Summary: Google slashes quantum cracking estimates by 20X creating $600 billion countdown for Bitcoin and Ethereum

Published: 24 days and 15 hours ago
Based on article from CryptoSlate

A groundbreaking paper from Google Quantum AI has significantly redefined the timeline and resources needed for quantum computers to crack elliptic-curve cryptography, the bedrock of security for major cryptocurrencies like Bitcoin and Ethereum. This research dramatically reduces prior estimates for quantum hardware requirements, pushing the long-standing theoretical threat into a more immediate, market-relevant reality and placing over $600 billion in digital assets at risk.

The Looming Quantum Threat Takes Shape

The collaborative paper, involving researchers from Google, the Ethereum Foundation, and Stanford, reveals that Shor’s algorithm could execute the 256-bit elliptic curve discrete logarithm problem with substantially fewer resources than previously thought. The new estimates suggest a cryptographically relevant quantum computer could operate with fewer than 500,000 physical qubits and complete the task in mere minutes – a roughly 20-fold reduction from earlier projections. While such a machine doesn't exist today, this revelation has sharply increased confidence among experts, with some now seeing at least a 10% chance of a "Q-day" by 2032, where quantum computers could recover private keys from exposed public keys. Google's novel disclosure approach, utilizing zero-knowledge proofs to verify resource estimates without revealing full attack details, aims to proactively motivate the development of robust quantum defenses.

Bitcoin's Dual Vulnerability: Live Transactions and Dormant Assets

Bitcoin faces a two-pronged quantum risk. First, "on-spend" attacks pose an immediate threat during live transactions: a fast-clock quantum machine could derive a private key after a user broadcasts a transaction, then syndicate a competing transaction within Bitcoin's 10-minute average block time. The paper estimates a 9-minute attack window, leading to a theft success probability of nearly 41%. Second, a substantial "stockpile" of Bitcoin, estimated at up to 2.3 million BTC (over $150 billion), is vulnerable at rest. These include coins residing in older Pay-to-Public-Key (P2PK) outputs and even modern Taproot (P2TR) outputs, which reintroduce a quantum weakness. Many of these inactive coins cannot be easily migrated, making them fixed targets for future quantum attacks.

Ethereum's Systemic Infrastructure Risk

For Ethereum, the quantum threat is more systemic, focusing on "at-rest" attacks against long-lived accounts and critical infrastructure rather than "on-spend" attacks, due to its faster block times and reliance on private mempools. A fast-clock quantum attacker could crack the 1,000 highest-net-worth Ethereum accounts, holding over $41 billion, in under nine days. More critically, administrative keys controlling an estimated $200 billion in stablecoins and tokenized real-world assets on Ethereum are exposed. A successful attack on these control points could lead to catastrophic consequences like arbitrary minting, false price feeds, frozen user funds, or drained liquidity pools. Beyond direct asset balances, the paper highlights vulnerabilities across Layer 2 solutions, protocol value, and consensus stake (via BLS signatures), underscoring that Ethereum's quantum exposure is a broader infrastructure problem, extending far beyond simple wallet security. This pressing challenge demands urgent migration to post-quantum cryptography, requiring comprehensive protocol upgrades and changes in user behavior to minimize public-key exposure and prevent key reuse across the crypto ecosystem.

Cookies Policy - Privacy Policy - Terms of Use - © 2025 Altfins, j. s. a.