Google research finds quantum computers could break Bitcoin encryption with 500,000 qubits

    Bitcoin's security model has held up for over fifteen years. The cryptographic foundation, specifically the elliptic curve digital signature algorithm it relies on, has never been broken in practice. Google's latest quantum computing research suggests that barrier has a number attached to it now: roughly 500,000 qubits. That's the threshold at which a quantum computer could crack the encryption protecting Bitcoin wallets, and about a third of all Bitcoin in circulation sits in addresses that would be exposed.

    The research doesn't mean Bitcoin is broken today. Current quantum hardware is nowhere near 500,000 qubits of fault-tolerant capacity. Google's Willow chip, announced in late 2024, operates at 105 qubits. But the paper establishes a concrete target, and that changes the conversation from theoretical to technical.

    What the 500,000 qubit number actually means

    Quantum computers use qubits instead of binary bits, which lets them process certain types of problems exponentially faster than classical computers. One class of problems they're particularly good at involves factoring large numbers, which is exactly what breaking elliptic curve cryptography requires. Shor's algorithm, developed in 1994, laid out the theoretical approach. The question has always been how much quantum hardware you'd actually need to run it at scale.

    Google's research pins that requirement at approximately 500,000 physical qubits operating with error correction. The 'physical' qualifier matters. Today's qubits are noisy and error-prone, so a large portion of them have to be dedicated to error correction rather than computation. The ratio between physical qubits and usable logical qubits is still unfavorable, which is part of why 105 qubits today doesn't translate to meaningful cryptographic threat.

    Quantum computing hardware research relevant to Bitcoin encryption security
    Quantum computing hardware research relevant to Bitcoin encryption security

    Which Bitcoin is actually at risk

    Not all Bitcoin wallets carry the same exposure. The addresses most at risk are pay-to-public-key addresses, where the public key is visible on the blockchain. Anyone who has ever sent Bitcoin from an address has also exposed their public key in the transaction signature. From that public key, a sufficiently powerful quantum computer running Shor's algorithm could work backward to derive the private key.

    Estimates vary, but research published in 2022 by Mark Webber and colleagues at the University of Sussex calculated that around 25% of Bitcoin in circulation at the time sat in vulnerable address formats. Google's new paper suggests the figure is closer to a third when accounting for address reuse patterns that have accumulated over the years. Satoshi Nakamoto's original coins, which have never moved, are among the most exposed holdings in the entire network.

    How fast could this actually happen

    The timeline question is where serious disagreement exists. IBM's quantum roadmap targets 100,000 qubits by 2033. Google has not published a public timeline for reaching 500,000 fault-tolerant qubits. The gap between current hardware and the threshold needed to threaten Bitcoin is still enormous, and progress in error correction has been slower than raw qubit count growth would suggest.

    The National Institute of Standards and Technology finalized its first set of post-quantum cryptographic standards in August 2024, covering algorithms like CRYSTALS-Kyber and CRYSTALS-Dilithium. These are designed to resist attacks from quantum computers. The standards exist specifically because governments and standards bodies expect the threat window to open within the next ten to thirty years, even if the exact timing is uncertain.

    What the Bitcoin network can do about it

    Bitcoin is not defenseless here, but any fix requires a protocol upgrade, and Bitcoin upgrades are slow by design. The network would need to implement quantum-resistant signature schemes, likely through a soft fork or hard fork, and users with exposed addresses would need to migrate funds to new addresses using post-quantum cryptography. That migration has to happen before a capable quantum computer exists, which means the window for action is tied to how quickly quantum hardware scales.

    The Bitcoin developer community has discussed quantum resistance for years without producing a formal proposal that's gained traction. The technical complexity is real: changing Bitcoin's signature scheme without breaking backward compatibility or consensus is genuinely hard. Ethereum's developers have been more publicly active on post-quantum planning, with Vitalik Buterin outlining an account abstraction approach in early 2024 that could simplify the migration path.

    Google's broader quantum research context

    Google has been publishing aggressive quantum milestones since its 2019 claim of quantum supremacy on a narrow computational task. The Willow chip announcement in December 2024 showed meaningful progress on error correction, reducing error rates as qubit count increased, which had been a persistent problem. The Bitcoin encryption research appears to be part of a broader effort to quantify real-world cryptographic risk, not just benchmark abstract problems.

    The paper puts a specific number on a threat that has previously been described only in rough terms. That specificity is useful for policy and engineering work, even if the hardware needed to act on it is still years away. NIST's post-quantum standards are already finalized. The question now is how fast the cryptocurrency industry, and specifically Bitcoin, moves to implement them.

    Love this story? Explore more trending news on quantum computing

    Share this story

    Frequently Asked Questions

    Q: Does this research mean my Bitcoin is at risk right now?

    No. Current quantum computers, including Google's 105-qubit Willow chip, are far below the 500,000 fault-tolerant qubits the research identifies as the threat threshold. The risk is projected over a longer horizon, likely measured in years to decades.

    Q: Which Bitcoin wallets are most vulnerable to a quantum attack?

    Wallets using pay-to-public-key address formats and any address that has previously sent a transaction are most exposed, because the public key is visible on the blockchain. Addresses that have only received Bitcoin and never spent it are harder to attack.

    Q: Has Bitcoin already developed a fix for quantum threats?

    No formal upgrade proposal with broad developer support exists yet. Implementing post-quantum signature schemes in Bitcoin would require a protocol change agreed upon by the entire network, which is a slow and politically complex process.

    Q: What are the post-quantum cryptography standards that could protect Bitcoin?

    NIST finalized post-quantum standards in August 2024, including CRYSTALS-Kyber for key encapsulation and CRYSTALS-Dilithium for digital signatures. These algorithms are designed to remain secure against quantum computers, though integrating them into Bitcoin's protocol would require a network-wide upgrade.

    Q: Why are Satoshi Nakamoto's original coins considered especially vulnerable?

    Satoshi's early coins were sent to pay-to-public-key addresses, which expose the public key directly. Since those coins have never moved, the public key is permanently visible on the blockchain, making them a target if quantum hardware ever reaches the 500,000-qubit threshold.

    Read More