Quantum Threat to Cryptocurrencies
Trending

The Quantum Threat to Cryptocurrencies: What’s Real, What’s Hype, and What to Do About It

Introduction

In March 2026, a team at Google Quantum AI published a 57-page whitepaper estimating that breaking the 256-bit elliptic curve cryptography protecting Bitcoin and Ethereum would require fewer than 500,000 physical qubits on a superconducting architecture and, with a precomputed first phase, roughly nine minutes of runtime. The paper’s author list included Craig Gidney, whose RSA-2048 resource estimates have become the field’s standard reference; Hartmut Neven, VP of Engineering at Google Quantum AI; Justin Drake of the Ethereum Foundation; and Dan Boneh of Stanford. They accompanied the estimates with a zero-knowledge proof allowing anyone to verify the claims without seeing the circuits themselves, and they withheld the circuits under what they described as a responsible disclosure framework adapted from cybersecurity norms.

Nine minutes is less than Bitcoin’s average block time. That single number changed the conversation.

It did not change the physics. No quantum computer today can execute Shor’s algorithm at cryptographically relevant scale. The largest demonstrated devices operate with a few thousand noisy physical qubits; breaking secp256k1 would require roughly 1,200 logical qubits, each composed of hundreds or thousands of physical qubits operating below the error correction threshold. The engineering challenges between here and there remain substantial: fabrication scale, sustained fault-tolerant operation, real-time decoding at terabyte throughput, classical control infrastructure for half a million qubits. But the Google paper made something concrete that had previously been abstract: the blueprint for a machine that steals cryptocurrency is now smaller and faster than the blueprint for a machine that breaks RSA. Elliptic curve cryptography, the mathematical foundation of nearly every blockchain transaction, is the more immediately vulnerable primitive.

The cryptocurrency ecosystem faces a narrowing window to migrate to post-quantum cryptography. The threat is real and the engineering target is shrinking. Migration timelines are measured in years. Whether the window is five years or fifteen matters less than whether the ecosystem uses whatever time remains.

What Quantum Computers Can and Cannot Do to Blockchains

Two quantum algorithms matter for blockchains. Everything else is noise.

Shor’s algorithm solves the mathematical problems underlying public-key cryptography exponentially faster than any known classical method. For blockchains, this means deriving private keys from public keys: the secp256k1 curve used for Bitcoin and Ethereum transaction signatures, the BLS12-381 curve used for Ethereum validator signatures, and the various pairing-friendly curves used in zero-knowledge proof systems across the ecosystem. If you have the public key, a sufficiently powerful quantum computer running Shor’s algorithm gives you the private key. That is the threat.

Grover’s algorithm provides a quadratic speedup for searching unstructured databases, which theoretically halves the effective security of symmetric cryptography and hash functions. SHA-256 drops from 256-bit to 128-bit equivalent security under Grover’s attack. In practice, this is not a meaningful threat to any blockchain function. Bitcoin’s Proof-of-Work mining relies on SHA-256, and the Google analysis estimates a quantum miner running Grover’s algorithm would achieve roughly 0.25 TH/s, more than two orders of magnitude slower than a single modern ASIC miner at ~110 TH/s. Hash locks in Lightning Network HTLCs remain secure at 128-bit quantum security. Grover does not threaten blockchain consensus, mining economics, or hash-based constructions in any timeframe that matters.

Conflating the two algorithms creates confusion in both directions. The quantum panic industry uses Grover to imply that “everything is broken,” including mining and symmetric crypto. Quantum denialists use the irrelevance of Grover to mining as evidence that “nothing is broken.” Both are wrong. The threat is Shor’s algorithm applied to elliptic curve signatures. It is specific, it is devastating for the cryptography it targets, and current resource estimates place it closer than most of the crypto ecosystem has been willing to acknowledge.

Three Attack Classes: On-Spend, At-Rest, and On-Setup

Quantum attacks on blockchains are not all the same. The Google whitepaper formalized a taxonomy that the crypto community should adopt as standard terminology, because the mitigation strategy for each class differs.

On-spend attacks target transactions in transit. When you broadcast a Bitcoin transaction, your public key becomes visible in the mempool. A quantum attacker must derive your private key before the transaction is recorded on the blockchain, a window of roughly ten minutes for Bitcoin, twelve seconds for Ethereum, 2.5 minutes for Litecoin. Google estimates a ~41% success probability against Bitcoin’s block time with a single primed superconducting CRQC. That probability drops below 3% for Litecoin and below 0.1% for Zcash.

