Quantum Vulnerability Cryptocurrency: Responsible Disclosure Guide

BH

08 Apr 2026 (9 days ago)

25 min read

Share:

Learn how quantum vulnerability cryptocurrency responsible disclosure works — and why Google's 2026 circuit findings cut the physical qubit estimate by ~20×.

Quantum Vulnerability Cryptocurrency: Responsible Disclosure Guide

Introduction

Most cryptocurrency wallets depend on elliptic curve cryptography (ECC) — a mathematical system that generates the key pairs controlling every Bitcoin and Ethereum transaction. ECC's security rests on the elliptic curve discrete logarithm problem (ECDLP): classical computers cannot reverse the key derivation process in any practical timeframe. On 31 March 2026, Google Quantum AI published a whitepaper presenting a more efficient quantum circuit for attacking ECDLP-256 — the 256-bit version used by Bitcoin and Ethereum — reducing the estimated physical qubit requirement by approximately 20 times compared to prior published estimates.

Google released these findings under responsible disclosure — the practice of notifying affected parties before publishing security findings publicly, giving developers time to prepare. The research team coordinated with the Ethereum Foundation, Stanford University, and the broader cryptocurrency community before publication, and validated the circuit's claims using a zero-knowledge proof (ZKP) without exposing full implementation details. No cryptographically relevant quantum computer (CRQC) — a machine capable of executing this attack at operational scale — exists today, but the efficiency milestone has narrowed the planning window the industry must act within.

This article explains how ECC secures cryptocurrency wallets, how Shor's algorithm threatens that security, what Google's circuit findings mean in practical terms, and how NIST's post-quantum cryptography (PQC) standards and active blockchain protocol proposals provide a structured migration path. It also covers the harvest-now-decrypt-later (HNDL) threat model, exposed wallet address risk categories, and the phased migration roadmap that blockchain projects, exchanges, and wallet providers should begin executing now.

Key Takeaways

  • Elliptic curve cryptography (ECC) secures Bitcoin and Ethereum wallet key pairs using the secp256k1 curve, and its security depends on the computational hardness of ECDLP-256.
  • Google's March 2026 whitepaper presents two quantum circuits for ECDLP-256 that require fewer than 500,000 physical qubits — roughly a 20-fold reduction from the previous best estimate of approximately 9 million physical qubits.
  • No CRQC exists today at the scale required to execute this attack; Google's Willow chip (105 physical qubits, December 2024) is a research milestone, not an operational threat.
  • The harvest-now-decrypt-later (HNDL) model means adversaries can collect publicly visible blockchain data now and decrypt it once a CRQC becomes available, making migration urgency greater than QDay alone suggests.
  • NIST finalised three post-quantum cryptography standards in August 2024 — FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA) — providing the primary migration targets for blockchain protocols currently using ECDSA.
  • Neither Bitcoin nor Ethereum has activated a protocol upgrade replacing ECDSA as of April 2026; Bitcoin's BIP-360 and Ethereum's EIP-8141 remain under active community review.

What Is Elliptic Curve Cryptography and Why Do Cryptocurrency Networks Depend on It?

Elliptic curve cryptography (ECC) is a form of public key cryptography built on the mathematics of elliptic curves over finite fields. It secures Bitcoin and Ethereum wallet key pairs by generating a private key — a large random number — and deriving a corresponding public key through elliptic curve point multiplication. The public key then produces a wallet address through a one-way cryptographic hash.

Both Bitcoin and Ethereum use the same elliptic curve, secp256k1, with 256-bit key lengths for all transaction signing operations. The security of this system rests on the elliptic curve discrete logarithm problem (ECDLP): given two points on the curve, it is computationally infeasible to find the integer linking them using classical computers. The algorithm that performs transaction signing using ECC is called the Elliptic Curve Digital Signature Algorithm (ECDSA), and it verifies that a transaction originated from the holder of the private key.

