News:

Welcome to Qday.forum  :: Be kind, courteous and help other people.

Main Menu

Who Will Be Remembered After Q-Day? The Pillars of Quantum Computing & Quantum Security

Started by QuantumLeap, Apr 27, 2026, 02:33 PM

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

Topic: Who Will Be Remembered After Q-Day? The Pillars of Quantum Computing & Quantum Security   Views(Read 24 times)
qdayquantum dayarticlequantumq-day

QuantumLeap

You cannot view this attachment.
Who Will Be Remembered After Q-Day? The Pillars of Quantum Computing and Quantum Security

If Q-Day becomes a public moment, the famous names may not only be the people who built quantum computers. They may also be the people who warned, prepared, standardised, migrated, explained, and quietly stopped the worst outcomes from happening.

TLDR

If Q-Day ever becomes a household phrase, the public will probably remember the story badly.

They may remember one company, one scientist, one algorithm, one government announcement, one Bitcoin panic, or one dramatic headline. But the real story will be much wider than that.

The pillars of quantum computing will include the theorists who imagined the machines, the algorithm designers who showed why old cryptography could be vulnerable, the engineers trying to build useful quantum hardware, the cryptographers building post quantum replacements, the standards bodies coordinating migration, and the explainers trying to keep everyone sane.

The person remembered by the man on the street may not be the most important person in the story. History is rarely that fair.

1. Public memory likes heroes, even when history was built by crowds

The public does not remember technology the way technology actually happens.

It remembers names.

Einstein becomes the face of relativity. Turing becomes the face of computation and codebreaking. Jobs becomes the face of the smartphone age. Satoshi becomes the face of Bitcoin, even though nobody can even agree who Satoshi is. These names become shortcuts. They are easier to repeat than a long list of researchers, engineers, institutions, failed prototypes, committees, arguments, revisions, and dull implementation work.

Quantum computing will probably suffer the same fate.

If Q-Day becomes a public event, most people will not remember the full chain of ideas that led there. They will not remember every university group, standards meeting, error correction paper, engineering compromise, government roadmap, or cryptographic submission. They will remember a few names, if that.

That is not because the public is stupid. It is because public memory compresses complicated history into stories it can carry.

The danger is that Q-Day may be remembered as a single dramatic moment caused by one genius, one company, or one villainous machine. That would be wrong. The more interesting truth is that Q-Day, if it comes, will be the result of many different pillars holding up the same strange building.

Some people will have made quantum computing possible.

Some will have warned what it could threaten.

Some will have built the replacement cryptography.

Some will have guided migration.

Some will have explained what was real and what was nonsense.

Some may only become visible when something goes wrong.

And some of the most important people may never become famous at all.

That is the awkward truth of big technology. The person whose name survives is not always the person who did the most important work.

2. The first pillar: the people who imagined quantum computers before they existed

Before quantum computing was a race between companies, chips, labs, governments, and investors, it was an idea that sounded almost unreasonable.

What if computation itself could use quantum behaviour?

What if a machine could process information in a way that was not merely faster classical computing, but genuinely different?

What if simulating quantum systems required a quantum machine?

This is where the early theoretical names matter.

Richard Feynman is one of the obvious pillars. He did not build the machines people talk about today, but he helped make the question famous: if nature is quantum, perhaps a computer that uses quantum rules could simulate nature better than an ordinary classical machine.

Paul Benioff is another early name in the foundations of quantum computation. David Deutsch then gave the field one of its great conceptual steps by describing the idea of a universal quantum computer.

These are not "man in the street" names in the way Einstein is. Not yet. But if quantum computing becomes a public historical story, they are the kind of names that may move from specialist history into popular explanation.

The public likes origin stories. It likes the first spark. It likes the moment when someone looked at the existing world and said: this is not the only way.

If Q-Day becomes famous, Feynman may be remembered as the person who helped make quantum computing feel imaginable. Deutsch may be remembered as one of the people who made it feel formal. Benioff may be remembered by those who want the fuller early history.

But even here, there is a warning. The origin story is always cleaner than reality. Quantum computing did not begin because one person had one bright idea and everyone else followed. It emerged from physics, computer science, mathematics, information theory, and a long willingness to ask strange questions before the hardware could answer them.

That is the first pillar: imagination before machinery.

