Live
Black Hat USAAI BusinessBlack Hat AsiaAI BusinessPower Pages Authentication Methods: The Complete Guide (2026)DEV CommunityClaude Code Unpacked: what the visual guide reveals about the architectureDEV CommunityExolane Review: What It Gets Right on Custody, Funding Caps, and RiskDEV CommunityGitHub Agentic Workflows: AI Agents Are Coming for Your Repository Maintenance Tasks (And That's a Good Thing)DEV CommunityAlibaba Launches XuanTie C950 CPU for Agentic AIEE TimesThe Illusion of Data Custody in Legal AI — and the Architecture I Built to Replace ItDEV CommunityI use these 5 simple ‘ChatGPT codes’ every day — and they instantly improve my results - TechRadarGoogle News: ChatGPTTurboQuant, KIVI, and the Real Cost of Long-Context KV CacheDEV CommunityWhy ChatGPT Cites Your Competitors (Not You)DEV CommunityIntroducing Anti-Moral RealismLessWrong AIFrom idea to live web app in minutes with Spektrum. An AI-powered web app builder for MVPs, rapid prototyping, and full-stack JavaScript apps. Skip setup, generate real products, and deploy instantly without infrastructure headaches. 🔥DEV CommunityAnthropic Just Proved That Codebase Governance Is Now the #1 Priority for Every Engineering OrgDEV CommunityBlack Hat USAAI BusinessBlack Hat AsiaAI BusinessPower Pages Authentication Methods: The Complete Guide (2026)DEV CommunityClaude Code Unpacked: what the visual guide reveals about the architectureDEV CommunityExolane Review: What It Gets Right on Custody, Funding Caps, and RiskDEV CommunityGitHub Agentic Workflows: AI Agents Are Coming for Your Repository Maintenance Tasks (And That's a Good Thing)DEV CommunityAlibaba Launches XuanTie C950 CPU for Agentic AIEE TimesThe Illusion of Data Custody in Legal AI — and the Architecture I Built to Replace ItDEV CommunityI use these 5 simple ‘ChatGPT codes’ every day — and they instantly improve my results - TechRadarGoogle News: ChatGPTTurboQuant, KIVI, and the Real Cost of Long-Context KV CacheDEV CommunityWhy ChatGPT Cites Your Competitors (Not You)DEV CommunityIntroducing Anti-Moral RealismLessWrong AIFrom idea to live web app in minutes with Spektrum. An AI-powered web app builder for MVPs, rapid prototyping, and full-stack JavaScript apps. Skip setup, generate real products, and deploy instantly without infrastructure headaches. 🔥DEV CommunityAnthropic Just Proved That Codebase Governance Is Now the #1 Priority for Every Engineering OrgDEV Community

A quantum computer may need just 10,000 qubits to empty your crypto wallets, researchers say

CoinDesk AIby Sam ReynoldsMarch 31, 20261 min read0 views
Source Quiz

The research shows quantum computers may break bitcoin and ether wallet encryption with far fewer qubits than previously thought, accelerating the push toward post-quantum security.

The research shows quantum computers may break bitcoin and ether wallet encryption with far fewer qubits than previously thought, accelerating the push toward post-quantum security.

Updated Mar 31, 2026, 11:44 a.m. Published Mar 31, 2026, 11:03 a.m.

Make preferred on

The quantum computing power required to break the encryption that secures blockchains continues to decline, at least in theory, raising the question of whether the industry can migrate to quantum-resistant platforms before they become vulnerable at an affordable cost.

A new paper by Caltech and quantum startup Oratomic suggests a system with around 26,000 qubits could break ECC-256, the encryption standard that secures the Bitcoin and Ethereum blockchains, in about 10 days. RSA-2048, used by financial institutions to secure their Web2 platforms, is more challenging, they found.

The researchers found the cryptography protecting bitcoin BTC$68,650.18 and ether (ETH) wallets could be broken using as few as 10,000 physical qubits, collapsing prior estimates that until this week still ran into the hundreds of thousands.

Qubits are the basic units of quantum computers, similar to bits in traditional machines. They are a measure not of speed, like gigahertz or teraflops, but rather reflect the scale of the system, closer to the number of cores or transistors in a chip.

The paper, posted Monday to the arXiv preprint server, landed alongside a Google Quantum AI whitepaper that pegged the threshold at fewer than 500,000 physical qubits.

The two are closely connected: the Oratomic team uses Google’s quantum circuits designed to break 256-bit elliptic curve cryptography, the system securing bitcoin and ether wallets, and shows a neutral-atom setup — laser-controlled atoms acting as qubits — could run them with about a 50th of the qubits Google estimated.

Together, the papers mark one of the sharpest compressions yet in the timeline of quantum threats. Estimated requirements for running Shor’s algorithm, the quantum method for breaking public-key encryption, have now fallen five orders of magnitude in two decades, from roughly 1 billion physical qubits in 2012 to about 10,000 today.

Those gains translate into clearer timelines for potential attacks.

Under the paper’s assumptions, a system with around 26,000 qubits could break ECC-256, the encryption standard that secures the Bitcoin and Ethereum blockchain, in about 10 days, effectively allowing a quantum computer to derive private keys and take control of funds.

RSA-2048, used by financial institutions to secure their web2 platforms, would require closer to 102,000 qubits and roughly three months in a highly parallelized setup. Elliptic curve cryptography is more exposed because it achieves comparable security with smaller keys, making it easier work for a quantum machine.

That roughly 10-day window makes the rapid “on-spend” attack outlined in Google’s paper, where a quantum computer cracks a key in minutes and front-runs a live bitcoin transaction, unlikely under these assumptions.

It does little, however, to reduce the longer-term risk to funds already sitting in vulnerable addresses, including an estimated 6.9 million BTC tied to early wallets and reused addresses.

That framing comes with caveats. All nine authors are shareholders in Oratomic, with six employed by the company, positioning the paper as both a scientific result and a roadmap for its hardware approach.

The direction, however, is becoming harder to ignore. The question is no longer whether quantum systems can break crypto, but whether the industry can migrate before the cost of doing so collapses further.

More For You

Most crypto privacy models weaken as blockchain data grows. Encryption-based models like Zcash strengthen. CoinDesk Research maps the five privacy approaches and examines the widening gap.

Why it matters:

As blockchain adoption scales, the metadata available to machine learning models scales with it. Obfuscation-based privacy approaches are structurally degrading as a result. This report provides a comprehensive comparison of all five major crypto privacy architectures and a framework for evaluating which models remain durable as AI capabilities improve.

View Full Report

More For You

Bitcoin’s price retraces to old highs, signaling slower growth and a maturing market.

What to know:

  • Bitcoin’s current bear market has pulled prices back to about $70,000, revisiting the prior cycle’s record high and breaking from earlier patterns in which past peaks were rarely retested.
  • Each successive bull run has produced smaller percentage gains, reflecting the law of diminishing returns as higher prices demand far more...

Read full story

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

research

Knowledge Map

Knowledge Map
TopicsEntitiesSource
A quantum c…researchCoinDesk AI

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 158 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers