Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessRAG Web Browser: Give Your AI Real-Time Web Access Without HallucinationsDEV CommunityWhat Nobody Tells You About Building a Protocol for AI AgentsDEV CommunityThe Evidence Is in the Phone. Most of It Never Makes It Into the Case.DEV CommunityIt's Not Smarter Models — It's Cheaper Memory: TurboQuant's Real Impact, Wall Street Panic & Academic StormDEV CommunityWindows might be hiding some of your PC's storage by default - here's how to reclaim itZDNet Big DataYour Production Code Is Training AI Models Right Now (And How to Audit Your Stack)DEV CommunitySetting Up Your Databricks Account (Free Trial + First Look at the UI)DEV CommunityHow to Use Augmented Coding to Build a Web AppDEV CommunitySetting up a hugo static site hosted with PorkbunDEV CommunityWhy Domain Knowledge Is the Core Architecture of Fine-Tuning and RAG — Not an AfterthoughtDEV CommunityComo o Ataque à Cadeia de Suprimentos do NPM Axios Acontece (E Como Proteger Seus Projetos de API)DEV CommunityThe Loop: How an AI Swarm Surfaced a Governance Limitation, Then Tested the FixTowards AIBlack Hat USADark ReadingBlack Hat AsiaAI BusinessRAG Web Browser: Give Your AI Real-Time Web Access Without HallucinationsDEV CommunityWhat Nobody Tells You About Building a Protocol for AI AgentsDEV CommunityThe Evidence Is in the Phone. Most of It Never Makes It Into the Case.DEV CommunityIt's Not Smarter Models — It's Cheaper Memory: TurboQuant's Real Impact, Wall Street Panic & Academic StormDEV CommunityWindows might be hiding some of your PC's storage by default - here's how to reclaim itZDNet Big DataYour Production Code Is Training AI Models Right Now (And How to Audit Your Stack)DEV CommunitySetting Up Your Databricks Account (Free Trial + First Look at the UI)DEV CommunityHow to Use Augmented Coding to Build a Web AppDEV CommunitySetting up a hugo static site hosted with PorkbunDEV CommunityWhy Domain Knowledge Is the Core Architecture of Fine-Tuning and RAG — Not an AfterthoughtDEV CommunityComo o Ataque à Cadeia de Suprimentos do NPM Axios Acontece (E Como Proteger Seus Projetos de API)DEV CommunityThe Loop: How an AI Swarm Surfaced a Governance Limitation, Then Tested the FixTowards AI

Watch Out Bitcoin: Cryptography-Breaking Quantum Computers May Be Closer Than Expected, Says Caltech

Decrypt AIby Jason NelsonApril 1, 20261 min read0 views
Source Quiz

Research suggests fault-tolerant quantum machines could arrive sooner than expected, posing a threat to Bitcoin and Ethereum cryptography.

In brief

  • Caltech researchers say quantum computers may require just 10,000–20,000 qubits to crack modern cryptography.

  • The work outlines a new error-correction approach for neutral-atom quantum computers.

  • The advance could accelerate timelines for machines capable of running Shor’s algorithm, which threatens widely used cryptography.

Quantum computers capable of breaking modern cryptography may require far fewer qubits than previously believed, according to new research from the California Institute of Technology.

In the study published Monday, Caltech worked with Pasadena-based Oratomic, a quantum computing startup founded by Caltech researchers, to develop a new neutral-atom system in which individual atoms are trapped and controlled with lasers to act as qubits. Doing so could allow a fault-tolerant quantum computer to run Shor’s algorithm, which could derive private keys from the public keys used in Bitcoin’s elliptic-curve cryptography, with as few as 10,000 reconfigurable atomic qubits.

Oratomic co-founder and CEO Dolev Bluvstein, a visiting associate in physics at Caltech, said advances in quantum computing are accelerating the timeline for practical machines and increasing pressure to migrate to quantum-resistant cryptography.

“People are used to quantum computers always being 10 years away,” Bluvstein told Decrypt. “But when you look at where we were a little over ten years ago, the best estimates of what would be required for Shor’s algorithm were one billion qubits at a time when the best systems we had in the lab were roughly five qubits.”

Today’s most common error-correction systems often require about 1,000 physical qubits to create a single reliable, logical qubit, the error-corrected unit used to perform calculations. That overhead has helped push estimates for practical fault-tolerant systems into the million-qubit range, slowing progress toward machines capable of running algorithms that could threaten RSA and elliptic-curve cryptography used by Bitcoin and Ethereum.

Bluvstein noted that current lab systems are already approaching—and in some cases exceeding—6,000 physical qubits. In other words, the cryptography risk may be much sooner than experts previously expected.

“You can really see the system size and controllability increasing over time as the required system size goes down,” he said.

In September, Caltech researchers revealed a neutral-atom quantum computer operating 6,100 qubits with 99.98% accuracy and 13-second coherence times. It was a milestone toward error-corrected quantum machines that also renewed concerns about future threats to Bitcoin from Shor’s algorithm.

The threat has prompted governments and technology firms to begin migrating to post-quantum cryptography, or encryption designed to withstand quantum attacks. Researchers, however, caution that major engineering challenges remain, including scaling quantum systems while maintaining extremely low error rates.

“Just having 10,000 physical qubits is something that could happen within a year,” Bluvstein said. “But that's really not the goalpost people think it is. It’s not like when you design a computer, you just put the transistors on the chip, wash your hands, and say you’re done. It’s a highly non-trivial, extremely complicated task to actually go and build one of these.”

Despite this, Bluvstein said a practical quantum computer could emerge before the end of the decade.

The news comes as Google researchers reported new findings on Tuesday, suggesting future quantum computers could break elliptic curve cryptography with fewer resources than previously thought. That added urgency to calls for a transition to post-quantum cryptography before such machines become viable.

Although the cryptocurrency industry has increasingly begun to focus on quantum risk, Bluvstein said that risk extends far beyond blockchain networks and requires changes across much of the modern digital world.

“I think the whole world’s digital infrastructure. It’s not just blockchain. It’s internet of things devices, internet communication, routers, satellites,” he said. “It spans the entire global digital infrastructure, and it’s complicated.”

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

research

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Watch Out B…researchDecrypt AI

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 174 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers