Key Highlights
- Shor’s algorithm requires approximately 3000 to 4000 logical qubits to break Bitcoin’s ECDSA public key.
- IBM’s largest operational quantum processor, Heron, features 133 qubits, significantly below the fault tolerant threshold required.
- Bitcoin addresses whose public keys have been exposed (i.e., used in at least one transaction) are vulnerable to quantum attacks.
- NIST aims to finalize its first set of post quantum cryptographic standards by 2026.
- Academic research suggests a 20% chance of a large scale quantum computer capable of breaking Bitcoin by 2033.
The quantum computing bitcoin threat is a complex challenge, but contrary to sensational headlines, quantum computers cannot break Bitcoin’s encryption today, nor are they likely to do so in the immediate future. Bitcoin’s underlying cryptographic security relies on two primary algorithms: SHA 256 for proof of work and Elliptic Curve Digital Signature Algorithm (ECDSA) for digital signatures. While ECDSA is theoretically vulnerable to Shor’s algorithm, current quantum hardware remains orders of magnitude away from posing a practical threat to the network.
The real concern emerges when considering the long term trajectory of quantum advancements and the potential for a “harvest now, decrypt later” attack against currently exposed public keys. Understanding the specific capabilities needed, the current state of quantum technology, and Bitcoin’s potential defense mechanisms is crucial for a clear assessment.
The Quantum Computing Bitcoin Threat: Understanding ECDSA Vulnerability
Bitcoin’s security hinges on the Elliptic Curve Digital Signature Algorithm, ECDSA, which creates cryptographic proof that only the owner of a private key can spend their coins. When you send Bitcoin, you sign the transaction with your private key, and others can verify this signature using your public key, without ever seeing your private key.
Shor’s algorithm, discovered by Peter Shor in 1994, provides a theoretical method to efficiently factor large numbers, a task intractable for classical computers. This algorithm can be adapted to solve the elliptic curve discrete logarithm problem, which underpins ECDSA. If a sufficiently powerful quantum computer running Shor’s algorithm could derive a private key from a public key, it could steal funds.
One thing to distinguish between two attack scenarios. If a Bitcoin address has never been used, its public key remains unexposed, making it considerably more difficult to crack. However, once a transaction is made from an address, its public key becomes visible on the blockchain. This exposed public key represents the primary vector for a quantum attack using Shor’s algorithm.
How Many Qubits to Break Bitcoin? The Shor’s Algorithm Challenge
Estimates for the number of qubits required to break Bitcoin’s ECDSA vary, but consensus points to thousands of *logical* qubits, not just physical ones. A 2021 study by the University of Sussex, for example, suggested that breaking a 256 bit ECDSA key would require a quantum computer with approximately 317 million physical qubits operating for 10 hours, assuming a 10^3 error rate.
More conservative and often cited estimates, such as those from the Quantum Computing Report, suggest that Shor’s algorithm would need around 3000 to 4000 logical qubits to break a standard 256 bit ECDSA public key. Logical qubits are error corrected and far more stable than the noisy physical qubits available today. The overhead for error correction means that thousands, or even millions, of physical qubits might be needed to form just one stable logical qubit.
Breaking a private key directly, without prior knowledge of the public key, is an even more formidable challenge. This would necessitate Grover’s algorithm to attack the SHA 256 hashing, which requires a much larger number of qubits and significantly longer computation times, making it impractical for the foreseeable future.
Current Quantum Hardware: A Reality Check
Despite rapid advancements, current quantum computers are nowhere near the scale required to threaten Bitcoin. IBM’s most powerful publicly available quantum processor, Heron, released in 2023, features 133 superconducting qubits. While impressive, these are physical qubits with significant error rates and limited coherence times.
Google’s Sycamore processor, which achieved “quantum supremacy” in 2019, used 53 qubits to perform a specific calculation faster than a supercomputer. More recently, Google unveiled its 70 qubit “Willow” chip. These machines demonstrate the potential of quantum computation for specialized tasks, but they lack the fault tolerance and scale needed for cryptographic attacks.
The gap between current capabilities and the requirements for breaking ECDSA is vast. Researchers are still grappling with fundamental challenges in quantum computing, including reducing error rates, increasing coherence times, and developing robust error correction schemes. Building a quantum computer with thousands of stable, fault tolerant logical qubits is a monumental engineering feat that remains years, if not decades, away.
The 2026 Timeline and the “Harvest Now, Decrypt Later” Risk
The year 2026 often surfaces in discussions about quantum threats, largely due to the National Institute of Standards and Technology, NIST, timeline for finalizing its post quantum cryptography, PQC, standards. This indicates a recognition within the cybersecurity community that quantum resistant algorithms are a necessary future development, not that a Bitcoin breaking quantum computer will exist by then.
The primary concern for Bitcoin in the medium term is the “harvest now, decrypt later” attack. This scenario involves an adversary collecting Bitcoin public keys today, storing them, and then waiting for the advent of a sufficiently powerful quantum computer. Once such a machine exists, the attacker could use Shor’s algorithm to derive the private keys from the harvested public keys and steal the associated funds.
This risk applies specifically to Bitcoin addresses whose public keys have already been exposed on the blockchain, typically by being used in a transaction. Approximately 30% of all Bitcoin in circulation resides in addresses whose public keys have been exposed. Funds held in unspent transaction outputs, UTXOs, where the public key has not yet been revealed, would remain secure until the owner attempts to spend them.
Bitcoin’s Defense: Post Quantum Cryptography and Future Upgrades
The Bitcoin community is acutely aware of the long term quantum threat and researchers are actively exploring post quantum cryptography solutions. These are cryptographic algorithms designed to be resistant to attacks by both classical and quantum computers. NIST’s PQC standardization process is evaluating various candidates, including lattice based cryptography, hash based signatures, and code based cryptography.
Implementing quantum resistant algorithms into Bitcoin would likely involve a soft fork, a backward compatible upgrade to the network protocol. This could introduce new address types that use PQC schemes alongside or instead of ECDSA. For example, a new transaction type could require signatures based on a quantum resistant algorithm like CRYSTALS Dilithium, one of the NIST finalists.
Such an upgrade would be a significant undertaking, requiring broad consensus across the Bitcoin ecosystem. However, the decentralized nature of Bitcoin means that if a credible quantum threat emerges, the network has a strong incentive to adapt and implement necessary security enhancements. The transition would likely involve a period where both old and new address types are supported, allowing users to migrate their funds to quantum safe addresses.
The TCB View
TCB believes the immediate quantum computing bitcoin threat is largely overblown, but a cautious long term perspective is essential. While current quantum hardware is insufficient to break Bitcoin’s ECDSA, the “harvest now, decrypt later” scenario for exposed public keys presents a tangible future risk. The primary winners from this ongoing research are the developers of post quantum cryptography and those working on fault tolerant quantum computing, whose progress will shape the timeline for any real threat.
Conversely, Bitcoin holders who fail to migrate funds from addresses with exposed public keys, should a quantum computer emerge, stand to lose. Our read is that Bitcoin’s decentralized nature provides a robust mechanism for adaptation, but proactive development and community consensus on PQC upgrades are vital. Watch for NIST’s finalization of its PQC standards by 2026 and any significant breakthroughs in fault tolerant logical qubit counts, particularly exceeding 1000, as key indicators of accelerating risk.
Get the Daily Briefing
Crypto, AI, and Web3 intelligence. Free, every day.

