Challenges in Quantum Computing and Cryptocurrency

Explore top LinkedIn content from expert professionals.

  • View profile for Keith King

    Former White House Lead Communications Engineer, U.S. Dept of State, and Joint Chiefs of Staff in the Pentagon. Veteran U.S. Navy, Top Secret/SCI Security Clearance. Over 16,000+ direct connections & 46,000+ followers.

    46,177 followers

    Researchers at the University of Kent have raised concerns about the vulnerability of Bitcoin and other blockchain technologies to quantum computing. In a yet-to-be-peer-reviewed study, they suggest that a sufficiently advanced quantum computer could crack Bitcoin’s cryptographic security, posing an existential threat to the cryptocurrency ecosystem. The announcement follows Google’s recent unveiling of its 105-qubit ‘Willow’ quantum chip, which demonstrated computational power far beyond classical supercomputers. This breakthrough reignited fears about the potential for quantum computers to bypass Bitcoin’s encryption, which relies on algorithms like SHA-256 and ECDSA (Elliptic Curve Digital Signature Algorithm) for transaction security. Key Findings from the Study: 1. Quantum Threat to Bitcoin: A sufficiently advanced quantum computer could break Bitcoin’s encryption, potentially allowing malicious actors to steal funds or manipulate transactions on the blockchain. 2. Lengthy Update Downtime: Transitioning Bitcoin’s infrastructure to quantum-resistant cryptography could require up to 76 days of downtime, during which the blockchain would be extremely vulnerable. 3. Staggering Financial Losses: The disruption caused by such an attack or even the preparation for a quantum-safe upgrade could result in astronomical financial losses. How Quantum Computers Could Crack Bitcoin • Bitcoin uses public-private key pairs for secure transactions. • A quantum computer with sufficient qubits and error correction capabilities could reverse-engineer private keys from public keys using Shor’s Algorithm. • Once private keys are exposed, attackers could authorize transactions and effectively drain wallets. Potential Solutions: • Post-Quantum Cryptography (PQC): Researchers are actively developing encryption methods resistant to quantum attacks, such as lattice-based cryptography. • Blockchain Hard Fork: Implementing a system-wide upgrade to quantum-resistant algorithms before quantum computers reach the necessary scale. • Hybrid Cryptography: Using a combination of classical and quantum-resistant cryptographic methods during the transition period. The Road Ahead: While quantum computers capable of such feats are not yet operational, the rapid advancements in the field suggest it’s only a matter of time. The Bitcoin community, developers, and stakeholders must act proactively to adopt quantum-resistant encryption standards to safeguard the cryptocurrency’s future. As Carlos Perez-Delgado, co-author of the study, points out: “Even brief downtime or delays in blockchain updates can result in catastrophic consequences in a financial system of this scale.”

  • View profile for Antonis Argyros

    Founder & Ecosystem Architect in Quantum | Building the deployment layer for the quantum era

    10,794 followers

    Vitalik’s points should remove any remaining ambiguity. #Quantum computing isn’t a sci-fi subplot. It’s a direct threat to the cryptography that holds #Bitcoin, #Ethereum, and every major chain together. For years, the industry treated this as a 2050 problem. That luxury is gone. Google’s latest quantum breakthrough. Microsoft’s quantum-enabling chip. IBM pushing toward fault-tolerant systems by 2029. These aren’t academic footnotes. They show a curve that’s steepening, not flattening. If that curve keeps its pace, elliptic curve cryptography becomes breakable within a single cycle. And if that happens, every old signature, every untouched wallet, and every chain that doesn’t migrate fast enough becomes exposed. The fundamentals don’t care about market sentiment. Math either holds or it doesn’t. The crypto industry needs to stop treating quantum as a niche conversation and start treating it like what it is: an existential vulnerability. The work that should already be underway is obvious: • Quantum-safe signature schemes • A migration path for every existing wallet • New standards for contracts • Coordination across ecosystems, not just within them This isn’t FUD. It’s operational reality. Once fault-tolerant quantum machines hit scale, everything we take for granted today becomes fair game. Vitalik is right to push quantum resistance to the center of Ethereum’s roadmap. Every L1, every L2, every wallet provider, every custodian should do the same. Because this time, the threat doesn’t attack the system around crypto. It attacks the math inside it. The industry is late. There’s still time, but not much. The builders who take this seriously now will define which networks survive the coming shift. The next era of blockchain doesn’t start with new tokens or faster throughput. It starts with cryptography that can survive the next computing paradigm.

  • View profile for Jaime Gómez García

    Global Head of Santander Quantum Threat Program | Chair of Europol Quantum Safe Financial Forum | Quantum Security 25 | Quantum Leap Award 2025 | Representative at EU QuIC, AMETIC

    17,461 followers

    💣 Two almost simultaneous relevant papers on #quantum #cryptoanalysis. 👉 "Shor’s algorithm is possible with as few as 10,000 reconfigurable atomic qubits" (https://lnkd.in/eyGiqXQt): This document, supported by trusted names like John Preskill, discusses advances in error-correcting codes and other efficiencies that could be leveraged in neutral atoms quantum computers. They discuss attacks on RSA using as few as 10,000 atomic qubits, although at a great cost in time. Their most time-efficient architectures can enable run times of 10 days for ECC–256 with ≈26,000 qubits, and 97 days for RSA–2048 with ≈102,000 qubits. See the graph below. 👉 "Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations" (https://lnkd.in/e_HsxUcx, https://lnkd.in/eakjd4HU): This paper has been published by Google Research and counts also with trusted authors from Google, Ethereum Foundation, University of California, Berkeley and Stanford University, like Craig Gidney, Justin Drake, or Dan Boneh. The paper is a comprehensive review of #quantum #security in #blockchain that deserves a careful reading. They demonstrate that Shor’s algorithm for breaking 256-bit ECC can execute with either ≤ 1200 logical qubits and ≤ 90M Toffoli gates or ≤ 1450 logical qubits and ≤ 70M Toffoli gates.  On superconducting architectures with 10^−3 physical error rates, it could be executed in minutes using <0.5M physical qubits. They analyze how this can enable different attack scenarios to cryptocurrencies. 👉 This not a sudden breakthrough, but steady, credible progress in quantum cryptoanalysis. 💡What stands out is not just feasibility, but implications. 🚩 Although substantial expertise, experimental development effort, and architectural design are required, quantum systems capable of breaking today’s cryptography are not speculative. This underscores the importance of ongoing efforts to transition widely-deployed cryptographic systems toward post-quantum standards. 🚩 The emergence of CRQCs represents a serious threat to cryptocurrencies. ✏️ The Bitcoin community needs to face urgent and difficult decisions regarding legacy assets, such as the 1.7 million bitcoin locked in P2PK scripts and an even greater amount of assets vulnerable due to address reuse. ✏️ Ethereum is more exposed than Bitcoin due to the prevalence of at-rest vulnerabilities, but its recent active steps towards PQC migration promise a more expedient transition to quantum-safe protocols. This is critical since the tokenization of real-world assets is expected to open up markets projected to exceed 16 trillion USD by 2030, breaking the “too-big-to-fail” economic stability thresholds. ✏️ There is time to migrate public blockchains to PQC, though the margin for error is increasingly narrow.

  • View profile for Julien Bouteloup

    Entrepreneur and investor. Running Stake Capital Group

    12,203 followers

    🚨 Two major new research papers just dropped that dramatically accelerate the quantum threat to crypto. Google Quantum AI optimized Shor’s algorithm down to roughly 1K logical qubits, potentially allowing private keys to be cracked in minutes on advanced superconducting hardware. A follow-up from Oratomic then brought neutral-atom implementations down to just 26K physical qubits with a runtime of around 10 days. This makes Q-Day feel much closer, within just a few years of being reachable. This year at Satoshi Roundtable the mood around quantum computing wasn’t very enthusiastic. We openly discussed how a powerful enough quantum computer could break ECDSA signatures (secp256k1) used across Bitcoin, Ethereum, and most protocols, exposing massive on-chain value including dormant and early-mined coins. The big question was: how do we prepare, and prepare well? Crazy times to be living through. Honestly, teams working in encryption and blockchain should seriously consider stopping everything else and prioritizing this now. It’s time to start integrating quantum-resistant encryption algorithms into modern protocols. No matter if a cryptographically relevant quantum computer arrives in one year or in five, adversaries are likely already collecting encrypted traffic and on-chain data today waiting to decrypt everything the day quantum power crosses that threshold. The shift is real: migrating to post-quantum cryptography is no longer optional. It’s urgent infrastructure work for wallets, bridges, staking, exchanges, and every system holding long-term value. https://lnkd.in/dGUR24xH