3. The second pillar: the algorithm names that may escape the laboratory

If there is one name most likely to become known outside technical circles after Q-Day, it is Peter Shor.

That is because Shor's algorithm sits at the heart of the public key cryptography concern. It showed that a sufficiently capable quantum computer could solve certain mathematical problems far more efficiently than classical computers are expected to. Those problems are closely tied to widely used public key cryptography such as RSA and elliptic curve systems.

This is why Shor's name matters.

If Q-Day ever becomes a newspaper, television, government, or banking crisis, the public will ask a simple question: "Who found out quantum computers could do this?"

That question is not perfectly fair, because science does not work like a single magic trick. But public memory will still want an answer. Shor is the name most likely to be attached to it.

Lov Grover may become the second algorithm name people hear. Grover's algorithm is different. It is usually discussed in relation to search and its effect on symmetric cryptography and hashing assumptions. It does not create the same kind of clean public key disaster story that Shor's algorithm does, but it matters in the broader map of quantum risk.

This distinction is important because it helps stop bad explanations.

Shor is not "quantum computers break everything".

Grover is not "all passwords vanish".

These algorithms changed how serious people think about different kinds of cryptographic security. They did not turn every lock into the same lock.

Still, if Q-Day becomes a public moment, algorithms may become characters. That sounds odd, but it happens. People who have never read the papers may still learn the names. Shor may become shorthand for the old public key world becoming unsafe. Grover may become shorthand for why symmetric systems and hashes need to be discussed differently.

That is how a technical name becomes a public symbol.

It stops being just a paper. It becomes a warning label.

4. The third pillar: the people building the escape route

The public may remember the person whose algorithm threatened the old locks.

It may not remember the people who built the new locks.

That would be unfair, because post quantum cryptography is not a side story. It is the escape route.

If quantum computing creates a future threat to widely used public key systems, then the practical answer is not to stare at the machine in horror. The practical answer is to move to cryptographic systems designed to resist both classical and quantum attack.

This is where post quantum cryptography becomes central.

NIST released its first three final post quantum cryptography standards in August 2024: ML-KEM, ML-DSA, and SLH-DSA. ML-KEM is for key establishment. ML-DSA and SLH-DSA are for digital signatures. That matters because Q-Day is not one problem. Keeping communications confidential and proving that something was genuinely signed are related but different tasks. [Source 1]

The names behind these standards are less tidy than the names behind famous algorithms. ML-KEM was originally known as CRYSTALS-Kyber. ML-DSA was originally known as CRYSTALS-Dilithium. SLH-DSA came from SPHINCS+. These were not lone inventor stories. They were team efforts involving researchers, institutions, submissions, reviews, attacks, revisions, and years of standardisation.

IBM has said that ML-KEM and ML-DSA were developed by IBM researchers with outside academic and industry collaborators, and that SLH-DSA was co-developed by a researcher who later joined IBM. [Source 2]

That is an important detail, but it should not turn the article into corporate praise. The larger point is this: the people who make the transition possible may not become household names because their success looks boring.

If post quantum migration works well, most people will never feel saved. Their browser will keep working. Their bank will keep working. Their software updates will keep working. Their messages will keep working. They may not know that a quiet replacement of mathematical assumptions happened underneath them.

That is the strange fate of security work. Failure becomes famous. Success becomes invisible.

The people building the escape route may be among the most important pillars of Q-Day, precisely because their goal is to make sure the public never experiences Q-Day as a disaster.

5. The fourth pillar: the standards people nobody thanks until they are needed

There is a kind of person who rarely becomes famous, but without whom modern life would be chaos.

The standards person.

They sit in committees. They review submissions. They argue about parameters. They write documents most people will never read. They coordinate across governments, researchers, companies, vendors, implementers, and security communities. They turn research into something the real world can deploy.

That is not glamorous work. It is also vital.

NIST is already one of the major names in this story because of its post quantum cryptography standardisation process. The first final standards in 2024 marked the point where post quantum migration stopped being only a research conversation and became an implementation conversation. [Source 1]

The UK National Cyber Security Centre has also published timelines and migration guidance. Other agencies, standards bodies, and protocol communities matter too: IETF, ISO, ETSI, ENISA, national cybersecurity agencies, browser vendors, operating system vendors, certificate authorities, and many more.

