Quantum Threat Escalates: New Google Paper Warns Bitcoin-Level Security Could Be Broken in 9 Minutes

 

By Onkar Singh // March 31, 2026 @ 09:24 AM
Quantum Threat Escalates: New Google Paper Warns Bitcoin-Level Security Could Be Broken in 9 Minutes

Share

Points of Focus

  • Google Quantum AI researchers estimate Bitcoin-level encryption could be broken using 1,200 logical qubits.
  • A new “primed” attack model suggests quantum computers could pre-compute most of the work and potentially break keys in about nine minutes.
  • Bitcoin veterans including Adam Back and Nick Szabo argue practical quantum threats remain decades away.

 

A new research paper from Google Quantum AI, co-authored with Ethereum Foundation researcher Justin Drake and Stanford cryptographer Dan Boneh, is intensifying debate across the crypto industry after suggesting that future quantum computers could break Bitcoin-level cryptography in minutes rather than years.

The study estimates that cracking the 256-bit elliptic curve cryptography used by Bitcoin and Ethereum could require around 1,200 logical qubits and tens of millions of quantum operations, representing roughly a 10-fold improvement in efficiency over prior estimates. The authors validated the calculations using zero-knowledge proofs while withholding full circuits, describing the move as responsible disclosure given the security implications.

 

 

More controversially, the paper introduces a “primed” attack model, where a quantum computer pre-computes input-independent steps before a transaction appears. Once a public key is revealed in the mempool, the remaining computation could complete in approximately nine minutes — close to Bitcoin’s 10-minute block time, potentially enabling on-spend attacks under ideal conditions.

The findings mark a shift in how researchers view quantum risk. Previously, analysts treated wallet-at-rest attacks as the first realistic threat, with live transaction attacks expected much later. The new estimates suggest that once a cryptographically relevant quantum computer exists, both attack vectors may become viable at roughly the same time.

Google research estimates more than 1.7 million Bitcoin remain in such addresses. These coins include early mining rewards and possibly lost wallets.

Because public keys are already visible, these funds are vulnerable to at rest quantum attacks.

 

Evolution of BTC supply over time by protocol type
Evolution of BTC supply over time by protocol type

 

Engineering thresholds, not gradual risk

The paper emphasizes that quantum progress does not follow a smooth curve. Instead, breakthroughs depend on discrete engineering milestones such as error correction, interconnect reliability, and decoding performance. Once those thresholds are crossed, scaling from small demonstrations to cryptographically relevant machines could occur rapidly.

That dynamic has already prompted broader warnings. Google recently said that powerful quantum computers capable of breaking modern encryption could emerge as early as 2029, urging organizations to begin migrating to post-quantum cryptography now.

The concern extends beyond crypto markets. Governments, intelligence agencies and cybersecurity organizations have increasingly warned about “store-now, decrypt-later” attacks, where encrypted data is harvested today and decrypted once quantum hardware matures.

 

Ethereum research signals growing urgency

Justin Drake has increasingly framed quantum computing as a systemic threat to blockchain security. In recent research discussions, Drake said advances in algorithms and hardware are reducing the cost of breaking cryptographic keys, potentially affecting multiple components across blockchain systems simultaneously.

Ethereum developers are now targeting post-quantum security timelines around 2029, reflecting growing concern that migration could take years and must begin before hardware breakthroughs occur.

 

 

The paper also highlights another risk: one-time protocol breaks. Some blockchain systems embed elliptic-curve assumptions into fixed public parameters. A single successful quantum attack could produce reusable classical exploits without needing further quantum access, a scenario researchers describe as structurally different from individual wallet attacks.

Moreover, Google identifies multiple Ethereum risk categories:

  • Account vulnerability
  • Admin key vulnerability
  • Code vulnerability
  • Consensus vulnerability
  • Data availability vulnerability

Because Ethereum functions as programmable financial infrastructure, quantum risk extends beyond wallets into entire decentralized applications.

 

Taxonomy of Ethereum Components and Vulnerabilities
Taxonomy of Ethereum Components and Vulnerabilities

 

Bitcoin veterans pushed back

Despite the growing urgency among researchers, several Bitcoin veterans remain skeptical about near-term risks.

Adam Back, CEO of Blockstream and inventor of Hashcash, has repeatedly argued that cryptographically relevant quantum computers remain decades away. Back has estimated that meaningful threats could take 20 to 40 years to emerge, giving Bitcoin ample time to transition to quantum-resistant cryptography.

 

 

Back has also dismissed recent warnings as exaggerated, arguing that current quantum machines remain far too limited to threaten Bitcoin’s security model today.

Nick Szabo, a cryptographer and early Bitcoin pioneer, has taken a more nuanced view. Szabo has acknowledged that quantum computing is eventually inevitable, but argues that governance, legal and regulatory risks remain more immediate threats to cryptocurrencies.

 

 

That divergence reflects a broader debate inside crypto: whether quantum computing represents a distant theoretical risk or an emerging engineering race.

 

Institutional risk models begin to shift

Some institutional investors are already adjusting. A recent strategy shift from Jefferies removed Bitcoin from a long-term portfolio, citing quantum computing risks and estimates that millions of coins could become vulnerable once cryptographically relevant quantum computers emerge.

Meanwhile, cybersecurity firms warn that organizations are largely unprepared. A recent industry survey found that 90% of enterprises lack quantum-resistant systems, despite most expecting quantum attacks within five years.

 

Migration challenge

Even if quantum computers remain years away, migration may take longer.

Transitioning Bitcoin or Ethereum to post-quantum cryptography would likely involve:

  • New signature algorithms
  • Wallet upgrades
  • Address format changes
  • Network-wide consensus changes

 

Such upgrades historically take years to deploy.

 

A strategic race

The Google-backed research does not claim that Bitcoin or Ethereum are immediately vulnerable. But it does suggest the timeline between first practical quantum machines and real-world attacks may be shorter than previously assumed.

The result is a shift in framing: quantum computing is no longer just a distant theoretical threat, but an emerging strategic race between cryptographers and quantum hardware developers.

And if the paper’s estimates prove accurate, the window to react when the tipping point arrives may be measured in minutes rather than years.

Share

Onkar Singh

Onkar is a seasoned digital finance (DeFi) content creator with half a decade of experience in the blockchain and cryptocurrency industry. He has contributed to leading crypto media platforms, and collaborated with numerous DeFi projects worldwide. He blends his passion for technology and storytelling to deliver insightful content that bridges the gap between complex blockchain concepts and mainstream understanding.

Latest Podcast

Mar 17 2026 / Length: 36:29
Mar 6 2026 / Length: 46:59
Feb 27 2026 / Length: 23:56
Feb 5 2026 / Length: 55:34
Wise Prize - Pulse by Alphawire

For this week’s episode of Pulse, Aldo…

Jan 26 2026 / Length: 45:05

Ad

Related Articles