- Quantum resource estimates suggest that encryption barriers may fall faster than expected
- Reduced qubit requirements bring theoretical attacks closer to practical reality
- Bitcoin’s cryptographic foundations are facing pressure from advancing quantum algorithm efficiency
Google researchers have revised expectations around the computational demands needed to break widespread cryptographic systems that protect cryptocurrencies.
The company’s latest white paper claims that a future quantum machine could solve the elliptic curve discrete logarithm problem using significantly fewer resources than previously thought.
Previous estimates suggested that millions of qubits would be needed to break encryption systems such as secp256k1, which support Bitcoin security.
The article continues below
New quantum discoveries reduce crypto-security timelines
The new results indicate that fewer than 500,000 physical qubits could be sufficient, representing a significant reduction in expected hardware requirements.
The research outlines two quantum circuit designs capable of executing Shor’s algorithm, which requires under 1,500 logic qubits and tens of thousands of quantum gate operations.
Under standard hardware performance assumptions, these calculations could be performed within minutes on a sufficiently advanced system.
This marks a continuation of incremental improvements in quantum algorithm efficiency rather than a sudden breakthrough in hardware capabilities.
Google states that the intention behind the publication of these results is not to create alarm, but to encourage preparation within the cryptocurrency ecosystem.
“We want to raise awareness of this issue and provide the cryptocurrency community with recommendations to improve security and stability before this is possible, including the transition of blockchains to post-quantum cryptography,” said Google executives Ryan Babbush and Hartmut Neven.
The company adopted a controlled disclosure strategy, sharing verifiable results through a zero-knowledge proof mechanism without revealing sensitive implementation details that could enable misuse.
This approach reflects established practices in cybersecurity where vulnerabilities are disclosed in a coordinated manner to allow time for remediation.
However, disclosure in blockchain systems introduces additional complexity as trust in the network plays a direct role in asset value.
Researchers note that exaggerated or poorly substantiated claims can contribute to instability through fear and uncertainty, even in the absence of immediate technical risk.
Most blockchain systems currently rely on elliptic curve encryption, which remains secure against classical computer attacks but is vulnerable in a quantum scenario.
Google points to post-quantum cryptography as a viable path and emphasizes that alternative algorithms based on more complex mathematical structures are already under development.
These methods aim to withstand quantum attacks while maintaining compatibility with existing systems.
Despite the availability of potential solutions, implementation across decentralized networks is expected to be gradual.
The researchers emphasize the importance of early planning, including reducing the exposure of vulnerable wallet addresses and considering policies for inactive or abandoned digital assets.
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews and opinions in your feeds. Be sure to click the Follow button!
And of course you can too follow TechRadar on TikTok for news, reviews, video unboxings, and get regular updates from us on WhatsApp also.



