Google Warns of Earlier Quantum Computing Risk to Crypto

Google researchers warn that advances in quantum computing could challenge crypto security sooner than anticipated, urging immediate preparation.


Recent findings from Google Research suggest that the timeline for quantum computers capable of breaking modern cryptographic systems—including those securing Bitcoin and Ethereum—may be shorter than previously believed.

In a March 31 blog post, researchers highlighted significant efficiency gains in quantum algorithms targeting the 256-bit elliptic curve discrete logarithm problem (ECDLP-256)—the mathematical backbone of most blockchain security systems. This cryptographic standard protects wallets and validates transactions across leading networks.

The report indicates that new quantum circuit designs require far fewer resources than earlier estimates, marking a notable leap forward in practical feasibility.

“We estimate that these circuits can be executed on a superconducting qubit CRQC (cryptographically relevant quantum computers) with fewer than 500,000 physical qubits in a few minutes,” Google researchers stated.

This represents roughly a 20-fold reduction in required physical qubits, a critical benchmark in quantum scalability.

For context, the most advanced quantum systems today operate at around 6,100 qubits, underscoring that while the threat is not immediate, the gap is narrowing faster than expected.

From Theory to Real-Time Attack Scenarios

One of the most striking implications of the research is the potential for real-time attacks on blockchain transactions.

The reduced computational requirements could allow future quantum systems to execute attacks within Bitcoin’s 10-minute block time, enabling so-called “on-spend” attacks. These hypothetical exploits would target transactions while they are still pending in the mempool.

In such a scenario, an attacker could derive a private key from a publicly exposed key during a transaction and redirect funds before confirmation.

“This is not merely a distant danger to dormant keys; the potential for early fast-clock CRQCs to launch on-spend attacks within Bitcoin’s 10-minute average block time places active transactions at immediate risk,” the Google’s whitepaper noted.

This shifts the narrative from long-term theoretical risk to a potentially actionable threat model, especially as quantum hardware continues to improve.

Ethereum Faces Structural Vulnerability

While Bitcoin may be exposed during active transactions, Ethereum faces a different and potentially more persistent risk.

According to the research, Ethereum’s account-based model is inherently vulnerable to “at-rest” attacks, which do not depend on timing.

Unlike Bitcoin, where public keys are typically revealed only during transactions, Ethereum accounts expose their public keys permanently after their first use. This creates a standing vulnerability.

Why “At-Rest” Attacks Matter

  • No time constraint for attackers
  • Public keys remain permanently visible
  • Targets can be analyzed indefinitely

This means that a sufficiently advanced quantum computer could eventually derive private keys from any exposed account—without needing to act quickly.

The study estimates that the 1,000 wealthiest exposed Ethereum accounts, holding approximately 20.5 million ETH, could be compromised in under nine days once such capabilities exist.

Researchers described this as a “systemic, unavoidable exposure” that cannot be mitigated through user behavior alone.

Industry Push Toward Post-Quantum Security

In response to these developments, Google is urging blockchain ecosystems to accelerate the transition to post-quantum cryptography (PQC)—a new class of cryptographic algorithms designed to withstand quantum attacks.

“We urge all vulnerable cryptocurrency communities to join the migration to PQC without delay,” the report stated.

The company has been preparing for this transition since 2016, alongside other industry participants including Coinbase and the Ethereum Foundation.

Notably, the Ethereum Foundation released a post-quantum roadmap in February, outlining required changes across multiple layers:

  • Validator signatures
  • Account structures
  • Data storage systems
  • Cryptographic proofs

Vitalik Buterin has also emphasized that adapting these components will be essential to maintaining long-term network security.

2029 Deadline Signals Urgency

The warning comes shortly after Google set a 2029 target date for completing its own migration to post-quantum cryptography.

The timeline reflects growing concern that “quantum frontiers” may arrive sooner than expected, compressing the window for proactive upgrades.

Outside of Google, industry voices are also raising alarms. Crypto entrepreneur Nic Carter recently described elliptic curve cryptography as being on the “brink of obsolescence.”

He noted that Ethereum developers are already working on mitigation strategies, while suggesting that Bitcoin’s approach remains comparatively slower.

Calls for Calm Amid Long-Term Transition

Despite the warnings, some industry leaders are urging a measured response rather than panic.

Changpeng Zhao, widely known as CZ, addressed concerns in a March 31 post, emphasizing that the crypto ecosystem is adaptable.

He argued that transitioning to quantum-resistant algorithms is a solvable engineering challenge, particularly as computing power continues to grow.

“It’s always easier to encrypt than decrypt. More computing power is always good. Crypto will stay, post quantum”, CZ emphasized in the post.

Zhao added that users who self-custody assets would likely need to migrate funds to new quantum-secure wallets, but framed this as a manageable evolution rather than an existential threat.

A Narrowing Window for Action

While practical quantum attacks on cryptocurrencies remain several years away, the pace of advancement is accelerating, and the margin for inaction is shrinking.

The latest research reframes quantum computing from a distant theoretical risk to a credible mid-term challenge—one that requires coordinated action across protocols, developers, and users.

As blockchain networks continue to mature, their ability to adapt to emerging technological threats may ultimately define their resilience in a post-quantum world.

Read More on CryptoPulse.News:

Copy link