Can Quantum Computers Break Bitcoin? | 2026 Google Research

Skip to main content

Can Quantum Computers Break Bitcoin? | 2026 Google Research

Executive Summary

On March 31, 2026, Google’s Quantum AI team published a whitepaper revealing that breaking the elliptic curve cryptography (ECDSA-256) protecting Bitcoin, Ethereum, and most blockchains could require 20× fewer quantum resources than estimated in 2019 — specifically fewer than 500,000 physical qubits. The research models a real-time transaction hijacking attack with a 41% success rate against Bitcoin’s 10-minute block confirmation, and identifies approximately 6.9 million BTC (~32% of supply) in wallets with exposed public keys. Google has set a 2029 deadline to migrate its own infrastructure to post-quantum cryptography. Can quantum computers break Bitcoin?

20×
Fewer qubits needed
than 2019 estimate
6.9M
BTC in exposed
wallets at risk
<500K
Physical qubits to
break ECDSA-256
2029
Google’s PQC
migration deadline


1. What Google Found: The 20× Factor

Google’s Quantum AI team published a whitepaper on March 31, 2026 that fundamentally recalibrates how the security industry assesses quantum threats to cryptocurrency. The headline finding: breaking the 256-bit elliptic curve cryptography (ECDSA-256) that secures Bitcoin, Ethereum, and most other blockchain networks could require fewer than 500,000 physical qubits — roughly 20 times fewer than the team’s own 2019 estimate of 20 million qubits.

Even more striking, the researchers designed two practical attack methods requiring only about 1,200 to 1,450 high-quality logical qubits. That number matters because it represents the “real” computational requirement, stripped of error correction overhead. Previous assumptions placed the logical qubit threshold at 2,330 or higher.

Google also introduced a novel approach to responsible disclosure: instead of publishing step-by-step attack methods, they used zero-knowledge proofs to verify their findings without providing a blueprint for bad actors.

“Planning the transition to quantum-safe cryptosystems requires understanding the cost of quantum attacks on vulnerable cryptosystems.”

— Craig Gidney, Google Quantum AI Researcher

Resource Estimates: Then vs. Now

Metric 2019 Estimate 2026 Estimate Change
Physical qubits (RSA-2048) 20 million <1 million 20× reduction
Physical qubits (ECDSA-256) ~10 million (est.) <500,000 ~20× reduction
Logical qubits for attack 2,330+ 1,200–1,450 ~40% reduction
Estimated attack time 8 hours <1 week (RSA) / ~9 min (live BTC) Varies by method

2. How Much Bitcoin Is Actually at Risk?

Google’s research estimates that approximately 6.9 million BTC — roughly one-third of the total supply — sits in wallets where the public key has been exposed. This includes approximately 1.7 million BTC from Bitcoin’s earliest days (Pay-to-Public-Key format), and roughly 5.2 million BTC in reused addresses.

Of particular note: an estimated 1 million BTC attributed to Satoshi Nakamoto sits in early P2PK addresses that are inherently vulnerable.

Bitcoin Supply: Quantum Vulnerability Breakdown
🟢 Safe (non-exposed keys)~14.1M BTC (67%)
🟡 Reused / exposed addresses~3.5M BTC (17%)
🔴 Early P2PK (incl. Satoshi ~1M)~1.7M BTC (8%)
⚫ Lost BTC (exposed keys)~1.7M BTC (8%)

⚠️ The Taproot Paradox

Bitcoin’s Taproot upgrade (activated November 2021) makes public keys visible by default in its key-path spending mode. Google’s researchers concluded this design choice could increase the number of wallets potentially exposed to quantum-based attacks — creating more vulnerability, not less.


3. The Real-Time Transaction Hijack

The most striking finding isn’t about dormant wallets, it’s about active transactions. When someone sends Bitcoin, their public key is briefly revealed. A quantum computer could derive the private key while the transaction sits in the mempool. Google’s model shows this takes approximately 9 minutes, with pre-computation.

Since Bitcoin blocks take ~10 minutes to confirm, the attacker has a ~41% chance of beating the legitimate transaction.

Attack Window: Confirmation Time vs. Quantum Attack Duration
Bitcoin Block Confirmation~10 minutes
⚡ Quantum Attack Time~9 minutes (41% success)
Ethereum Confirmation~13 seconds
Solana Confirmation~0.4 seconds

Chain-by-Chain Vulnerability

Network Confirmation Attack Success Risk
Bitcoin ~10 minutes ~41% 🔴 High
Ethereum ~12-15 seconds Near 0% 🟢 Low
Solana ~0.4 seconds Near 0% 🟢 Very Low

4. The Case for YES, Quantum Is a Real Threat

🔴 Threat Vector
Resource Bar Dropped 20×

From 20 million to under 500K physical qubits. Logical qubit needs dropped to ~1,200–1,450. The gap is shrinking faster than models predicted.

