A quantum computer may need just 10,000 qubits to empty your crypto wallets, researchers say
The research shows quantum computers may break bitcoin and ether wallet encryption with far fewer qubits than previously thought, accelerating the push toward post-quantum security.
The research shows quantum computers may break bitcoin and ether wallet encryption with far fewer qubits than previously thought, accelerating the push toward post-quantum security.
Updated Mar 31, 2026, 11:44 a.m. Published Mar 31, 2026, 11:03 a.m.
Make preferred on
The quantum computing power required to break the encryption that secures blockchains continues to decline, at least in theory, raising the question of whether the industry can migrate to quantum-resistant platforms before they become vulnerable at an affordable cost.
A new paper by Caltech and quantum startup Oratomic suggests a system with around 26,000 qubits could break ECC-256, the encryption standard that secures the Bitcoin and Ethereum blockchains, in about 10 days. RSA-2048, used by financial institutions to secure their Web2 platforms, is more challenging, they found.
The researchers found the cryptography protecting bitcoin BTC$68,650.18 and ether (ETH) wallets could be broken using as few as 10,000 physical qubits, collapsing prior estimates that until this week still ran into the hundreds of thousands.
Qubits are the basic units of quantum computers, similar to bits in traditional machines. They are a measure not of speed, like gigahertz or teraflops, but rather reflect the scale of the system, closer to the number of cores or transistors in a chip.
The paper, posted Monday to the arXiv preprint server, landed alongside a Google Quantum AI whitepaper that pegged the threshold at fewer than 500,000 physical qubits.
The two are closely connected: the Oratomic team uses Google’s quantum circuits designed to break 256-bit elliptic curve cryptography, the system securing bitcoin and ether wallets, and shows a neutral-atom setup — laser-controlled atoms acting as qubits — could run them with about a 50th of the qubits Google estimated.
Together, the papers mark one of the sharpest compressions yet in the timeline of quantum threats. Estimated requirements for running Shor’s algorithm, the quantum method for breaking public-key encryption, have now fallen five orders of magnitude in two decades, from roughly 1 billion physical qubits in 2012 to about 10,000 today.
Those gains translate into clearer timelines for potential attacks.
Under the paper’s assumptions, a system with around 26,000 qubits could break ECC-256, the encryption standard that secures the Bitcoin and Ethereum blockchain, in about 10 days, effectively allowing a quantum computer to derive private keys and take control of funds.
RSA-2048, used by financial institutions to secure their web2 platforms, would require closer to 102,000 qubits and roughly three months in a highly parallelized setup. Elliptic curve cryptography is more exposed because it achieves comparable security with smaller keys, making it easier work for a quantum machine.
That roughly 10-day window makes the rapid “on-spend” attack outlined in Google’s paper, where a quantum computer cracks a key in minutes and front-runs a live bitcoin transaction, unlikely under these assumptions.
It does little, however, to reduce the longer-term risk to funds already sitting in vulnerable addresses, including an estimated 6.9 million BTC tied to early wallets and reused addresses.
That framing comes with caveats. All nine authors are shareholders in Oratomic, with six employed by the company, positioning the paper as both a scientific result and a roadmap for its hardware approach.
The direction, however, is becoming harder to ignore. The question is no longer whether quantum systems can break crypto, but whether the industry can migrate before the cost of doing so collapses further.
More For You
Most crypto privacy models weaken as blockchain data grows. Encryption-based models like Zcash strengthen. CoinDesk Research maps the five privacy approaches and examines the widening gap.
Why it matters:
As blockchain adoption scales, the metadata available to machine learning models scales with it. Obfuscation-based privacy approaches are structurally degrading as a result. This report provides a comprehensive comparison of all five major crypto privacy architectures and a framework for evaluating which models remain durable as AI capabilities improve.
View Full Report
More For You
Bitcoin’s price retraces to old highs, signaling slower growth and a maturing market.
What to know:
- Bitcoin’s current bear market has pulled prices back to about $70,000, revisiting the prior cycle’s record high and breaking from earlier patterns in which past peaks were rarely retested.
- Each successive bull run has produced smaller percentage gains, reflecting the law of diminishing returns as higher prices demand far more...
Read full story
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
researchAI Inspires New Research Topics In Materials Science - miragenews.com
<a href="https://news.google.com/rss/articles/CBMihwFBVV95cUxQRlVFdkRBaHRvYkJJdFRlMTZmajEzeFRPU0hGWWdfbi02V1FnTUdVQ2pmY2VZLUV2NlB4V3BFdEVlSVZkUlhRSTZaNWFKMmcyWXJYbnNqbUhMTmp0NnFtMEppOXlPZkJSNHJfck5VSEVYcmUtX1k2QkJlR1BvUEdTTkp3UmlYRkk?oc=5" target="_blank">AI Inspires New Research Topics In Materials Science</a> <font color="#6f6f6f">miragenews.com</font>
Exclusive | Caltech Researchers Claim Radical Compression of High-Fidelity AI Models - WSJ
<a href="https://news.google.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?oc=5" target="_blank">Exclusive | Caltech Researchers Claim Radical Compression of High-Fidelity AI Models</a> <font color="#6f6f6f">WSJ</font>
Sweden brings urgency—and royalty—to Montréal as it seeks AI research partnership - BetaKit
<a href="https://news.google.com/rss/articles/CBMipAFBVV95cUxNaFdQTnJheUhjQWN4YzRIX082TlN6MWhTOUo1UnhmTGJ3RFp6dXNhbXphd3FlOUUtTGxwZWhrUkQtNEszcnhpYXhNNnVVT3RIU3QtNXlnZ0thb3VoSmZJcUExN0JTMURxZjFMLWhhVmM3dlhLemtiRUZ0azkwRGVkRDdpN1lBa1E4ZF9kWFpWaDdIM0ZHbGk3d241N1JkMEJUdVpSMw?oc=5" target="_blank">Sweden brings urgency—and royalty—to Montréal as it seeks AI research partnership</a> <font color="#6f6f6f">BetaKit</font>
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Research Papers
AI Inspires New Research Topics In Materials Science - miragenews.com
<a href="https://news.google.com/rss/articles/CBMihwFBVV95cUxQRlVFdkRBaHRvYkJJdFRlMTZmajEzeFRPU0hGWWdfbi02V1FnTUdVQ2pmY2VZLUV2NlB4V3BFdEVlSVZkUlhRSTZaNWFKMmcyWXJYbnNqbUhMTmp0NnFtMEppOXlPZkJSNHJfck5VSEVYcmUtX1k2QkJlR1BvUEdTTkp3UmlYRkk?oc=5" target="_blank">AI Inspires New Research Topics In Materials Science</a> <font color="#6f6f6f">miragenews.com</font>
From brain scans to alloys: Teaching AI to make sense of complex research data - Penn State University
<a href="https://news.google.com/rss/articles/CBMiwAFBVV95cUxPZDFHdkptQ2VUM2hmWjhqQkxoRnBiTWoxMXRRR21MUG5TamdUMlFRWmhvYVNHaFVNREVKU3VmSnVOdDVZYnNLb2ppYXRVRTZmVFVMV1pLTlVhUm9ybTNZbGtvZTdIMnIyMHNpOEk5aU9TSmxxS2Y4V2MwazYwY3JlX1Axbk1nd3pfcWhFdUJaaDJWRXJaMFIyTTROcmFHeXI3ZzFudXJ2M1h6UHI1LW1Ca1dta2RkM3BiYndocGk3Yjg?oc=5" target="_blank">From brain scans to alloys: Teaching AI to make sense of complex research data</a> <font color="#6f6f6f">Penn State University</font>