This is where Q-Day becomes less like a science story and more like a civilisation story.

A breakthrough in a lab is one thing.

Changing the cryptographic plumbing of governments, banks, hospitals, cloud providers, browsers, phones, devices, software updates, and archives is another thing entirely.

The standards pillar may not give us the name the public remembers. It may give us the process that prevents the public from needing to remember any name at all.

There is a joke hidden in there somewhere. If the standards people do their job well, the public will never know their names. If they fail, everyone will suddenly ask why nobody famous warned them.

That is the unfair bargain.

6. The fifth pillar: the hardware builders trying to make the machines real

The most visible pillar will probably be hardware.

That is what the public can picture. A machine. A chip. A cryostat. A lab. A glowing photograph. A company announcement. A headline saying a new quantum processor has passed some milestone.

People like hardware because it feels real.

Quantum computing hardware is also where the modern race becomes easiest to turn into a public story. IBM, Google, Microsoft, Quantinuum, IonQ, Rigetti, D-Wave, PsiQuantum, Xanadu, QuEra, Atom Computing, Pasqal, IQM, academic labs, national labs, and Chinese research groups are all part of the wider landscape.

The public may remember a company before it remembers a scientist.

That is not unusual. Many people remember "Apple" before they remember the hundreds of engineers behind a product. They remember "Google" before they remember the researchers who made a system possible. They remember "IBM" as a symbol long after the individual names blur.

If Q-Day ever arrives through a public demonstration, the name attached to it may be the lab or company that announces the capability. That does not mean that company created the whole field. It means it owned the moment.

But hardware fame can mislead people.

A bigger number of physical qubits does not automatically mean a useful cryptographic threat. A dramatic quantum advantage experiment does not automatically mean RSA or elliptic curve cryptography is broken. A beautiful machine does not automatically mean fault tolerant computation is solved.

The hardware pillar matters enormously, but it is not the whole story.

The real question is not "who has the most impressive photo?"

The real question is: who can build a machine with enough reliable, error corrected logical qubits to do useful work at scale?

That is a much harder story to sell. It is also the story that matters.

7. The sixth pillar: error correction, the unglamorous road from fragile to useful

If ordinary people ever hear about quantum computing, they will hear about qubits.

They may not hear enough about errors.

That is a problem, because quantum computers are fragile. Noise, decoherence, imperfect gates, control problems, measurement errors, and environmental interference all matter. A machine can have many qubits and still not be useful for the tasks people imagine if those qubits cannot be controlled reliably enough.

This is why quantum error correction may be one of the great hidden pillars of the whole field.

The public wants the magic word "quantum". The field needs the less magical phrase "fault tolerant".

Without error correction, many quantum machines remain impressive but limited. With enough effective error correction, the story changes. That is the bridge between today's noisy machines and the kind of machines that could threaten major cryptographic systems.

John Preskill helped give the current era one of its useful labels: NISQ, meaning Noisy Intermediate-Scale Quantum. His 2018 paper helped frame the idea that near term quantum computers could be scientifically interesting while still being noisy and not yet fault tolerant. [Source 3]

That term matters because it gives people a way to avoid two bad mistakes.

Mistake one: assuming today's quantum computers are useless because they are noisy.

Mistake two: assuming today's quantum computers are already the machines from the Q-Day headlines.

The truth sits between those claims.

The people who solve error correction and fault tolerance may become the real bridge builders. They may not get the public fame of the person standing beside the finished machine, but they may be the reason the machine works at all.

If Q-Day has a hidden engine room, error correction is probably in it.

8. The seventh pillar: the explainers who keep quantum from becoming magic or nonsense

Every difficult field needs explainers.

Not cheerleaders. Not doom merchants. Not people who turn every result into a miracle. Real explainers.

Quantum computing badly needs them because the subject is unusually easy to abuse. The words are already strange: superposition, entanglement, qubits, measurement, decoherence, tunnelling, quantum advantage, quantum supremacy, error correction. Add cryptography, Bitcoin, national security, and government migration to that, and the public conversation can go bad very quickly.

That creates space for two kinds of nonsense.

The first says quantum computers are basically magic and will solve everything.

The second says quantum computers are overhyped nonsense and nothing important will happen.

Good explainers fight both.

