Bitcoin bulls scramble for post-quantum protection as Google drops bombshell paper
Google's finding that breaking bitcoin's cryptography requires 20x fewer qubits than previously estimated has triggered the strongest industry response to quantum threats since the Willow chip in 2024. Here's how builders, investors, and researchers are reacting.
Google's finding that breaking bitcoin's cryptography requires 20x fewer qubits than previously estimated has triggered the strongest industry response to quantum threats since the Willow chip in 2024. Here's how builders, investors, and researchers are reacting.
Updated Mar 31, 2026, 3:13 p.m. Published Mar 31, 2026, 11:38 a.m.
Make preferred on
Google just told the crypto industry the threat is closer than anyone priced in. The industry, for once, is listening.
A whitepaper published late Monday by Google's Quantum AI team found that breaking the 256-bit elliptic curve cryptography protecting bitcoin and Ethereum wallets could require fewer than 500,000 physical qubits (a unit of computation in quantum systems), roughly a 20-fold reduction from previous estimates that placed the requirement in the millions.
The paper also described how a quantum computer could crack bitcoin private keys in about nine minutes once a transaction exposes a public key, giving an attacker a 41% chance of beating bitcoin's 10-minute confirmation window.
The research landed like a bomb across online crypto circles. Not because it says quantum computers can break bitcoin today — they can't — but because it dramatically compresses the timeline for when they might.
"We are no longer looking at mid-2030s, we could have quantum computers of this scale by the end of the decade," said Haseeb Qureshi, managing partner at Dragonfly, on X. "All blockchains need a transition plan ASAP. Post-quantum is no longer a drill."
Qureshi pointed to an unusual detail in Google's disclosure. The team did not publish the actual quantum circuits. Instead, they released a zero-knowledge proof that verifies the circuits exist without revealing how they work. "This is very atypical, showing Google thinks this is serious," he said.
Justin Drake, an Ethereum Foundation researcher who joined the Google paper as a late co-author, said his "confidence in q-day by 2032 has shot up significantly," estimating at least a 10% chance that a quantum computer recovers a 'secp256k1' private key from an exposed public key by that date.
Drake noted the optimized quantum circuit is "just 100 million Toffoli gates, which is surprisingly shallow," and that on a superconducting platform, the total runtime would be roughly 1,000 seconds.
"Low-hanging fruit is still being picked, with at least one of the Google optimizations resulting from a surprisingly simple observation," Drake added. "AI was not yet tasked to find optimizations."
While human researchers are still finding straightforward improvements, the floor for the number of qubits needed hasn't been reached. Drake said logical qubit counts "could plausibly go under 1,000 soonish."
Today is a monumentous day for quantum computing and cryptography. Two breakthrough papers just landed (links in next tweet). Both papers improve Shor's algorithm, infamous for cracking RSA and elliptic curve cryptography. The two results compound, optimising separate layers of…
— Justin Drake (@drakefjustin) March 31, 2026
Security engineer Conor Deegan, whose published research was cited in the Google paper, offered one of the most technically detailed responses. He flagged a pattern in which the paper surfaces across multiple chains: quantum computation acts as a one-time cost that produces indefinitely reusable classical exploits.
Ethereum's 'KZG' trusted setup, Zcash's 'Sapling' protocol, and Litecoin's 'MimbleWimble' all embed elliptic curve hardness into fixed public parameters that only need to be broken once.
"Deploying new cryptographic infrastructure on ECDLP curves is now indefensible given these resource estimates," Deegan said.
The paper estimates roughly 6.9 million bitcoin, about one-third of the total supply, sit in wallets where public keys have already been exposed. That includes 1.7 million BTC from the network's early years, including Satoshi Nakamoto's (the mysterious creator of the Bitcoin network), as well as additional funds affected by address reuse.
CoinDesk reported earlier Monday that bitcoin's 2021 Taproot upgrade, which was designed to enable more efficient, private transactions, also exposed public keys on the blockchain by default, a technical move that now carries quantum risk.
That figure dwarfs CoinShares' February estimate that only about 10,200 BTC is concentrated enough to cause "appreciable market disruption" if stolen. Google's methodology counts all exposed keys, not just large balances.
The Bitcoin vs Ethereum divide
The reaction split along familiar lines. Ethereum's preparation drew praise. Bitcoin's lack of it drew alarm.
"You can think of q-day as Y2K but real," said well-followed crypto investor only known as 'McKenna,' managing partner at Arete. "People should give thanks to the Ethereum Foundation for being early and leading this research. The messy part about this is Bitcoin. The lack of urgency and the consensus issue on what to do with vulnerable coins."
The Ethereum Foundation launched pq.ethereum.org last week with eight years of post-quantum research, more than 10 client teams shipping weekly devnets, and a multi-fork migration roadmap.
Drake, who co-authored the Google paper, is part of that same Ethereum team — a direct link between the researchers quantifying the threat and the developers building the defense.
Eli Ben-Sasson, co-founder of StarkWare, urged the Bitcoin community to "strengthen initiatives like BIP 360," a proposal that would introduce quantum-resistant wallet formats allowing voluntary migration.
"Saying that quantum computers are coming is not FUD," Ben-Sasson said. "FUD is claiming Bitcoin can't adapt. It can adapt. Just need to start working on these solutions today."
Bitcoin needs to get ready for the quantum era.We need to strengthen initiatives like BIP 360.We need to invest more efforts in finding creative, smart solutions to ensure Bitcoin is post-quantum secure.
Saying that quantum computers are coming is not FUD. FUD is claiming… https://t.co/KqQ0RpXKbX
