Google's study reveals quantum computers can breach Bitcoin and Ethereum's 256-bit cryptography in just 9 minutes with under 500,000 qubits, threatening private keys and dormant wallets worth billions.

Bitcoin and Ethereum Face Quantum Threat: Google Research Raises Crypto Traders’ Alarm

The420.in Staff
4 Min Read

A fresh warning has emerged in the world of digital currency. Recent research by Google suggests that quantum computers can now breach the security of cryptocurrencies like Bitcoin and Ethereum far faster than before. This study has caused concern among crypto traders, as it claims that with a sufficiently powerful quantum computer, a private key could be cracked in just nine minutes.

Quantum Breakthrough Reduces Qubit Requirements

Currently, crypto security relies on 256-bit elliptic curve cryptography, considered a highly robust digital lock. Traditional computers would take millions of years to break it. Previously, experts believed that breaking this would require a quantum computer with millions of qubits, which is not currently feasible.

However, Google’s new study indicates that this task can now be achieved with less than five hundred thousand physical qubits. This development signals a potential security risk and underscores the urgent need to adopt stronger cryptography algorithms.

FCRF Launches Premier CISO Certification Amid Rising Demand for Cybersecurity Leadership

How Bitcoin and Ethereum Keys Work

Bitcoin and Ethereum systems rely on two key components: public key and private key. The public key can be shared openly, while the private key acts as a secret password proving ownership of transactions. Every transaction is signed using the private key, and if it falls into the wrong hands, full control over the funds is compromised.

The research identifies three types of quantum threats. The first, on-spend attack, occurs while a transaction is being processed and targets fund theft. The second, at-rest attack, targets wallets that have been inactive for a long period. The third, on-setup attack, exploits design flaws in the system or protocol.

Shor’s Algorithm and Dormant Wallet Risks

Security of Bitcoin and Ethereum depends on the Elliptic Curve Discrete Logarithm Problem. While the public key is visible, extracting the private key is currently considered nearly impossible. However, quantum computers leveraging Shor’s Algorithm could break this defense. Once the private key is exposed, the attacker gains full control over the wallet, and blockchain transactions cannot be reversed.

The most significant risk lies in dormant wallets with lost private keys. These wallets contain billions of dollars’ worth of Bitcoin, making them easy targets if quantum computing power continues to increase.

Solutions: Post-Quantum Cryptography and Precautions

A long-term solution lies in post-quantum cryptography (PQC). These new algorithms are being developed to prevent quantum computers from accessing private keys. Meanwhile, immediate steps include limiting exposure of public keys, avoiding repeated use of the same key, enhancing transaction-level security, and strengthening wallet protection.

Industry experts view this as a serious but manageable warning. former CEO stated that there’s no need to panic but highlighted it as a signal for the industry to adopt quantum-ready algorithms. Elon Musk took a lighter approach, joking that it might help recover lost wallet passwords in the future.

Following this research, crypto traders and investors are advised to stay vigilant, ensure the security of private keys, and exercise extra caution during transactions. With quantum computing advancing rapidly, security measures and technological preparedness must be prioritized well in advance.

Stay Connected