John Preskill is one of the obvious public academic names because of his role in framing the NISQ era and because he has long communicated the field's promise and limits. Scott Aaronson is another prominent voice because he often pushes against both hype and misunderstanding around what quantum computers can and cannot do.

There are many others, of course. Some are academics. Some are engineers. Some are cryptographers. Some are journalists. Some are technical bloggers. Some are people in forums who patiently correct the same bad claim for the hundredth time.

That last group should not be dismissed.

Public understanding is not only shaped by famous lectures. It is shaped by comment threads, forums, explainers, diagrams, debunking posts, and the person who says, "Hang on, mining and signatures are not the same thing."

In a field this vulnerable to exaggeration, the explainers are not decoration. They are part of the defence.

If the public conversation stays sane, it will be because enough people refused to let quantum computing become either a religion or a punchline.

9. The eighth pillar: the public face may be a messenger, not an inventor

Here is the part that may feel unfair.

The person the public remembers after Q-Day may not be a scientist.

It may be a government minister.

A cybersecurity chief.

A central banker.

A head of a standards agency.

A technology CEO.

A crypto exchange boss.

A president, prime minister, or regulator standing at a podium.

That is how public memory works. The person attached to the moment is often the person who announces it, not the person who made it possible.

If Q-Day becomes visible through a government warning, the public may remember the official. If it becomes visible through a market shock, they may remember the exchange CEO. If it becomes visible through a major corporate migration, they may remember the company. If it becomes visible through a security failure, they may remember the victim or the attacker.

This is why "who will be famous after Q-Day?" is such a slippery question.

Fame is not the same as importance.

The most important person may be a researcher whose work made secure migration possible. The most famous person may be someone explaining the emergency on television. The most blamed person may be someone who delayed migration. The most quoted person may be someone who says the simplest sentence at the right time.

That is not fair, but it is realistic.

The man on the street rarely remembers the whole supply chain of history. He remembers the face on the screen when the thing became real.

So yes, Q-Day may create famous names. But some of them may be famous for the wrong reasons.

10. The ninth pillar: the system administrators, maintainers, and migration teams

This may be the least glamorous pillar, but it might be the most important in practice.

Someone has to do the migration.

Not talk about it. Not announce it. Not brand it. Do it.

Someone has to find the certificates. Check the libraries. Update the appliances. Replace old protocols. Test the new systems. Coordinate vendors. Audit the results. Handle compatibility. Read the guidance. Fix the weird internal tool nobody remembered. Work out why a smart card, VPN, firmware package, medical device, payment terminal, or old server is still relying on yesterday's assumptions.

These are not the people likely to become famous after Q-Day.

But they may be the reason Q-Day does not become chaos.

It is easy to overfocus on the people at the top of the story: the theorists, the algorithm designers, the hardware companies, the standards bodies. But large transitions are won or lost in the middle. The middle is where the real world lives.

Post quantum migration will not be completed by speeches. It will be completed by people doing awkward, specific, unromantic work across thousands of systems.

They will not get statues.

They may not get thanked.

They may only be noticed if something fails.

That is the old rule of infrastructure: when it works, it disappears.

If we are talking about the true pillars of quantum security, these people deserve a place near the centre. They are the ones who turn the plan into reality.

11. The tenth pillar: the people who refuse to let Q-Day become stupid

There is one more pillar, and it may be the most relevant to public discussion.

The people who refuse to let the subject become stupid.

That sounds blunt because it needs to be.

Q-Day is exactly the kind of topic that attracts bad thinking. It has enough science to intimidate people, enough uncertainty to invite speculation, enough security risk to attract fear, enough money to attract vendors, enough Bitcoin relevance to attract tribal arguments, and enough government interest to attract conspiracy theories.

That is a dangerous mix.

The people who matter will include those who keep asking better questions:

Which cryptography are we talking about?

Is this about secrecy, signatures, authentication, or hashing?

Does the data still matter in twenty years?

Is this a real standard or a marketing label?

Can the system actually be updated?

What is the difference between a noisy quantum device and a cryptographically relevant quantum computer?

Is this a technical problem, a governance problem, or both?

What happens if nobody owns the migration?

Those questions are not flashy. They are the questions that keep a serious subject from becoming a circus.

