Understanding Quantum Threats to Cryptocurrencies and What It Means for Investors

By Patricia Miller

Mar 31, 2026

3 min read

Quantum computing could soon jeopardize Bitcoin and Ethereum, posing risks to wallets and dormant assets, according to recent analyses by Google.

#How do quantum advancements threaten Bitcoin and other cryptocurrencies?

Quantum computing developments could pose significant threats to Bitcoin and other cryptocurrencies, as recent analyses suggest the timeline for potential quantum attacks may be closer than previously thought. Google researchers have highlighted that quantum machines utilizing Shor’s algorithm could crack the 256-bit encryption that secures most blockchain technology, requiring fewer resources than one might expect.

The estimates indicate that a quantum attack could potentially breach Bitcoin’s encryption using 1,200 to 1,450 logical qubits and 70 to 90 million quantum gates, achievable with less than 500,000 physical qubits. This rapid advancement suggests that vulnerabilities could manifest much sooner, raising alarm bells within the cryptocurrency community.

#What risks do Bitcoin wallets face?

A crucial factor contributing to the risks surrounding Bitcoin lies in the type of hardware that scales first in quantum computing. If more efficient systems emerge, they could enable rapid attacks on transactions. In contrast, less efficient systems might initially focus on targeting stored assets. Key vulnerabilities include commonly reused addresses, outdated wallet types, and the exposure of public keys, leading to considerable amounts of Bitcoin remaining susceptible to theft.

Transactions could face interception before confirmation within Bitcoin's approximate ten-minute block timeframe. This undermines the assumption that transaction fees and network speed can provide solid defenses against quantum threats.

#What about dormant holdings?

Beyond active transactions, there is immediate concern regarding dormant Bitcoin holdings. Approximately 1.7 million Bitcoin, valued at tens of billions of dollars, remains locked in outdated wallet formats that are not only primitive but also likely inaccessible due to lost keys. With advancements in quantum computing, these assets could be accessed by anyone with a capable quantum computer, creating a tempting target for future attackers.

#Is Bitcoin mining at risk?

While the cryptographic aspects of Bitcoin may see threats from quantum technology, the mining process itself remains resistant for the time being. Quantum speed increases through Grover’s algorithm are modest, allowing traditional ASIC miners to maintain their efficiency at this stage. However, sudden quantum attacks could alarm the market, potentially devaluing Bitcoin and undermining the incentives for miners, ultimately affecting network security.

#How does the Taproot upgrade impact quantum vulnerability?

The Taproot upgrade aims to enhance Bitcoin's privacy but simultaneously opens up vulnerabilities to quantum attacks. Bitcoin’s funds are managed through various methods including UTXOs and public keys, making them prime candidates for quantum-related exploitation. Especially vulnerable are early and Taproot addresses, with standard addresses retaining limited protection until utilized. The report hints at the introduction of a new script type, P2MR, designed to maximize Taproot functionalities while minimizing quantum risks.

#Is Ethereum more vulnerable than Bitcoin?

Evidence suggests that Ethereum may face more severe quantum risks compared to Bitcoin. The nature of Ethereum’s smart contracts lacks post-quantum cryptographic measures, making them susceptible. Specifically, if a sufficient number of validators using BLS signatures were compromised, systemic risks could arise. Layer 2 networks within Ethereum also utilize quantum-vulnerable commitments, allowing for potential backdoor vulnerabilities.

To mitigate these risks effectively, the entire Ethereum ecosystem would need mass coordination for manual upgrades, expedited key rotations, and a shift to post-quantum cryptography.

#Do other cryptocurrencies share these vulnerabilities?

The vulnerabilities introduced by quantum computing do not stop at Bitcoin and Ethereum. Many other cryptocurrencies, including forks, sidechains, and various tokens, depend on ECDLP-based cryptography, putting both funds and user privacy in jeopardy. Even privacy-focused blockchains face risks, as retroactive attacks could expose past transactions or enable inflationary schemes.

#What is the solution to quantum threats?

Transitioning to post-quantum cryptography is vital for blockchain technology as it continues to integrate tokenized assets and develop new financial infrastructures. Economists predict that the market could swell to over $16 trillion by 2030, making quantum computing security not just a niche concern but a crucial factor for the broader financial sector.

Short-term solutions such as key rotation and protocol updates can diminish immediate vulnerabilities, yet thorough migration to PQC is the only way to ensure enduring protection against quantum threats. Various innovative cryptographic strategies are currently being trialed, focusing on lattice and hash-based systems which aim for stronger defenses. Notably, some projects like QRL and Abelian were developed to be quantum-resistant from inception, while others, including Algorand, Solana, and Ethereum, are pursuing quantum-safe advancements.

Investors are urged to take proactive measures in preparing for quantum threats, embracing PQC practices, addressing vulnerabilities, and sharing knowledge within the community to secure assets and bolster confidence in the cryptocurrency landscape.

Important Notice And Disclaimer

This article does not provide any financial advice and is not a recommendation to deal in any securities or product. Investments may fall in value and an investor may lose some or all of their investment. Past performance is not an indicator of future performance.