🔴 Threat Vector
Harvest Now, Decrypt Later

State actors are almost certainly collecting blockchain data today, planning to decrypt it once quantum hardware matures. The 6.9M exposed BTC are fixed targets.

🔴 Threat Vector
Real-Time Transaction Hijacking

Google modeled a 9-minute attack that beats Bitcoin’s confirmation 41% of the time. This is about live transactions being intercepted.

🔴 Threat Vector
Bitcoin Governance Is Too Slow

BIP-360’s co-author estimates a full post-quantum migration could take 7 years. Google’s 2029 deadline means the window is narrowing fast.

Google’s 2029 deadline reflects internal confidence that cryptographically relevant quantum computers (CRQCs) are approaching. IBM projects a fault-tolerant computer (Starling) with 200 logical qubits by 2029. Quantinuum aims for full fault tolerance by 2029. Jefferies advised clients to drop Bitcoin allocations entirely due to quantum risk.


5. The Case for NO, Don’t Panic Yet

🟢 Defense
No Machine Exists Yet

IBM’s most advanced processor (Heron) has 156 qubits. Google’s Sycamore has 53. We’re orders of magnitude from 500K physical qubits.

🟢 Defense
Error Correction Unsolved at Scale

Current machines are “noisy” — ~1,000 physical qubits per logical qubit. Maintaining coherence for days is beyond any existing hardware.

🟢 Defense
Post-Quantum Crypto Exists

NIST standardized PQC algorithms in 2024. BIP-360 is on testnet. The solutions are built — the challenge is adoption speed, not invention.

🟢 Defense
Broader Internet Breaks First

A quantum breakthrough would compromise banking and government before Bitcoin — triggering a coordinated global response before crypto is targeted.

Adam Back, CEO of Blockstream, argues the practical quantum threat is 20–40 years away. ARK Invest’s March 2026 report concluded we’re still at Stage 0 — quantum computers exist but lack any commercially relevant capability.


6. The Qubit Gap: Hardware vs. Threat Threshold

Quantum Computing Hardware Milestones

System Year Physical Qubits Status
Google Sycamore 2019 53 ✅ Operational
Google Willow 2024 105 ✅ Operational
IBM Heron r3 2025 156 ✅ Operational
IBM Kookaburra 2026 4,158 (3-chip) 📋 Planned
IBM Starling 2029 ~10,000 🗺️ Roadmap
IBM Blue Jay 2033 ~100,000 🗺️ Roadmap
⚠️ ECDSA-256 Break Threshold ??? <500,000 ⚠️ Danger Zone

💡 Key Takeaway

The most optimistic hardware projections don’t place us at 500K qubits before 2033–2035. However, if qubit counts keep doubling every 1–2 years and AI-guided error correction compresses the timeline further, the “comfortable decade” could shrink to a “nervous five years.”


7. How the Industry Is Responding

Bitcoin: Slow but Moving

BIP-360 (Pay-to-Merkle-Root) was merged into Bitcoin’s official BIP repository on February 11, 2026. It introduces a quantum-resistant address type (bc1z) that prevents public key exposure. BTQ Technologies deployed the first testnet implementation with 50+ miners and 100,000+ blocks processed. However, a full migration could take up to 7 years.

 

Source: altFINS Crypto Screener

Ethereum: Ahead of the Curve

Ethereum has spent eight years preparing a multi-fork roadmap for post-quantum security, running weekly test networks. Its faster confirmation time provides inherent protection against real-time attacks.

Government & Standards Bodies

Organization Action Deadline
U.S. Federal Agencies Submit PQC transition plans (NSM-10) April 2026
Google Complete infrastructure PQC migration 2029
European Union Critical infrastructure quantum resistance 2030
NIST Phase out elliptic curve cryptography Mid-2030s
NSA CNSA 2.0 Quantum-safe national security systems 2030