At-rest attacks target public keys already exposed on the blockchain. The attacker has unlimited time. This category includes the 1.7 million Bitcoin locked in P2PK scripts from the Satoshi era, the ~5 million additional Bitcoin in addresses with reused keys, every Ethereum account that has ever sent a transaction (which permanently exposes the public key), and every Taproot (P2TR) address on Bitcoin, which stores the tweaked public key directly in the locking script. At-rest attacks require a quantum computer, but not a fast one. Even a “slow-clock” neutral atom or ion trap architecture that takes hours per key derivation could methodically work through the highest-value exposed addresses.

On-setup attacks are the least discussed and potentially the most insidious. Certain cryptographic protocols rely on “trusted setup” ceremonies that generate secret parameters. If a quantum computer recovers those parameters, it creates a permanent, reusable classical exploit that requires no further quantum access. Ethereum’s Data Availability Sampling mechanism uses KZG polynomial commitments on the BLS12-381 curve; recovering the “toxic waste” from the public parameters gives an attacker the ability to forge data availability proofs indefinitely, using a conventional computer. The same class of vulnerability affects the Sapling shielded pool in Zcash, the Pedersen commitments in Litecoin’s Mimblewimble sidechain, and any zero-knowledge proof system built on pairing-based curves with a trusted setup. A single quantum computation creates an exploit that can be stockpiled, sold, or deployed at scale.

The taxonomy matters because it determines urgency. On-spend attacks require a fast, powerful quantum computer and can be partially mitigated by faster block times and private mempools. At-rest attacks require only a patient quantum computer and can be mitigated by eliminating public key exposure and migrating to post-quantum addresses. On-setup attacks create classical exploits that persist until the affected protocols are replaced entirely. The Harvest Now, Decrypt Later (HNDL) threat applies across all three categories: adversaries can record blockchain data, gossip traffic, and encrypted communications today, knowing that a future CRQC will make it all legible.

The Attack Surface Is Larger Than Most Realize

Bitcoin

Bitcoin’s vulnerability is real but structurally bounded. The script-type taxonomy determines exposure: P2PK scripts (1.7M BTC, permanently exposed public keys), P2TR Taproot scripts (public key in the locking script, a quantum security regression from SegWit), and addresses with reused keys across P2PKH, P2WPKH, and P2SH types. As of early 2026, roughly 6.7 million BTC (about 34% of circulating supply) sits in addresses with exposed public keys.

Bitcoin’s Proof-of-Work consensus is immune to quantum attack. Address types that hide public keys behind hashes (P2PKH, P2WPKH) are safe from at-rest attacks as long as the key has never been exposed through a spend or address reuse. BIP-360 proposes Pay-to-Merkle-Root (P2MR) addresses that strip out the quantum-vulnerable key path from Taproot, and BIP-361 proposes a phased sunset of legacy signature types to force migration. Neither has been activated. The Bitcoin developer community remains divided on both the urgency and the approach.

Ethereum

Ethereum’s attack surface is broader and more systemic. The account model permanently exposes public keys the moment an account sends its first transaction, with no native key rotation mechanism for legacy Externally Owned Accounts. Smart contracts create compounding risk: administrative keys controlling stablecoins, bridges, oracles, and DeFi governance represent “low ETH, high leverage” targets where a single compromised key can trigger cascading damage across the ecosystem. Over $200 billion in stablecoins and tokenized real-world assets sit behind admin keys that are exposed on-chain.

Ethereum’s Proof-of-Stake consensus layer adds a vulnerability Bitcoin does not have: the ~37 million staked ETH secured by BLS signatures on BLS12-381 could be targeted to halt finality (>1/3 compromised), control fork choice (>1/2), or finalize inconsistent chains (>2/3). The KZG commitments in the Data Availability Sampling mechanism are vulnerable to on-setup attacks that produce permanent classical exploits.

On the other side of the ledger, Ethereum has stronger institutional coordination. The Ethereum Foundation launched pq.ethereum.org in March 2026 as a dedicated hub for its post-quantum effort, with more than 10 client teams running weekly PQ interoperability devnets. The roadmap targets core post-quantum infrastructure completion by approximately 2029, with EIP-8141 (native account abstraction enabling signature agility) being considered for the Hegotá hard fork in the second half of 2026. The contrast with Bitcoin’s fragmented response is stark.

The Lightning Network

The Lightning Network’s quantum vulnerability is structural and more severe than Bitcoin Layer 1. Every operational aspect of a Lightning channel requires continuous public key exposure: the 2-of-2 multisig funding output, the gossip protocol broadcasting both funding keys for public channels, the Sphinx-based onion routing using ECDH at every hop, and the revocation mechanism built on secp256k1-specific algebra.