— Eli Ben-Sasson | Starknet.io (@EliBenSasson) March 31, 2026
Bitcoin advocate Bit Paine offered a measured take. "I still think roughly 10 years is the more likely timeframe, but I assign an uncomfortably high likelihood that we see something disruptive within five years. High enough that action within the next one to two years is prudent."
The element that shifted his thinking was the "persistent non-linearities in QC progress and the shroud of secrecy underlying this research." When estimates of physical qubits drop by orders of magnitude, he said, "we may not have much of a window between 'quantum is on a trajectory to disrupt bitcoin' and 'secp256k1 is broken.'"
Paine added a national security dimension. "A CRQC may be developed in stealth mode and drop out of seemingly nowhere."
Google's decision to use a zero-knowledge proof rather than publish the circuits reinforces that point. If the world's leading quantum lab self-censors its own research for safety reasons, state actors with equivalent or superior capabilities are unlikely to publish at all.
Drake echoed this. "From now on, assume state-of-the-art algorithms will be censored. A blackout in academic publications would be a tell-tale sign."
Why crypto?
Some industry voices questioned why Google aimed its most detailed analysis at crypto rather than banking or military systems. ETF analyst Eric Balchunas asked why Google would "apply this research time/money on crypto versus something of way more societal consequence."
Nic Carter, a partner at Castle Island Ventures, had the answer: blockchains are the most brittle systems relying on the encryption that quantum computers can break. "Banks don't fail because you reverse engineer a single key. Blockchains do," Carter said. "They are much more brittle. Banks will upgrade anyway. There won't be an attack surface there."
Binance co-founder Changpeng Zhao urged calm but acknowledged the practical difficulty.
"All crypto has to do is upgrade to quantum-resistant algorithms. So, no need to panic," Zhao said. "In practice, there are some execution considerations. It's hard to organize upgrades in a decentralized world."
Zhao also raised the Satoshi question directly. If those coins move during a migration, "it means he is still around, which is interesting to know." If they don't, he said, "it might be better to lock or effectively burn those addresses so that they don't go to the first hacker who cracks it."
Saw some people panicking or asking about quantum computing's impact on crypto.At a high level, all crypto has to do is to upgrade to Quantum-Resistant (Post-Quantum) Algorithms. So, no need to panic. 😂
In practice, there are some execution considerations. It's hard to…
— CZ 🔶 BNB (@cz_binance) March 31, 2026
The most popular counterargument on crypto X was that quantum computing breaks everything, not just blockchains.
"If quantum kills Bitcoin, it also kills the global banking system, SWIFT transfers, stock exchanges, military communications, nuclear command systems, every HTTPS website on earth," wrote crypto commentator Quinten Francois.
Elon Musk struck a lighter note, posting that at least "if you forgot the password to your wallet, it will be accessible in the future."
The paper addresses this framing head-on. Centralized systems, from banks to military networks, can push software updates to their users. A decentralized blockchain cannot. The timeline to migrate bitcoin's infrastructure, including user wallets, exchange support, and new address formats, could take five to 10 years even after a solution is agreed upon.Meanwhile, Google said it is working alongside Coinbase, the Stanford Institute for Blockchain Research, and the Ethereum Foundation on responsible approaches to the transition.
The company framed its research not as an attack on crypto but as an effort to "support the long-term health of the cryptocurrency ecosystem."
The message from nearly every corner of the industry is now the same. The threat is no longer theoretical; it's time to act. The only variable left is whether the protocols that need to migrate will do so before the hardware catches up.
Read more: Here's how bitcoin, Ethereum and other networks are preparing for the looming quantum threat
More For You
Most crypto privacy models weaken as blockchain data grows. Encryption-based models like Zcash strengthen. CoinDesk Research maps the five privacy approaches and examines the widening gap.
Why it matters:
As blockchain adoption scales, the metadata available to machine learning models scales with it. Obfuscation-based privacy approaches are structurally degrading as a result. This report provides a comprehensive comparison of all five major crypto privacy architectures and a framework for evaluating which models remain durable as AI capabilities improve.
View Full Report
More For You
The exploit did not involve a bug in Drift's code. It used "durable nonces," a legitimate Solana transaction feature, to pre-sign administrative transfers weeks before executing them, bypassing the protocol's multisig security in minutes.
What to know:
- An attacker drained at least $270 million from the Drift Protocol on Solana by abusing a legitimate feature called 'durable nonces,' rather than exploiting a code bug or stolen keys.
- By securing two misleading approvals from Drift's five-member Security Council multisig, the attacker pre-signed transactions that remained valid for more...
Read full story
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
paperresearch
Inter-Speaker Relative Cues for Two-Stage Text-Guided Target Speech Extraction
arXiv:2603.01316v2 Announce Type: replace Abstract: This paper investigates the use of relative cues for text-based target speech extraction (TSE). We first provide a theoretical justification for relative cues from the perspectives of human perception and label quantization, showing that relative cues preserve fine-grained distinctions that are often lost in absolute categorical representations for continuous-valued attributes. Building on this analysis, we propose a two-stage TSE framework in which a speech separation model first generates candidate sources, followed by a text-guided classifier that selects the target speaker based on embedding similarity. Within this framework, we train two separate classification models to evaluate the advantages of relative cues over independent cues