Classical computers cannot solve ECDLP-256 — the specific 256-bit version of the problem — within any practical timeframe. However, a quantum computer running Shor's algorithm could, in theory, reverse the key derivation process and recover a private key from a known public key. This would allow an attacker to forge transaction signatures and drain funds from any wallet whose public key is visible on the blockchain.

How Does Shor's Algorithm Threaten Elliptic Curve Cryptography in Blockchain Systems?

The Mechanics of Shor's Algorithm Against ECDLP

Peter Shor introduced his quantum algorithm in 1994 to solve integer factorization and discrete logarithm problems exponentially faster than any known classical method. Subsequent research confirmed that Shor's algorithm generalizes to elliptic curve groups, meaning it can solve ECDLP directly. On a classical computer, reversing the key derivation in Bitcoin's secp256k1 curve is computationally infeasible — but a fault-tolerant quantum computer running Shor's algorithm could recover a private key from its public key in polynomial time.

Executing Shor's algorithm against ECDLP-256 requires a fault-tolerant quantum computer with a large number of stable logical qubits — qubits that have been error-corrected to behave reliably, as opposed to raw physical qubits that are prone to noise. Research estimates place the logical qubit requirement for attacking 256-bit elliptic curves at approximately 2,330 logical qubits and around 129 billion quantum gates. No quantum system available today operates at this scale.

Where Current Hardware Stands

A cryptographically relevant quantum computer (CRQC) is defined by NIST as a quantum computer capable of attacking cryptographic systems that would be considered secure against a classical computer. A CRQC must combine sufficient logical qubit counts, high gate fidelity, and deep fault-tolerant circuit execution — requirements far beyond today's hardware.

Google's Willow chip, announced in December 2024, features 105 physical qubits and demonstrated important progress in quantum error correction below the fault-tolerance threshold. However, 105 physical qubits represents a tiny fraction of the millions of physical qubits that error correction overhead would require to support the ~2,330 logical qubits needed for ECDLP-256. Willow is a significant research milestone, but it does not approach CRQC scale.

How Does Google's ECDLP-256 Quantum Circuit Reduce the Physical Qubit Requirement?

On 31 March 2026, Google Quantum AI published a whitepaper titled Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations, co-authored with Justin Drake of the Ethereum Foundation and Dan Boneh of Stanford University. The paper presents two optimized quantum circuits that implement Shor's algorithm against ECDLP-256 on the secp256k1 curve used by Bitcoin and Ethereum. The core finding is a roughly 20-fold reduction in the estimated number of physical qubits needed to execute the attack, compared to prior published estimates.

To understand this reduction, it helps to distinguish between two types of qubits. Physical qubits are the raw hardware units; they are noise-prone and require hundreds of physical qubits to produce one reliable, error-corrected logical qubit. A logical qubit is an error-corrected unit that behaves predictably enough to run complex algorithms like Shor's. Google's circuits are described in terms of logical qubits and Toffoli gates — expensive elementary quantum operations that dominate the time cost of fault-tolerant computation.

Low-qubit variant

Logical Qubits: ≤1,200

Toffoli Gates: ≤90 million

Physical Qubits (est.): <500,000

Estimated Runtime: ~9–12 minutes

Low-gate variant

Logical Qubits: ≤1,450

Toffoli Gates: ≤70 million

Physical Qubits (est.): <500,000

Estimated Runtime: ~9–12 minutes

Prior best estimate (Litinski, 2023)

Logical Qubits: ~2,330

Toffoli Gates: ~129 billion

Physical Qubits (est.): ~9 million

Estimated Runtime: Days–weeks

 

Data current as of April 2026.

The physical qubit estimate of fewer than 500,000 assumes a superconducting architecture using surface code error correction, with planar degree-four qubit connectivity, a physical error rate of 10⁻³, and a one-microsecond code cycle time. Google explicitly states that no such machine exists today and that current hardware remains far from this scale. The reduction is a research milestone in circuit compilation efficiency, not evidence that an operational attack is imminent.