If Q-Day becomes famous, some people will rush to make it simple. They will say everything is doomed. Others will say nothing matters. Some will sell miracle products. Some will write headlines that make people nauseous. Some will use the word "quantum" as if it were a magic spell.

The useful people will be the ones who slow the conversation down.

That is not boring. That is discipline.

12. So who will the man on the street remember?

If Q-Day becomes a public historical moment, the man on the street may remember Peter Shor.

He may remember NIST.

He may remember IBM, Google, Microsoft, or another company attached to a breakthrough.

He may remember a government cybersecurity chief.

He may remember a Bitcoin panic.

He may remember a phrase like "harvest now, decrypt later".

He may remember the wrong thing entirely.

That is the uncomfortable answer.

The public does not always remember the most deserving name. It remembers the name attached to the clearest story.

If the story becomes "the algorithm that broke the old locks", Shor's name may travel furthest.

If the story becomes "the company that built the machine", a corporate name may dominate.

If the story becomes "the government warning", an official may become the face.

If the story becomes "the migration that saved the internet", NIST and the standards world may get unusual public attention.

If the story becomes "the Bitcoin scare", the crypto world may create its own heroes and villains.

But the fairest answer is this: Q-Day will not have one pillar. It will have many.

The foundations came from theorists.

The warning came from algorithms.

The escape route came from post quantum cryptographers.

The coordination came from standards bodies.

The machines came from hardware builders.

The practicality came from error correction.

The public sanity came from explainers.

The survival of ordinary systems may come from migration teams nobody ever interviews.

The real pillars of Q-Day may not be the people who become famous.

They may be the people whose work means most people never experience Q-Day as a disaster.

Final discussion question

If Q-Day becomes a public moment, who do you think people will actually remember: the theorists, the algorithm designers, the hardware companies, the standards bodies, the explainers, or whoever ends up standing at the podium when the public finally notices?

Sources and further reading

[Source 1] NIST: first final post quantum cryptography standards
nist [dot] gov / news-events / news / 2024 / 08 / nist-releases-first-3-finalized-post-quantum-encryption-standards

[Source 2] IBM: IBM-developed algorithms announced as first post quantum cryptography standards
newsroom [dot] ibm [dot] com / 2024-08-13-ibm-developed-algorithms-announced-as-worlds-first-post-quantum-cryptography-standards

[Source 3] John Preskill: Quantum Computing in the NISQ era and beyond
arxiv [dot] org / abs / 1801.00862

[Source 4] NIST post quantum cryptography project
csrc [dot] nist [dot] gov / projects / post-quantum-cryptography

QueueDay

This is a really interesting way to frame Q-Day, because it turns the subject from a faceless technical event into a question about memory.

People like to think history remembers the right names, but it usually remembers the convenient names. It remembers the person who becomes attached to the story, not always the person who did the deepest work. That is why this article works for me. It does not pretend there will be one clean hero of Q-Day. It shows that the public story and the real story may be very different.

If Q-Day becomes a household term, I agree that Peter Shor is probably the name with the best chance of escaping into normal conversation. The reason is simple: his algorithm gives people a clear story. Old locks were built on one set of assumptions, and this algorithm showed how a sufficiently powerful quantum computer could attack those assumptions. Whether or not the public understands the maths, the name becomes a symbol.

But I also think the article is right to push beyond that. The people who build the escape route may matter more than the people attached to the threat. Post quantum cryptography is not as exciting to talk about as quantum machines breaking old systems, but it is the part that decides whether Q-Day becomes a manageable transition or a public mess.

The standards people deserve more credit too. Nobody wants to read committee documents until something breaks. Then suddenly everyone asks why the standards were not ready, why vendors were not prepared, why governments did not coordinate, and why organisations did not know what cryptography they were using. It is a thankless kind of importance.

The bit I liked most was the point that success may make many of these people invisible. If the migration works, most people will never know who protected them. That is a strange reward, but it is how infrastructure usually works. You only learn the names when the bridge falls down.

So yes, the man on the street may remember Shor, Google, IBM, NIST, or whoever is standing at the podium when the public finally notices. But the real pillars may be the people who stop Q-Day becoming memorable for the wrong reasons.

QuantumKnight

That is exactly why I would be careful with the word "famous". The famous person is not always the pillar.

