directly with tools best suited to their needs. 

TechNet Indo-Pacific 

October 27-29, 2026 | Honolulu, HI | In-Person Event 

AFCEA International and AFCEA Hawaii have re-named their signature event TechNet Indo-Pacific. As the largest strategic defense and technology event in the Indo-Pacific Rim, the conference brings together U.S. and allied military leaders, Government technologists, researchers and industry experts to address the region’s most pressing challenges. For quantum professionals, this is an incredible opportunity to explore quantum-enhanced sensing for maritime and space domain awareness, PQC for resilient communications, secure distributed computing at the tactical edge and hybrid quantum-classical tools for intelligence fusion. With exhibitor showcases, mission-focused technical sessions and direct access to decision makers responsible for shaping regional defense strategy, the event provides a powerful platform to influence the future of secure, high-performance capabilities across the Indo-Pacific. 

Carahsoft will have a tabletop presence at TechNet Indo-Pacific, continuing our engagement with military and Government leaders at one of the most strategically important cybersecurity and technology events in the Pacific region. Attendees will have the opportunity to connect with our team and explore our partners’ exhibits, which will feature hands-on demonstrations and mission-aligned solutions designed to meet the specific requirements of military and defense agencies operating in the region. 

Super Computing 2026   

November 15-20, 2026 | Chicago, IL | In-Person Event 

Join the global leaders of HPC, networking, storage and advance analytics at Super Computing 2026 (SC26), an annual gathering that will define the next generation of computational innovation. Attendees can immerse themselves in a technical program built to accelerate discovery, featuring groundbreaking research in architectures, algorithms, machine learning at scale, distributed systems, visualization, data analytics and emerging technologies. The expansive exhibit floor will feature major industry innovators, national laboratories, universities and startups showcasing advanced systems, tools and solutions driving the fastest supercomputers and tomorrow’s exascale-to-quantum workflows. Whether shaping compute-intensive science, engineering extreme-scale systems or advancing quantum-ready architecture, SC26 provides unmatched opportunities to learn, collaborate and lead within the global HPC ecosystem. 

Carahsoft will be an exhibitor at the SC26, showcasing the latest advancements in quantum computing and HPC solutions from our technology partners, including D-WaveQuantinuum and IBM. Attendees are encouraged to visit Carahsoft’s exhibit to engage with our quantum-focused partner community, gain hands-on experience and learn how quantum computing technologies are transforming operations and driving breakthroughs across scientific and Public Sector missions. 

The quantum era presents both extraordinary opportunities and significant challenges for Government agencies committed to maintaining strategic advantage and protecting sensitive data. The events highlighted above represent the most critical forums for policy dialogue, technical education and cross-sector collaboration as the Public Sector works to operationalize quantum-ready solutions. Whether your agency is just beginning to assess its quantum posture or actively implementing PQC standards, Carahsoft and our trusted partner ecosystem are here to support every stage of that journey. 

To learn more or get involved with any of the above events, please contact us at QuantumComputing@carahsoft.com 

For more information on Carahsoft and our industry-leading quantum technology partners’ solutions, visit our quantum solutions portfolio. 

Preparing Federal Systems for Post-Quantum Security: A Strategic Approach

Federal agencies face an urgent timeline to protect their most sensitive data from quantum computing threats. Quantum computers leverage physics principles like superposition and entanglement to perform calculations faster than classical computers, posing a significant threat to current encryption standards. Adversaries employ “harvest now, decrypt later” tactics, collecting encrypted data to store until there is a quantum computer powerful enough to break the encryption. The National Institute of Standards and Technology (NIST) released standardized Post-Quantum Cryptography (PQC) algorithms designed to withstand quantum attacks, ensuring long-term data security. The U.S. Federal Government has also issued guidance urging Federal agencies to update their IT infrastructure and deploy crypto-agile solutions that utilize today’s classical encryption algorithms and provide the ability to upgrade to PQC algorithms to combat this threat.

With the Cloud Security Alliance projecting cryptographically relevant quantum computers by 2030, agencies must implement these quantum-resistant algorithms before current security measures become obsolete.

The Quantum Threat Landscape

Current public key infrastructure (PKI), which underpins the internet, code signing and authentication, faces an existential threat from quantum computing. This vulnerability extends beyond theoretical concerns to three specific risk areas affecting Federal systems:

  1. Harvest Now, Decrypt Later: Attackers intercept communications and data today, storing them until quantum computers can break the encryption—potentially exposing Government secrets and sensitive information.
  2. Forged Signatures: Quantum capabilities could enable impersonation of trusted entities, allowing attackers to load malicious software to long-life devices or create fraudulent financial transactions that impact both commercial and Federal Government systems.
  3. Man-in-the-Middle Attacks: Advanced quantum computing could facilitate access to secure systems, potentially compromising military command and control (C2) environments, disrupting critical infrastructure and interfering with elections.