RIFT: Entropy-Optimised Fractional Wavelet Constellations for Ideal Time-Frequency Estimation
arXiv:2501.15764v3 Announce Type: replace Abstract: We introduce a new method for estimating the Ideal Time-Frequency Representation (ITFR) of complex nonstationary signals. The Reconstructive Ideal Fractional Transform (RIFT) computes a constellation of Continuous Fractional Wavelet Transforms (CFWTs) aligned to different local time-frequency curvatures. This constellation is combined into a single optimised time-frequency energy representation via a localised entropy-based sparsity measure, designed to resolve auto-terms and attenuate cross-terms. Finally, a positivity-constrained Lucy-Richardson deconvolution with total-variation regularisation is applied to estimate the ITFR, achieving auto-term resolution comparable to that of the Wigner-Ville Distribution (WVD), yielding the high-res

MIMO Capacity Enhancement by Grating Walls: A Physics-Based Proof of Principle
arXiv:2604.01786v1 Announce Type: new Abstract: This paper investigates the passive enhancement of MIMO spectral efficiency through boundary engineering in a simplified two dimensional indoor proof of principle model. The propagation channel is constructed from the electromagnetic Green's function of a room with boundaries modeled as free space, drywall, perfect electric conductor (PEC), or binary gratings. Within this framework, grating coated walls enrich the non line of sight (NLoS) multipath field, reduce channel correlation, and enhance spatial multiplexing over a broad range of receiver locations. Comparisons with the drywall and PEC reference cases further reveal that the observed capacity enhancement arises not from diffraction alone, but from the combined effects of effective wall
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Research Papers

MIMO Capacity Enhancement by Grating Walls: A Physics-Based Proof of Principle
arXiv:2604.01786v1 Announce Type: new Abstract: This paper investigates the passive enhancement of MIMO spectral efficiency through boundary engineering in a simplified two dimensional indoor proof of principle model. The propagation channel is constructed from the electromagnetic Green's function of a room with boundaries modeled as free space, drywall, perfect electric conductor (PEC), or binary gratings. Within this framework, grating coated walls enrich the non line of sight (NLoS) multipath field, reduce channel correlation, and enhance spatial multiplexing over a broad range of receiver locations. Comparisons with the drywall and PEC reference cases further reveal that the observed capacity enhancement arises not from diffraction alone, but from the combined effects of effective wall

1-bit Quantized Continuous Aperture Arrays
arXiv:2604.01780v1 Announce Type: new Abstract: Continuous aperture arrays (CAPAs) have emerged as a promising physical-layer paradigm for sixth generation (6G) systems, offering spatial degrees of freedom beyond those of conventional discrete antenna arrays. This paper investigates the interaction between the CAPA receive architecture and low-cost 1-bit analog-to-digital converters (ADCs), which impose a severe nonlinear distortion penalty in conventional discrete systems. For Rayleigh fading, we derive a moment matching approximation (MMA)-based closed-form symbol error probability (SEP) approximation based on Gamma moment-matching of the spatial eigenvalue distribution, and show that CAPAs incur a diversity-order penalty governed by Jensen's inequality on the mode eigenvalues. For line-

Channel Measurements and Modeling based on Composite Environmental Factor for Urban Street-Canyon Intersections
arXiv:2604.01767v1 Announce Type: new Abstract: In urban environments, vehicle-to-everything (V2X) communications require accurate wireless channel characterization. This requirement is particularly critical at street-canyon intersections, where building blockage and rich multipath propagation can severely degrade link reliability. Due to its unique environmental layout, the channel characteristics in urban canyon are influenced by building distribution. However, this feature has not been well captured in existing channel models. In this paper, we propose an environment-related statistical channel model based on 5.8~GHz channel measurements. We construct a composite environmental factor to characterize environmental differences in intersections. Then, the factor is incorporated into 3GPP p

Visual Decoding Operators: Towards a Compositional Theory of Visualization Perception
arXiv:2604.02220v1 Announce Type: new Abstract: Prior work on perceptual effectiveness has decomposed visualizations into smaller common units (e.g., channels such as angle, position, and length) to establish rankings. While useful, these decompositions lack the computational structure to predict performance for new visualization $\times$ task combinations, requiring new experiments for each. We propose an alternative unit of analysis: operationalizing quantitative visualization interpretation as sequences of composable visual decoding operators. Using probability density function (PDF) and cumulative distribution function (CDF) charts, we examine how chart-specific tasks can be decomposed into reusable, chart-agnostic perceptual operations and characterize their error profiles through hie


Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!