What Is Responsible Disclosure and How Does It Apply to Quantum Vulnerabilities in Crypto?

Responsible disclosure — also called coordinated vulnerability disclosure (CVD) — is the security practice of notifying affected parties privately before releasing vulnerability findings to the public. This gives developers, vendors, and standards bodies time to prepare patches or migration plans before adversaries can act on the information. ISO/IEC 29147:2018, the international standard governing this process, formalises the coordination steps and communication responsibilities between researchers and vendors.

Google applied this model when releasing the ECDLP-256 quantum circuit findings in March 2026. The research team collaborated with Justin Drake of the Ethereum Foundation and Dan Boneh of Stanford University, and coordinated with the broader cryptocurrency community before public release. Google also noted that it works with Coinbase, the Stanford Blockchain Research Center, and the Ethereum Foundation to advance post-quantum blockchain security measures. The goal was to raise awareness and provide actionable recommendations without creating panic or handing adversaries a ready-to-use attack blueprint.

Google's disclosure approach follows the model established by institutions such as CERT/CC at Carnegie Mellon University and Google's own Project Zero, both of which apply responsible disclosure with defined embargo periods. Publishing the circuit's existence and resource estimates — without releasing the full circuit implementation — gave the crypto industry advance notice of an updated threat timeline. Google explicitly described the disclosure as designed to "reduce the FUD potential" of the discussion by clarifying which blockchain components are immune to quantum attacks.

How Does Zero-Knowledge Proof Enable Safe Disclosure of Quantum Circuit Findings?

A zero-knowledge proof (ZKP) is a cryptographic protocol in which one party — the prover — demonstrates that a statement is true without revealing the underlying data that proves it. In the context of Google's March 2026 disclosure, the research team published a ZKP alongside the whitepaper to substantiate their quantum circuit resource estimates. This allowed independent third parties to verify that the circuit correctly solves ECDLP-256 without Google exposing the full circuit implementation to potential adversaries.

The significance of this approach extends beyond the Google disclosure. Publishing complete quantum circuit details prematurely could accelerate hostile timelines, giving well-resourced attackers an implementation head-start before the cryptocurrency industry completes its migration to post-quantum cryptography (PQC — cryptographic algorithms designed to resist attacks from both classical and quantum computers). ZKPs provide a mechanism to prove capability without enabling exploitation, making them a key tool in responsible disclosure for cryptographic vulnerabilities.

What Are the Different Types of Quantum Attacks That Threaten Cryptocurrency Protocols?

Not all quantum threats to cryptocurrency carry the same urgency. Researchers distinguish two primary attack categories based on which cryptographic component is targeted and which quantum algorithm does the work. Understanding this distinction helps developers and policymakers prioritise which parts of a blockchain protocol need migration most urgently.

The first and most critical category is public-key attacks using Shor's algorithm against ECDSA. A quantum computer running Shor's algorithm could derive a private key from an exposed public key, allowing an attacker to forge transaction signatures and steal funds. The second category targets hash functions — such as Bitcoin's SHA-256 — using Grover's algorithm, which provides a quadratic speedup in brute-force search rather than an exponential one. Grover's algorithm effectively halves the bit-security of a hash function, reducing SHA-256 from 256-bit to 128-bit classical equivalence, which security researchers and NIST still consider sufficient at current and projected qubit scales.

Private key recovery

Algorithm: Shor's

Target Component: ECDSA / ECC key pairs

Affected Protocols: Bitcoin, Ethereum, most altcoins

Threat Level:Critical

Mitigation: Migrate to NIST FIPS 204 (ML-DSA)

Signature forgery

Algorithm: Shor's

Target Component: In-flight transaction signatures

Affected Protocols: Bitcoin, Ethereum

Threat Level:Critical

Mitigation: PQC signature schemes

PoW mining acceleration

Algorithm: Grover's

Target Component: SHA-256 proof-of-work

Affected Protocols: Bitcoin, Bitcoin Cash

Threat Level:Low

Mitigation: Adjust difficulty algorithm

Hash preimage search

Algorithm: Grover's

Target Component: SHA-256 block headers, Merkle trees

Affected Protocols: All SHA-256 chains

Threat Level:Low–Medium

Mitigation: Double key/hash lengths

 

Data current as of April 2026.