  • View profile for Marcos Carrera

    💠 Chief Blockchain Officer | Tech & Impact Advisor | Convergence of AI & Blockchain | New Business Models in Digital Assets & Data Privacy | Token Economy Leader

    32,178 followers

    🚨🤖PhD saturday morning Tokenisation Facing the Quantum Abyss: My Analysis of the HSBC Case I’ve spent 20 years at the intersection of finance and tech, and if I’ve learned one thing, it’s that asset tokenisation (a projected $16 trillion opportunity ) has an Achilles' heel: quantum computing. The current security model ("Store Now, Decrypt Later" ) is a ticking time bomb for long-lived assets like gold or bonds. I just dissected the whitepaper by HSBC and Quantinuum on their "Gold Token". Here is my executive summary and, more importantly, the technical "gaps" every CTO must consider. 🚀 The Win: Pragmatism over Perfection Instead of a costly DLT re-engineering, they implemented a smart hybrid solution: PQC-VPN Overlay: They protected the transport layer (data in motion) with post-quantum cryptography without touching the ledger core. No Performance Impact: Most impressively, they kept latency and throughput (30-40 TPS) intact. Quantum Entropy: They hardened keys using QRNG (quantum generators) to avoid algorithmic predictability. ⚠️ The 3 Critical Gaps (and how to bridge them): Integrity vs. Confidentiality: The Flaw: The pilot secures the tunnel (VPN) and prioritizes confidentiality. However, it does not yet fully address the risk to digital signatures on the ledger itself; if a quantum actor breaks the signature scheme, they could forge transactions. The Solution: "Phase 2" must integrate post-quantum signatures (like ML-DSA/Dilithium) directly at the DLT application level. The Interoperability Risk: The Flaw: Conversion to ERC-20 for interoperability is highlighted. But the moment the asset touches a non-quantum public network (like Ethereum today), it loses its immunity. The Solution: Implement "Quantum Wrapped Tokens" that restrict holding only to wallets with verified PQC security. "Offline" Key Management: The Flaw: The entropy seed transfer was done "offline" (physically). This does not scale and represents a human operational risk. The Solution: Automate seed rotation or, ideally, use Quantum Key Distribution (QKD) to eliminate the human factor. My Verdict: HSBC has taken a vital first step to protect confidentiality today. But true quantum resistance requires protecting not just the "pipe" the data travels through, but the mathematical immutability of the asset itself. Is your organization waiting for NIST, or are you already protecting the transport layer? #FinTech #QuantumComputing #CyberSecurity #AssetTokenization #Blockchain #CISO #HSBC

  • View profile for Marin Ivezic

    CEO Applied Quantum | PostQuantum.com | Former CISO, Big 4 Partner, Quantum Entrepreneur

    33,619 followers

    Today was the most significant day for quantum cryptanalysis in years. Two papers published on the same day – same conclusion. Paper 1: Google Quantum AI showed that breaking the ECC protecting Bitcoin and Ethereum requires fewer than 500,000 superconducting qubits and approximately 9 minutes. A 10x reduction in spacetime volume over prior estimates. Verified by a zero-knowledge proof. My analysis: https://lnkd.in/ep2mHJte Paper 2: A team from Oratomic, Caltech, and UC Berkeley showed that the same algorithm runs on as few as 10,000 neutral atom qubits. Fifty times fewer qubits. But days instead of minutes. My analysis: https://lnkd.in/esrKWs56 The TL;DR: breaking cryptocurrency cryptography now has two credible paths. A fast one (superconducting, 500K qubits, minutes - threatens active transactions) and a small one (neutral atoms, 10K–26K qubits, days - threatens dormant wallets and exposed keys). The two papers are not independent. Oratomic's resource estimates build directly on Google's newly published circuit optimizations. Does this bring Q-Day closer? Honestly, not in an absolute sense. Nobody built a 500,000-qubit superconducting machine or a 26,000-atom neutral atom computer overnight. The hard engineering problems remain hard. But that's not the real story. The real story is that the million-qubit comfort margin is dead. A year ago, the standard mental model was "breaking crypto requires millions of qubits, we have decades." Today, we have four independent papers - Gidney (2025), Pinnacle (2026), Google (2026), and now Oratomic (2026) - showing credible paths ranging from 10,000 to 1,000,000 physical qubits across multiple hardware modalities. The diversity of viable architectures is itself the threat. And ECC falls before RSA on every architecture. Google needs half the qubits for ECC-256 that Gidney needs for RSA-2048. Oratomic needs 10,000 qubits for ECC versus 102,000 for RSA. Two papers. Two architectures. One conclusion: the migration to post-quantum cryptography is not a future planning exercise. It is an operational imperative. #PostQuantumCryptography #QuantumComputing #Bitcoin #Ethereum #Cybersecurity #PQC #PostQuantum #QuantumSecurity