The critical architectural constraint: Lightning cannot become fully post-quantum secure without a Bitcoin Layer 1 consensus upgrade. The funding output, commitment transactions, HTLC transactions, and penalty transactions all require Bitcoin consensus to verify their signatures. Application-layer upgrades to transport encryption and routing can protect metadata from harvest-now-decrypt-later attacks, but they cannot protect funds. The full BOLT-by-BOLT migration roadmap requires coordinated changes across every layer of the protocol stack, with a hard dependency on Layer 1 soft fork for fund security.

The Broader Ecosystem

The vulnerability extends beyond Bitcoin and Ethereum. Privacy-preserving blockchains face retroactive deanonymization: a quantum computer could decrypt years of historical confidential Zcash transactions for known addresses, even if the protocol migrates to PQC going forward. Stablecoins and tokenized real-world assets (projected to exceed $16 trillion by 2030) inherit the quantum vulnerabilities of their host chains. Cross-chain bridges multiply risk by exposing assets to the weakest link in the chain.

A few blockchains have demonstrated that post-quantum operation is technically feasible. The Quantum Resistant Ledger has been post-quantum since inception in 2018. Algorand executed its first PQC-secured transaction in 2025. The XRP Ledger deployed ML-DSA (formerly CRYSTALS-Dilithium) signatures on its test network. These deployments prove the concept. Whether the larger ecosystems can execute the migration before the threat arrives is the open question.

The Resource Estimate Trajectory

The Google paper’s 500,000-qubit estimate did not emerge in isolation. It extends a pattern of collapsing resource estimates that has been accelerating over the past decade. For RSA-2048, the physical qubit requirement dropped from roughly 1 billion (2012) to 20 million (2019) to under 1 million (2025) to under 100,000 on aggressive architectures (2026). For ECDLP-256, the trajectory is earlier in its optimization curve, which means more room remains for further reductions.

Google’s authors note this explicitly: RSA and quantum chemistry algorithms have received more optimization effort than ECDLP, “so it may be the case that algorithms for those applications are closer to optimal than they are for ECDLP.” The 500,000-qubit estimate is likely not the floor.

I have been tracking this trajectory through my CRQC Quantum Capability Framework, which maps the specific engineering capabilities required to build a cryptographically relevant quantum computer. Google’s contribution is primarily algorithmic: it advances the circuit optimization dimension while keeping hardware assumptions deliberately conservative (planar degree-four connectivity, 10⁻³ physical error rates, surface code error correction). The improvement cannot be dismissed as relying on speculative hardware.

The fast-clock vs. slow-clock architecture distinction introduced in the paper adds an important analytical dimension. Superconducting, photonic, and silicon spin qubit platforms could enable on-spend attacks that resolve in minutes. Neutral atom and ion trap platforms, with error correction cycles roughly 100x slower, would be limited to at-rest attacks for the foreseeable future but could begin breaking exposed keys with far fewer total qubits. The type of CRQC that arrives first determines which attack classes become viable, and the cryptocurrency community needs contingency plans for both scenarios.

The Migration Challenge

The path to post-quantum security for blockchains is technically clear: replace vulnerable elliptic curve signatures with NIST-standardized post-quantum alternatives (ML-KEM for key exchange, ML-DSA or FN-DSA for signatures) using hybrid schemes that combine classical and post-quantum algorithms during the transition period. The practical challenges are severe.

Post-quantum signatures are an order of magnitude larger than their classical counterparts. An ML-DSA-44 signature requires 2,420 bytes compared to 64-72 bytes for ECDSA/Schnorr, a roughly 35x increase. For Bitcoin, this means fewer transactions per block, higher fees, and a reopening of the block size debate that previously produced a contentious hard fork. For Ethereum, it means larger transactions, higher gas costs, and the need for new EVM precompiles that can verify post-quantum signatures efficiently. For Lightning, it means a 40-60x expansion in gossip protocol traffic that would centralize the network without aggressive countermeasures like server-assisted synchronization.

The UTXO migration itself, moving existing funds from vulnerable to quantum-safe addresses, will take months to years of sustained on-chain throughput even under optimistic assumptions. Channel splicing provides a migration vehicle for Lightning that avoids mass channel closures. Ethereum’s account abstraction approach (EIP-8141) allows individual accounts to adopt PQ signatures without a single protocol-wide flag day. Each platform has architectural advantages and constraints that shape the migration path.

Governance Is the Binding Constraint

The hardest conclusion from surveying this landscape: the binding constraint on migration is governance, not engineering.

The engineering is achievable on a 4-6 year timeline. The BIPs and EIPs exist or are under active development. The NIST algorithms are standardized. Hybrid cryptography approaches are well understood. Several smaller blockchains have already deployed PQC in production.