Fame follows the story, not the work. The person who announces the crisis may become more famous than the person who prevented ten worse crises from happening. The company that shows the machine may become more famous than the teams who built the standards that keep ordinary systems working.

That does not mean the fame is meaningless. It just means it is incomplete. If Q-Day ever becomes a public event, the most honest version of the story will probably need two lists: the names people remember, and the names people should remember.
ISA maxed. Costs minimised.

Q

I like the idea that Q-Day might create its own public cast of characters, because most big technology moments do.

The internet had its visible names. Bitcoin has Satoshi. Artificial intelligence has its company heads, researchers, and public explainers. Space had astronauts, scientists, and political figures. The public always wants a face, even when the thing itself was built by thousands of people over decades.

Quantum computing will probably be the same, but with an extra problem: the public already struggles to understand what the subject is. That means whoever explains it well may become almost as important in public memory as whoever builds it.

That is why the explainer section matters. A bad explainer can make quantum sound like magic. A lazy sceptic can make it sound like a scam. A good explainer has to walk a narrow path: yes, the field is real; no, it does not mean every headline is true; yes, cryptographic migration matters; no, current noisy machines are not automatically Q-Day machines.

That kind of explanation is hard, and it is badly needed.

I also think the article is right to mention the messenger problem. If Q-Day arrives as a government warning, then the public face may be a minister or cybersecurity official. If it arrives as a Bitcoin panic, the public face may be an exchange boss or protocol developer. If it arrives as a corporate breakthrough, the public face may be a CEO. That person might not be the deepest expert in the room, but public memory often attaches itself to the microphone.

The hidden tragedy is that the people doing migration work will probably not become famous at all. They will just be expected to make everything work. Certificates, hardware modules, old servers, vendor dependencies, internal tools, forgotten systems, backups, archives, and compatibility headaches. That is where the real battle will happen, and almost nobody outside the field will see it.

So if the question is "who will people remember?", I would say Shor, one or two companies, NIST, and maybe a public official.

If the question is "who deserves to be remembered?", the list gets much longer and much less glamorous.

QuantumLeap

The explainer point is huge. The first person who successfully explains Q-Day to ordinary people without turning it into nonsense may shape the public story more than we expect.

That might sound secondary, but it is not. Public understanding affects pressure, funding, regulation, vendor behaviour, migration urgency, and whether people panic or prepare. Bad explanations create bad decisions.

So yes, the builders matter, but the translators matter too. A technology this strange needs people who can stop it being sold as either magic dust or fake news.

TheRizz

The article made me think about how unfair technological memory can be.

If Q-Day becomes famous, a lot of people will suddenly talk about names they had never heard the week before. Shor may become the easy name because his algorithm is tied to the cryptographic threat. A company may become famous because it owns the machine or the announcement. A standards body may become famous because it provides the official answer. But most of the people who made the transition possible will still be invisible.

That is probably unavoidable, but it is worth saying out loud.

The security side is especially interesting because good security does not create a dramatic moment. If post quantum migration succeeds, the story may be boring. Browsers keep working. Banks keep working. Government systems keep working. Software updates remain trusted. Messaging systems move quietly. People complain about compatibility and then forget the whole thing.

That would actually be success.

But success rarely creates celebrities. Failure does.

If an old system gets exposed, if a major archive becomes readable, if a cryptocurrency panic happens, or if some organisation admits it cannot migrate because its systems are too tangled, then suddenly the public will learn names. They may be the names of victims, officials, companies, or scapegoats.

That is why I like the article's focus on pillars rather than celebrities. A pillar is not the same as a star. A pillar holds something up. It may be hidden inside the building. You may only notice it when it cracks.

The real Q-Day pillars may be the people who prevent the dramatic headline.

Megan34

Thank you for your interesting thoughts on the matter. I await the winners and losers like the rest of mankind.

QuantumLeap

Thank you @Megan34.
I think we crossed there @TheRizz.

That is a sharp distinction: pillar versus star.

A star is visible. A pillar is load bearing.

The quantum computing story will have stars, no doubt. Some will deserve it, some will simply be well positioned. But the pillars may be much harder to name because they are spread across research teams, standards groups, vendors, maintainers, implementers, and migration teams.

That makes the history less satisfying, but probably more honest.

codeberg


Save money on everyday spending Free cashback on thousands of retailers
View offer