Locating Risk: Task Designers and the Challenge of Risk Disclosure in RAI Content Work
arXiv:2505.24246v4 Announce Type: replace Abstract: As AI systems are increasingly tested and deployed in open-ended and high-stakes domains, crowdworkers are often tasked with responsible AI (RAI) content work. These tasks include labeling violent content, moderating disturbing text, or simulating harmful behavior for red teaming exercises to shape AI system behaviors. While prior research efforts have highlighted the risks to worker well-being associated with RAI content work, far less attention has been paid to how these risks are communicated to workers by task designers or individuals who design and post RAI tasks. Existing transparency frameworks and guidelines, such as model cards, datasheets, and crowdworksheets, focus on documenting model information and dataset collection process

Togedule: Scheduling Meetings with Large Language Models and Adaptive Representations of Group Availability
arXiv:2505.01000v5 Announce Type: replace Abstract: Scheduling is a perennial-and often challenging-problem for many groups. Existing tools are mostly static, showing an identical set of choices to everyone, regardless of the current status of attendees' inputs and preferences. In this paper, we propose Togedule, an adaptive scheduling tool that uses large language models to dynamically adjust the pool of choices and their presentation format. With the initial prototype, we conducted a formative study (N=10) and identified the potential benefits and risks of such an adaptive scheduling tool. Then, after enhancing the system, we conducted two controlled experiments, one each for attendees and organizers (total N=66). For each experiment, we compared scheduling with verbal messages, shared c

Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!