- Quantum Resource Estimates Suggest Encryption Barriers May Fall Faster Than Expected
- Reduced qubit requirements bring theoretical attacks closer to practical reality
- Bitcoin Crypto Fundamentals Face Pressure from Advancing Quantum Algorithm Efficiency
Google researchers have revised expectations about the computational requirements needed to break widely used cryptographic systems that protect cryptocurrencies.
The company’s latest whitepaper claims that a future quantum machine could solve the elliptic curve discrete logarithm problem using far fewer resources than previously assumed.
Previous estimates suggested that millions of qubits would be needed to break encryption schemes like secp256k1, which underpins Bitcoin’s security.
Article continues below.
New Quantum Findings Reduce Cryptocurrency Security Timelines
The new findings indicate that fewer than 500,000 physical qubits could be sufficient, representing a substantial reduction in expected hardware requirements.
The research describes two quantum circuit designs capable of executing Shor’s algorithm, requiring less than 1,500 logical qubits and tens of millions of quantum gate operations.
Under standard assumptions about hardware performance, these calculations could be completed in a matter of minutes on a sufficiently advanced system.
This marks a continuation of incremental improvements in the efficiency of quantum algorithms, rather than a sudden advance in hardware capabilities.
Google states that the intention behind publishing these findings is not to create alarm but to encourage preparedness within the cryptocurrency ecosystem.
“We want to raise awareness about this issue and are providing the cryptocurrency community with recommendations to improve security and stability before this is possible, including the transition from blockchains to post-quantum cryptography,” said Google executives Ryan Babbush and Hartmut Neven.
The company adopted a controlled disclosure strategy, sharing verifiable findings through a zero-knowledge proof mechanism without exposing sensitive implementation details that could allow for misuse.
This approach reflects established practices in cybersecurity, where vulnerabilities are disclosed in a coordinated manner to allow time for mitigation.
However, disclosure in blockchain systems introduces additional complexity, as trust in the network plays a direct role in the value of assets.
The researchers note that exaggerated or poorly substantiated claims could contribute to instability through fear and uncertainty, even in the absence of an immediate technical risk.
Most blockchain systems are currently based on elliptic curve cryptography, which remains secure against classical hacking attacks but is vulnerable in a quantum scenario.
Google points to post-quantum cryptography as a viable avenue and emphasizes that alternative algorithms based on more complex mathematical structures are already being developed.
These methods aim to resist quantum attacks while maintaining compatibility with existing systems.
Despite the availability of possible solutions, implementation in decentralized networks is expected to be gradual.
The researchers emphasize the importance of early planning, including reducing the exposure of vulnerable wallet addresses and considering policies for dormant or abandoned digital assets.
Follow TechRadar on Google News and add us as a preferred source to receive news, reviews and opinions from our experts in your feeds. Be sure to click the Follow button!
And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form and receive regular updates from us on WhatsApp also.