The most vulnerable assets are those containing long-lived data, including decades of trade secrets, classified information and lifetime healthcare and personal identifiable information. Short-lived data that exists for hours or months faces considerably less risk from quantum-enabled decryption.

Post-Quantum Cryptography Standards and Timeline

The standardization of quantum-resistant algorithms represents the culmination of an eight-year process spearheaded by NIST. In August 2024, NIST published its final standards for three critical algorithms:

  • ML-KEM (formerly Crystals-Kyber) | FIPS 203 | Key Encapsulation
  • ML-DSA (formerly Crystals-Dilithium) | FIPS 204 | Digital Signature
  • SLH-DSA (formerly HSS/LMS) | FIPS 205 | Stateless Hash-Based Signature

A fourth algorithm, FND-DSA (formerly Falcon), is still pending finalization. Simultaneously, NIST has released Internal Report (IR) 8547, providing comprehensive guidelines for transitioning from quantum-vulnerable cryptographic algorithms to PQC.

The National Security Agency’s (NSA) Commercial National Security Algorithm Suite 2.0 (CNSA 2.0), released in September 2022 with an FAQ update in April 2024, outlines specific PQC requirements for National Security Systems. These standards have become reference points for Federal agencies beyond classified environments, establishing a staggered implementation timeline:

  • 2025-2030: Software/firmware signing
  • 2025-2033: Browsers, servers and cloud services
  • 2026-2030: Traditional networking equipment
  • 2027: Begin implementation of operating systems

Crypto Agility and Transition Strategy

It is essential for Federal agencies to deploy crypto-agile solutions that provide the ability to quickly modify underlying cryptographic primitives with flexible, upgradable technology. This capability allows organizations to support both current algorithms and future quantum-resistant ones without hardware replacement.

A comprehensive transition strategy includes seven critical steps:

  1. Awareness: Understand the challenges, risks and necessary actions to prepare for quantum threats.
  2. Inventory and Prioritize: Catalog cryptographic technologies and identify high-risk systems—a process the Cybersecurity and Infrastructure Security Agency (CISA) mandated via spreadsheet submission last year.
  3. Automate Discovery: Implement tools that continuously identify and inventory cryptographic assets, recognizing that manual inventories quickly become outdated.
  4. Set Up a PQC Test Environment: Establish testing platforms to evaluate how quantum-resistant algorithms affect performance, as these algorithms generate larger keys that may impact systems differently.
  5. Practice Crypto Agility: Ensure systems can support both classical algorithms and quantum-resistant alternatives, which may require modernizing end-of-life hardware security modules.
  6. Quantum Key Generation: Leverage quantum random number generation to create quantum-capable keys.
  7. Implement Quantum-Resistant Algorithms: Deploy PQC solutions across systems, beginning with high-risk assets while preparing for a multi-year process.

Practical Implementation of PQC

Thales, Preparing Federal Systems for Post Quantum Security, blog, embedded image, 2025

Federal agencies should look beyond algorithms to consider the full scope of implementation requirements. The quantum threat extends to communication protocols including Transport Layer Security (TLS), Internet Protocol Security (IPSec) and Secure Shell (SSH). It also affects certificates like X.509 for identities and code signing, as well as key management protocols.

Hardware security modules (HSMs) and high-speed network encryptors serve as critical components in quantum-resistant infrastructure. These devices must support hybrid approaches that combine classical encryption with PQC to maintain backward compatibility while adding quantum protection.

The National Cybersecurity Center of Excellence (NCCoE) is coordinating a major post-quantum crypto migration project involving more than 40 collaborators, including industry, academia, financial sectors and Government partners. This initiative has already produced testing artifacts and integration frameworks available through NIST Special Publication (SP) 1800-38.

Crypto Discovery and Inventory Management

Automated discovery tools represent a crucial capability for maintaining an accurate and current inventory of cryptographic assets. Unlike the one-time manual inventories many agencies completed in 2022-2023, these tools enable continuous monitoring of cryptographic implementations across the enterprise.

Several vendors offer specialized solutions for cryptographic discovery, including InfoSec Global, Sandbox AQ and IBM. These tools can:

  • Discover and classify cryptographic material across environments
  • Identify which assets are managed or unmanaged
  • Determine vulnerability to quantum attacks
  • Support centralized crypto management and policies

The Cloud Security Alliance has coined the term “Y2Q” (Years to Quantum) as an analogy to the “Y2K bug,” highlighting the need for systematic preparation. However, the quantum threat represents a potentially more significant risk than Y2K, with a projected timeline that places a cryptographically relevant quantum computer capable of breaking current cryptography by April 14, 2030.

Moving Forward with Quantum-Resistant Security

The transition to post-quantum cryptography is not optional for Federal agencies—it is an imperative. While the process requires significant investment in time and resources, the alternative—leaving sensitive Government data vulnerable to decryption—poses an unacceptable risk to national security.

Agencies should begin by evaluating their existing cryptographic inventory, prioritizing systems with long-lived sensitive data and developing implementation roadmaps aligned with NIST and NSA timelines. By taking incremental steps today toward quantum-resistant infrastructure, Federal organizations can ensure their critical information remains secure in the quantum computing era.

To learn more about implementing quantum-resistant security in Federal environments, watch Thales Trusted Cyber Technologies’ (TCT) webinar, “CTO Sessions: Best Practices for Implementing Quantum-Resistant Security.”

Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator for our vendor partners, including Thales TCT we deliver solutions for Geospatial, Cybersecurity, MultiCloud, DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the Carahsoft Blog to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft’s ecosystem of partner thought-leaders.

Key Insights from Global Cyber Innovation Forum 2025 

The 2025 Global Cyber Innovation Forum served as a premier gathering where cybersecurity’s most pressing challenges meet collaborative solutions.  

Hosted by  Forgepoint Capital, Snowflake, Forescout, Google Cloud and Carahsoft at the Embassy of Canada in Washington, D.C., the Forum brought together a curated audience of influential cyber leaders from across the globe, including industry executives, Government officials, policy leaders, venture capitalists and thought leaders from academia and the non-profit sector.  

This annual event provided a platform for critical discussions on emerging threats, technological innovation and strategic partnerships essential for securing our digital infrastructure. Five key themes stood out throughout the sessions: 

  • National Security Threats with Supply Chain Vulnerabilities 
  • The Rise and Race to AI Dominance 
  • The Edge of Quantum Transformation 
  • Typhoon of Attacks on Critical Infrastructure 
  • Streamlining Cybersecurity Compliance 

National Security Threats with Supply Chain Vulnerabilities 

The digital supply chain, specifically software and applications civilians use, have increasingly become a source of critical national security vulnerabilities. Government officials and industry leaders warn that software and digital platforms sourced from foreign adversaries have reshaped the threat landscape by implanting foreign influence in the U.S. technology ecosystem.  

Technology serves as a funding mechanism for adversaries and comes with a hidden price of mass data collection, making it easier for threat actors to access sensitive information and transform traditional cyberattacks. The lack of transparency in certain nation-states raises concerns on regulatory consequences, potentially giving adversaries a strategic edge in information warfare and creating a blind spot in the global tech supply chain.  

U.S. leaders emphasize the necessity for regulated technology supply chains and accelerated Federal certifications, specifically FedRAMP, to ensure innovation does not come at the cost of national security. 

Rise and Race to AI Dominance 

With the rise of artificial intelligence (AI), data has become the modern form of power. Foreign adversaries are striving to build or gain access to data pipelines to fuel their AI models, bypassing privacy in a way that allows them to train AI models much faster than has been possible in America. The U.S. must counter this by accelerating our own AI model training and innovation, while safeguarding privacy and data integrity.  

Government and industry experts state that AI is being underutilized across U.S. operations. The current administration has streamlined AI usage through Executive Order 14179: Removing Barriers to American Leadership in Artificial Intelligence and Executive Order 14277: Advancing Artificial Intelligence Education for American Youth. Additionally, AI should be deployed when combating advanced cyberattacks and automating routine cybersecurity efforts such as threat detection, incident response and vulnerability identification. 

The Edge of Quantum Transformation 

Emerging technologies such as quantum computing are rapidly approaching mainstream adoption. The massive amount of encrypted data currently stored in secret could be vulnerable to decryption within the next 5 to 10 years. This hovering threat has made the development and deployment of post-quantum cryptography a top priority for the U.S. Government. The race to post-quantum cryptography and quantum computers has not just been an urgency for the U.S. and its allies, but also for adversarial nation-states. 

Typhoon of Attacks on Critical Infrastructure 

Advanced persistent threat (APT) groups such as Salt Typhoon, Volt Typhoon and Flax Typhoon have already infiltrated critical infrastructure systems, often using “living off the land” techniques. These public and well documented attacks are considered digital terrorism, disrupting U.S. critical infrastructure operations and stealing intellectual property.  

In response, the U.S. Government is prioritizing cyber hygiene, secure-by-design and the development of an integrated and robust defense system. Agencies, technology providers and critical infrastructure operators are heavily encouraged to collaborate through information sharing, adoption of emerging technologies and routine threat assessments. The severity of these cyberattacks have increased substantially, highlighting the urgency for a more proactive and coordinated national response from the U.S. Government. 