But Bitcoin’s decentralized governance, its greatest strength against censorship and capture, becomes a liability when coordinated action is needed against a time-bounded external threat. The community remains split. At Bitcoin 2026 in Las Vegas, the Nakamoto Stage panel on quantum threats featured one speaker calling CRQCs “science fiction” and another comparing quantum security warnings to climate alarmism, alongside two others presenting concrete engineering proposals. BIP-361, published in April 2026, has already drawn accusations of being “authoritarian” and “confiscatory” from parts of the community that view any forced migration as a violation of Bitcoin’s immutability principles.

Ethereum’s institutional coordination advantage is significant. The Ethereum Foundation has funded dedicated post-quantum teams, established a multi-fork roadmap with concrete milestones, runs weekly interoperability testing across client teams, and has a governance mechanism (All Core Devs) designed to coordinate protocol changes. Nic Carter, a prominent Bitcoin advocate, described Ethereum’s approach as “best in class” and Bitcoin’s as “worst in class,” with “no coherent strategy, no roadmap” and “zero buy-in from top devs” on the proposals that do exist.

Whether the cryptocurrency ecosystem migrates in time depends on governance coordination more than it depends on engineering. The decade ahead is political.

What To Do With This Information

The answer depends on who you are.

If you hold Bitcoin in addresses that hide public keys behind hashes (P2WPKH with bc1q prefix) and have never reused an address, your funds are not at risk from at-rest quantum attacks today. Do not panic. Do monitor the BIP-360 activation timeline and be prepared to migrate when quantum-safe address types become available.

If you hold Bitcoin in P2TR (Taproot, bc1p prefix) addresses or have reused addresses, your public key is already exposed on-chain. Consider moving funds to non-reused P2WPKH addresses as an interim measure. This removes the at-rest attack vector until PQC migration is available, though it does not protect against future on-spend attacks.

If you develop blockchain protocols, the transport layer is the highest-priority workstream because it addresses the HNDL threat retroactively. Hybrid ML-KEM key exchange for peer-to-peer connections can be deployed now, without consensus changes, on any blockchain. Fund security requires consensus-layer upgrades that are harder to ship but cannot be deferred indefinitely.

If you manage institutional crypto exposure, the relevant framing is not “when will Q-Day arrive?” but “what deadlines has the ecosystem already set?NIST’s published transition timeline (IR 8547, initial public draft) proposes deprecating ECDSA by 2030 and disallowing it by 2035. Google has set a 2029 internal PQC migration deadline. CNSA 2.0 mandates post-quantum networking equipment by 2030. These ecosystem-driven deadlines will reshape institutional custody requirements, insurance underwriting, and regulatory expectations regardless of when a CRQC actually arrives.

If you are building something new, there is no reason to build on quantum-vulnerable cryptography in 2026. Post-quantum alternatives exist, are standardized, and have been deployed in production. Start quantum-safe. The migration headache is for legacy systems. Do not create new ones.

The PQC Migration Framework provides a structured methodology for organizations beginning the transition. The individual articles in this series go deeper into each dimension: Bitcoin’s vulnerability, Ethereum’s five attack surfaces, Lightning’s structural exposure, the protocol-level fixes for Bitcoin and Lightning, the broader ecosystem, and the practical preparation guide.

The Google whitepaper closes with an observation that bears repeating: “It is conceivable that the existence of early CRQCs may first be detected on the blockchain rather than announced.”

If that sentence does not motivate action, nothing will.

Quantum Upside & Quantum Risk - Handled

My company - Applied Quantum - helps governments, enterprises, and investors prepare for both the upside and the risk of quantum technologies. We deliver concise board and investor briefings; demystify quantum computing, sensing, and communications; craft national and corporate strategies to capture advantage; and turn plans into delivery. We help you mitigate the quantum risk by executing crypto‑inventory, crypto‑agility implementation, PQC migration, and broader defenses against the quantum threat. We run vendor due diligence, proof‑of‑value pilots, standards and policy alignment, workforce training, and procurement support, then oversee implementation across your organization. Contact me if you want help.

Talk to me Contact Applied Quantum

Marin Ivezic

I am the Founder of Applied Quantum (AppliedQuantum.com), a research-driven consulting firm empowering organizations to seize quantum opportunities and proactively defend against quantum threats. A former quantum entrepreneur, I’ve previously served as a Fortune Global 500 CISO, CTO, Big 4 partner, and leader at Accenture and IBM. Throughout my career, I’ve specialized in managing emerging tech risks, building and leading innovation labs focused on quantum security, AI security, and cyber-kinetic risks for global corporations, governments, and defense agencies. I regularly share insights on quantum technologies and emerging-tech cybersecurity at PostQuantum.com.