TL;DR
Google’s Willow chip proved quantum computers are advancing faster than expected — and that has direct implications for Bitcoin’s cryptographic foundations. With researchers now estimating that fewer than 500,000 physical qubits could break Bitcoin’s ECDSA signatures, the threat window has compressed from “decades away” to potentially 2028–2035. Here’s what every crypto investor needs to understand about quantum computing, which Bitcoin addresses are vulnerable right now, how BIP-360 plans to defend the network, and why waiting to upgrade isn’t a strategy.
The crypto industry has been sleepwalking through a revolution. While traders obsess over ETF flows and meme coin rotations, a quiet arms race in quantum computing has reached an inflection point — one that could fundamentally threaten the cryptographic assumptions underpinning Bitcoin and every major blockchain.
In December 2025, Google unveiled Willow, a 105-qubit superconducting processor that completed a calculation in five minutes that would take the world’s fastest classical supercomputer roughly 1025 years. But the real breakthrough wasn’t speed — it was error correction. For the first time, adding more qubits actually reduced error rates, a feat physicists had chased for nearly 30 years.
By March 2026, a Google whitepaper confirmed what cryptographers had long feared: breaking Bitcoin’s ECDSA signatures requires fewer than 500,000 physical qubits. That sounds like a big number until you realize we were at zero useful qubits a decade ago.
Meanwhile, IBM released its Nighthawk and Loon processors with breakthrough QLDPC error-correcting codes that slash qubit requirements tenfold. Microsoft demonstrated 24 entangled logical qubits with its Majorana 1 topological chip and announced a DARPA-backed roadmap toward a one-million-qubit system.
The question is no longer if quantum computers can break Bitcoin. It’s when.
How Quantum Computers Break Bitcoin’s Cryptography
Bitcoin relies on the Elliptic Curve Digital Signature Algorithm (ECDSA) using the secp256k1 curve. When you send Bitcoin, your private key generates a public key, which gets hashed into your wallet address. The security assumption is simple: deriving a private key from a public key is computationally impossible for classical computers.
Shor’s algorithm — a quantum algorithm discovered in 1994 — changes that equation entirely. A sufficiently powerful quantum computer running Shor’s algorithm can factor large numbers and solve discrete logarithm problems exponentially faster than any classical machine. Applied to ECDSA, it can reverse-engineer a private key from a public key in minutes.
Think of it this way: your Bitcoin private key is like a password that’s easy to create but supposed to be impossible to guess. A quantum computer with Shor’s algorithm doesn’t guess — it calculates the answer directly.
The 2026 Threat Timeline: 2028–2035
Based on current hardware trajectories and expert consensus:
- Aggressive scenario (2028–2030): If quantum hardware scaling maintains its current pace, quantum computers could target exposed legacy P2PK Bitcoin addresses by late 2029. Researchers cracked a 15-bit elliptic curve key on public hardware in April 2026 — a 512x improvement in just seven months.
- Moderate scenario (2032–2035): This is the widely accepted window for breaking full 256-bit ECDSA. The National Institute of Standards and Technology (NIST) finalized post-quantum cryptography standards in 2024 specifically because this timeline is considered credible.
- Conservative scenario (2035+): Assumes significant engineering hurdles slow quantum scaling. Even in this scenario, the cryptographic community treats quantum resistance as an urgent priority — not a theoretical exercise.
The gap between these scenarios has been shrinking. Every breakthrough in error correction compresses the timeline further.
Which Bitcoin Addresses Are Actually Vulnerable
Not all Bitcoin faces equal risk. The vulnerability depends entirely on whether your public key is exposed:
- P2PK (Pay-to-Public-Key): These addresses expose the public key directly. Satoshi’s estimated ~1.1 million BTC in early mining rewards sit in P2PK addresses. These are the most vulnerable — a quantum computer only needs to derive the private key from the exposed public key.
- P2PKH (Pay-to-Public-Key-Hash): Standard addresses that hash the public key. Your public key only becomes visible when you spend from the address. Until then, a quantum attacker would need to break both SHA-256 and RIPEMD-160 hashes — a much harder problem.
- SegWit and Taproot: Similar to P2PKH — the public key is only revealed upon spending. This provides an additional layer of protection, but only if you never reuse addresses.
The critical takeaway: If you’ve ever spent from an address, its public key is exposed on the blockchain forever. A quantum computer could target that address at any point in the future. This is why address reuse is a security risk, not just a privacy concern.