Streamlining Cybersecurity Compliance 

The current cybersecurity regulatory landscape presents a fragmented maze of overlapping requirements that hinder both innovation and effective security implementation. Government and industry security teams are overwhelmed by conflicting standards across Federal, State and agency-specific frameworks. Organizations must navigate multiple compliance frameworks—FedRAMP, National Institute of Standards and technology (NIST) requirements, Cybersecurity Maturity Model Certification (CMMC) and various state requirements—creating redundant processes that drain resources without enhancing security. 

To address this, industry leaders are advocating for regulatory harmonization initiatives. Federal agencies are working to align various compliance frameworks while updating modernization strategies to build interoperability. By aligning around core standards like NIST 800-53 and implementing automated compliance tools, agencies can reduce complexity while maintaining robust cybersecurity postures. Forum participants agreed: harmonized regulations are essential to enabling secure innovation without compromising oversight. 

The Global Cyber Innovation Forum demonstrated that securing America’s digital future requires unprecedented coordination between Government agencies, private industry and international allies. As adversaries continue exploit emerging technologies, the U.S. must respond with unified strategies that streamline regulations, accelerate innovation and sustain global cyber leadership. The insights shared offer a critical roadmap for defending against tomorrow’s threats in a rapidly evolving digital landscape. 

Visit Carahsoft’s Resource Hub to dive deeper into the key takeaways, expert perspectives and resources from the 2025 Global Cyber Innovation Forum. 

Quantum Computing’s Latest Breakthrough: Why Government Encryption Standards Face a New, Unexpected Threat

Last week, international scientists made headlines by successfully cracking a 50-bit RSA encryption integer using D-Wave’s Advantage quantum computer. While it’s true that a 50-bit key is vastly smaller than the 2048-bit keys used in modern RSA encryption, the significance of this achievement lies in how it was done. Unlike traditional attacks based on Shor’s algorithm and quantum gate computers, the researchers utilized a quantum annealing system, designed for optimization rather than direct factoring. This shift in approach raises important questions about the timeline for when quantum computers could crack full-scale RSA encryption, potentially accelerating the threat to current cryptographic standards far sooner than expected.

Marion Square Quantum Computing and Cybersecurity Blog Embedded Image 2024

For years, the vulnerability of public key encryption has been understood primarily as a factoring problem, since the security of encryption algorithms like RSA relies on the difficulty of factoring large composite numbers. Shor’s algorithm, widely regarded as the most probable path to breaking public key encryption, is designed specifically to factor these numbers exponentially faster than classical methods, posing a significant future threat to encryption systems. However, in a surprising turn, the international researchers in this recent attack used a quantum annealing computer, which is designed for optimization tasks, not factoring. This innovative approach represents a completely different method of breaking RSA encryption, highlighting that the threat from quantum computing may emerge from unexpected directions, advancing the risk timeline beyond what many experts anticipated.

This breakthrough also underscores the growing versatility of quantum annealing in solving problems once thought exclusive to gate-based quantum computers. Traditionally, annealing systems have been seen as ideal for optimization problems in fields such as logistics, material science, and machine learning—not for cryptographic attacks. However, the international researchers effectively re-framed RSA decryption as an optimization challenge, unlocking new potential in quantum annealing. While quantum annealing computers like D-Wave’s systems were not originally designed for factorization tasks, this achievement raises important questions about their ability to scale to larger key sizes and tackle more complex encryption algorithms. If quantum annealing can be adapted for cryptography at higher levels, it could potentially shorten the timeline for when quantum computers might become a real-world threat to encryption standards. Though hurdles remain, this new approach widens the scope of quantum threats to cryptographic systems, showing that the race to quantum-safe encryption may need to accelerate.

In conclusion, this breakthrough in quantum annealing highlights the increasing urgency for federal agencies to prioritize their post-quantum encryption (PQE) transition. The rapid evolution of quantum computing, coupled with the potential for new cryptographic vulnerabilities, underscores the need to meet the milestones set by NSM 10 and OMB 23-02. Agencies that have not yet initiated or fully engaged in this process risk falling behind as quantum advancements accelerate. The time to act is now—establishing cryptographic leadership, conducting comprehensive inventories, and securing appropriate resources are critical first steps. Preparing today will ensure the resilience of federal systems in a quantum-enabled future.

To learn about the latest standards set forth by NIST and how Marion Square can support your Quantum Computing and compliance initiatives, view our webinar, “Mastering NIST PQE Standards: A Guide for Federal Compliance.”