  • BREAKING: Two new papers just dropped that suggest Q-Day is closer than we thought. Is Bitcoin toast? Tl;dr: Two research teams independently showed that breaking the encryption behind Bitcoin, Ethereum, and most of the internet requires far fewer quantum resources than previously estimated — and those resources are approaching engineering reality. Yesterday, Google published a whitepaper with updated estimates for cracking the elliptic curve cryptography (ECC), which secures virtually all major blockchains. Their finding: a superconducting quantum computer with fewer than 500,000 physical qubits could derive a Bitcoin private key in about 9 minutes. A quantum attacker could intercept a transaction in progress, crack the key, and submit a fraudulent replacement before the original is recorded. Today, a team from startup Oratomic and Caltech showed that a neutral atom quantum computer could do the same thing with as few as 10,000 physical qubits — but in days, not minutes. Labs have already demonstrated neutral atom arrays with 6,100+ qubits. Google also published a zero-knowledge proof that their circuits work without revealing the circuits themselves. Think of it as telling the world "we can pick this lock" while refusing to publish the instructions. But cryptocurrency is only part of the story. The same math that secures Bitcoin also secures TLS (every HTTPS website), SSH (remote administration), firmware signing, electronic passports, encrypted messaging, and IoT authentication – among other things. The quantum threat to blockchain is a specific instance of a much, much broader problem. NIST finalized post-quantum cryptography standards in 2024 and migration is underway for some systems. But it's slow, expensive, and for dormant crypto assets, impossible. The time to start moving to post-quantum cryptography...is NOW. Google paper: https://lnkd.in/eUMbf78u Oratomic/Caltech paper: https://lnkd.in/emn7ihf7

  • View profile for Rich Campagna

    SVP Products, Palo Alto Networks

    18,164 followers

    Quantum computing is moving from "science fiction" to "business reality" faster than most predicted. Two recent papers have fundamentally shifted the timeline for when we need to care about Quantum-Safe security: 1️⃣ The "10,000 Qubits" Milestone: New research shows that we can execute Shor’s algorithm—the math that breaks today’s encryption—with far fewer resources than previously thought. By using reconfigurable atomic qubits, the hardware requirements for cracking RSA-2048 have dropped by nearly 20x. 2️⃣ The "9-Minute" Crypto Warning: Google’s latest whitepaper highlights a terrifying reality for digital assets. Under advanced quantum scenarios, the encryption protecting a cryptocurrency wallet could be cracked in under 10 minutes. This puts billions in "dormant" assets at immediate risk of "at-rest" attacks. The Bottom Line: The "Q-Day" window is shrinking. It’s no longer about if a quantum computer can break your encryption, but when your current migration timeline will run out. How do we respond? We can't just flip a switch on "Q-Day." For many organizations, becoming quantum safe is a multi-year journey. This is where Palo Alto Networks Quantum-Safe Security comes in. Instead of a manual, multi-year overhaul, we provide a path to Agentic Resilience: - Continuous Discovery: It automatically maps your "cryptographic bill of materials" (CBOM), identifying exactly where vulnerable RSA and ECC algorithms are hiding in your network. - Risk Prioritization: It correlates your encryption strength with business criticality, telling you exactly which high-value assets need to move to Post-Quantum Cryptography (PQC) first. - Real-Time Remediation: For legacy systems that can’t be easily upgraded, a "Quantum-Safe Proxy" re-encrypts vulnerable traffic into post-quantum algorithms (like ML-KEM) at the network edge. The transition to a quantum-safe future is a marathon, but the starting gun has already fired. Learn how to take your first steps at the link in the comments.

Explore categories