BIP-360: Bitcoin’s Quantum Defense Plan
Bitcoin developers aren’t ignoring the threat. In February 2026, BIP-360 (Pay-to-Merkle-Root) was merged as a draft proposal — the most significant step Bitcoin has taken toward quantum resistance.
BIP-360 introduces “quantum-blind” outputs. Instead of revealing the public key in a transaction, it uses a Merkle tree of one-time signature keys. The public key is never exposed on-chain, making it resistant to Shor’s algorithm even if a powerful quantum computer exists.
The proposal supports multiple post-quantum signature schemes, including lattice-based and hash-based options that NIST has standardized. This flexibility is crucial — it means Bitcoin can adopt the best available quantum-resistant cryptography without another hard fork.
However, BIP-360 is still a draft. It hasn’t been activated, and deployment would require significant wallet and infrastructure upgrades across the entire Bitcoin ecosystem.
Why “Just Upgrade Later” Is Dangerous
The most common rebuttal from Bitcoin maximalists is straightforward: “Bitcoin is software. We’ll upgrade when the threat becomes real.”
This thinking has three critical flaws:
First, the retrofit problem. Adding post-quantum cryptography to a system designed around ECDSA isn’t like updating an app. It requires changes at every layer — wallets, exchanges, hardware signers, multisig setups, Lightning Network channels, and time-locked contracts. The coordination challenge alone could take years.
Second, the “harvest now, decrypt later” attack. Adversaries — nation-states, criminal organizations — can record encrypted traffic and exposed public keys today and store them until quantum computers become available. Your old transactions are already in the quantum crosshairs, even if the weapon doesn’t exist yet.
Third, economic incentives create a race condition. Satoshi’s ~1.1 million BTC in P2PK addresses is a $90+ billion bounty. The moment a quantum computer approaches the capability to crack ECDSA, there will be an enormous economic incentive to be first. This isn’t a gradual transition — it’s a sudden cliff.
Quantum-Resistant Alternatives Already Exist
Several blockchains were built from the ground up with quantum resistance in mind:
- QRL (Quantum Resistant Ledger) has been running since 2018 using XMSS hash-based signatures — NIST-standardized (RFC 8391) and immune to Shor’s algorithm. Its upcoming Project Zond upgrade adds EVM compatibility, bringing quantum resistance to smart contracts and DeFi.
- Algorand enabled post-quantum Falcon signatures in November 2025, retrofitting lattice-based cryptography onto its existing chain.
- IOTA transitioned to post-quantum cryptography with its Rebased upgrade in 2025, using a hybrid SHA-384/Dilithium approach.
The key difference is between native quantum resistance (built in from genesis, like QRL) and retrofitted solutions (added later, like Algorand and IOTA). Retrofitting works — until it doesn’t. Native implementations avoid the architectural compromises that come with bolting new cryptography onto old systems.
Ripple has also unveiled its own quantum-proof roadmap, signaling that the industry is waking up to the challenge. Even Algorand’s post-quantum leadership has drawn endorsements from Google and Coinbase.
Why This Matters
For investors, the quantum threat isn’t about panic — it’s about preparation. Here’s what to consider:
Avoid address reuse. Every time you spend from an address, you expose its public key. Use a fresh address for every transaction. Hardware wallets make this automatic.
Monitor BIP-360 progress. When this proposal activates, you’ll need to move your Bitcoin to new quantum-resistant addresses. The earlier you understand this process, the smoother the transition.
Diversify your exposure. If quantum risk keeps you up at night, consider allocating a small portion of your portfolio to natively quantum-resistant assets. Think of it as insurance — you hope you never need it, but you’re glad it’s there.
Don’t underestimate the timeline compression. The gap between “quantum computers exist in a lab” and “quantum computers break Bitcoin” could be measured in months, not years. Breakthroughs in error correction have consistently outpaced predictions.
The quantum revolution isn’t coming — it’s here. The only question is whether the crypto industry will adapt before it’s forced to.
Learn more: What Is QRL? The Complete Guide to Quantum-Safe Crypto | Top 5 Quantum-Resistant Cryptocurrencies in 2026
Disclaimer: This article is for informational purposes only and does not constitute financial advice. Cryptocurrency investments carry significant risk. Always conduct your own research before making investment decisions. BitcoinsNews.com may hold positions in digital assets mentioned in this article.
fewer than 500k physical qubits to break ECDSA sounds scary until you realize we are at like 1000 usable ones. still a decade away minimum imo
disagree, the exponential curve on qubit scaling means the gap closes fast. 1000 today could be 100k in 3 years
BIP-360 is the critical upgrade here. Bitcoin can migrate to quantum-safe signatures, it just needs the community consensus to push it through