8. The Quantum Race Timeline

2019
Google’s First Estimate
Craig Gidney: breaking RSA-2048 would require 20 million noisy qubits and 8 hours.
2024
NIST Finalizes PQC Standards
First set of post-quantum cryptography standards announced.
Dec 2024
Google Unveils Willow Chip
105-qubit chip demonstrates “below threshold” error correction for the first time.
May 2025
Google Revises RSA Estimates
RSA-2048 breakable with under 1 million noisy qubits — a 20× reduction from 2019.
Feb 2026
BIP-360 Merged into Bitcoin Repository
First quantum-resistant address proposal enters Bitcoin’s formal upgrade process.
⭐ Mar 31, 2026
Google Publishes ECDSA-256 Whitepaper
Breaking Bitcoin requires <500K qubits. Real-time attack modeled at 41% success. Zero-knowledge proofs used for disclosure.
Apr 2026
U.S. Federal PQC Deadline
Agencies must submit post-quantum transition plans under NSM-10.
2029
Google PQC Migration / IBM Starling
Google completes migration. IBM delivers Starling (200 logical qubits).
2033+
IBM Blue Jay: 100K Physical Qubits
2,000 logical qubits. Approaching — but not yet at — the ECDSA-256 danger zone.

9. What Should Crypto Investors Do Now?

✅ Actionable Steps for 2026

1. Move to modern addresses. If you hold BTC on legacy P2PK or P2PKH addresses (starting with “1”), migrate to bc1 (Native SegWit) addresses immediately.

2. Stop reusing addresses. Every time you spend from an address, your public key is exposed. Use a new address for every transaction.

3. Monitor BIP-360. Follow the proposal’s progress. When quantum-resistant address types (bc1z) go live on mainnet, be ready to migrate.

4. Assess chain-level preparedness. Evaluate each network’s quantum readiness. Ethereum’s active PQC roadmap and faster confirmations provide inherent advantages.

5. Don’t panic-sell based on FUD. Google explicitly warned that unsubstantiated fear can itself be used as an attack on crypto confidence. Act deliberately, not reactively.


The End

Google’s March 2026 research doesn’t mean Bitcoin is broken. It means the timeline for when it could be broken just got significantly shorter. The 20× reduction in required quantum resources compresses years of comfortable preparation into a more urgent window.

The good news: post-quantum cryptography solutions already exist. NIST has standards. BIP-360 is on testnet. Ethereum has a multi-year roadmap.

The challenge isn’t technical — it’s organizational. Bitcoin’s decentralized governance is its greatest philosophical strength but also its biggest vulnerability in a coordinated upgrade. A migration taking 7 years leaves a dangerously narrow margin if CRQCs arrive by the early 2030s.

The danger isn’t quantum computers themselves. It’s complacency. Every year the community delays PQC migration, the window shrinks. The crypto industry has perhaps 5–8 years. That’s enough, but only if the work starts now.


10. Frequently Asked Questions

❓ Can quantum computers break Bitcoin right now?
No. Current quantum computers (IBM Heron: 156 qubits) are far below the ~500,000 physical qubits needed. However, Google’s research shows the gap is closing faster than expected, with practical attack methods requiring only 1,200–1,450 logical qubits.
❓ How many Bitcoin are at risk from quantum attacks?
Approximately 6.9 million BTC (~32% of supply) sit in wallets with exposed public keys. This includes ~1.7M from Bitcoin’s early days and ~5.2M in reused addresses. About 1 million BTC is attributed to Satoshi Nakamoto.
❓ When will quantum computers be powerful enough?
Expert estimates vary. Google’s 2029 migration deadline suggests the threat is plausible within the decade. IBM’s Starling targets 2029 with 200 logical qubits. Most cryptographers estimate 2030–2040 for a practical CRQC, but the timeline keeps compressing.
❓ Is Ethereum safer than Bitcoin from quantum threats?
Partially. Ethereum’s ~12-15 second confirmation leaves almost no window for the 9-minute attack Google modeled. However, Ethereum’s account model exposes public keys by default, creating its own vulnerabilities. Both need PQC upgrades.
❓ What is BIP-360?
BIP-360 (Pay-to-Merkle-Root) is a Bitcoin Improvement Proposal merged in February 2026 introducing a quantum-resistant address type (bc1z). It’s the first step toward quantum-hardening Bitcoin, with follow-on proposals for post-quantum signature algorithms. A testnet with 50+ miners is already live.
❓ Should I sell my Bitcoin because of quantum risks?
No. The consensus among experts (Google, ARK Invest, most cryptographers) is that quantum attacks are not imminent. Move to modern address types, avoid address reuse, support PQC migration — don’t panic sell.

Published: March 31, 2026 |
Last Updated: March 31, 2026 |
Reading Time: ~18 minutes
Sources: Google Research, altFINS, CoinDesk, ARK Invest / Unchained, IBM Quantum, BIP-360.org, NIST, Bitcoin Magazine

⚠️ Disclaimer: This article is for informational purposes only and does not constitute financial or investment advice. Always do your own research before making investment decisions.