
- Quantum resource estimates suggest encryption barriers may fall faster than expected
- Reduced qubit requirements bring theoretical attacks closer to practical reality
- Bitcoin’s cryptographic foundations face pressure from advancing quantum algorithm efficiency
Google researchers have revised expectations around the computational requirements needed to break widely used cryptographic systems protecting cryptocurrencies.
The company’s latest whitepaper claims a future quantum machine could solve the elliptic curve discrete logarithm problem using significantly fewer resources than previously assumed.
Earlier estimates suggested millions of qubits would be required to break encryption schemes such as secp256k1, which underpins Bitcoin security.
Article continues below
New quantum findings reduce crypto security timelines
The new findings indicate fewer than 500,000 physical qubits could be sufficient, representing a substantial reduction in expected hardware requirements.
The research outlines two quantum circuit designs capable of executing Shor’s algorithm, requiring under 1,500 logical qubits and tens of millions of quantum gate operations.
Under standard assumptions about hardware performance, these computations could be completed within minutes on a sufficiently advanced system.
This marks a continuation of incremental improvements in quantum algorithm efficiency, rather than a sudden breakthrough in hardware capabilities.
Google states that the intent behind publishing these findings is not to create alarm but to encourage preparation within the cryptocurrency ecosystem.
“We want to raise awareness on this issue and are providing the cryptocurrency community with recommendations to improve security and stability before this is possible, including transitioning blockchains to post-quantum cryptography,” Google executives, Ryan Babbush and Hartmut Neven said.
The company adopted a controlled disclosure strategy, sharing verifiable findings through a zero-knowledge proof mechanism without exposing sensitive implementation details that could enable misuse.
This approach reflects established practices in cybersecurity, where vulnerabilities are disclosed in a coordinated manner to allow time for mitigation.
However, disclosure in blockchain systems introduces additional complexity, as confidence in the network plays a direct role in asset value.
Researchers note that exaggerated or poorly substantiated claims could contribute to instability through fear and uncertainty, even in the absence of immediate technical risk.
Most blockchain systems currently rely on elliptic curve cryptography, which remains secure against classical computing attacks but is vulnerable in a quantum scenario.
Google points to post-quantum cryptography as a viable pathway, emphasizing that alternative algorithms based on more complex mathematical structures are already under development.
These methods aim to resist quantum attacks while maintaining compatibility with existing systems.
Despite the availability of potential solutions, implementation across decentralized networks is expected to be gradual.
The researchers stress the importance of early planning, including reducing exposure of vulnerable wallet addresses and considering policies for inactive or abandoned digital assets.
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!
And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.
https://cdn.mos.cms.futurecdn.net/Qn87yWq2nVmwuXotPPqbeR-1920-80.jpg
Source link