Proof-of-work (PoW) mining in Bitcoin requires finding a SHA-256 hash below a target value. A quantum miner using Grover's algorithm could search the solution space quadratically faster, theoretically gaining a temporary competitive advantage. However, Bitcoin's difficulty adjustment mechanism recalibrates every 2,016 blocks, meaning the network would adapt to any hashrate shift regardless of its source. The PoW quantum threat is therefore manageable through protocol-level mechanisms, unlike the ECDSA vulnerability, which requires a deeper cryptographic migration.

How Does the Harvest-Now-Decrypt-Later Attack Model Threaten Historical Crypto Transactions?

The harvest-now-decrypt-later (HNDL) attack is a threat model in which an adversary collects blockchain data today and stores it for decryption once a cryptographically relevant quantum computer (CRQC) becomes available. In September 2025, the Federal Reserve Board and the Federal Reserve Bank of Chicago published a paper identifying HNDL as an active, ongoing threat to Bitcoin — not a future risk. The paper notes that adversaries can harvest publicly visible data from the Bitcoin ledger right now, at zero marginal cost, because the blockchain is permanently public.

Bitcoin wallet addresses that have sent at least one transaction expose their full public key on-chain, creating a recoverable surface for a future CRQC running Shor's algorithm. The Federal Reserve analysis identifies legacy address formats — specifically P2PK (pay-to-public-key) outputs used in early Bitcoin — as especially exposed, because they place the public key directly in the transaction output rather than behind a hash. The HNDL model means the effective migration deadline is not QDay itself, but the moment adversaries begin harvesting — which, on a public blockchain, has already begun.

What Risks Do Exposed Cryptocurrency Wallet Addresses Face Under a Quantum Attack Scenario?

Every Bitcoin wallet that has sent at least one outgoing transaction has revealed its public key on the blockchain. A cryptographically relevant quantum computer (CRQC) running Shor's algorithm could use that visible public key to reconstruct the corresponding private key, granting full control of the wallet's funds without the owner's knowledge. Google's March 2026 whitepaper identifies approximately 6.9 million BTC — across all vulnerable script types and address reuse cases — as potentially exposed to this class of attack.

The most exposed category is the P2PK (pay-to-public-key) address format used in Bitcoin's earliest transactions, which stores the full public key directly in the transaction output rather than behind a hash. Researchers estimate that approximately 1.7 million BTC remain locked in P2PK scripts from the 2009–2010 mining era, including coins widely attributed to Bitcoin's pseudonymous creator Satoshi Nakamoto. These addresses present a unique policy challenge: their owners cannot migrate to quantum-safe formats because the private keys are lost, inaccessible, or permanently dormant.

The following scenarios illustrate the primary risk vectors for wallet holders under a future quantum attack:

  • Storage attack on P2PK and reused addresses: A CRQC derives a private key from a public key stored permanently on-chain and drains funds without any transaction from the owner.
  • Transit attack on active wallets: When a user broadcasts a transaction, the public key becomes visible in the mempool for the ~10-minute Bitcoin block confirmation window, creating a narrow but real attack surface for a fast CRQC.
  • Dormant coin seizure: Quantum-recovered private keys to long-dormant wallets — including potentially Satoshi Nakamoto's estimated 1 million BTC — could flood the market, with severe consequences for Bitcoin's price and perceived security.
  • Exchange and custodial exposure: Institutional wallets that reuse addresses or expose public keys through on-chain activity face the same storage attack risk as individual holders.

QDay is the term researchers use for the projected date when a CRQC first becomes capable of breaking 256-bit ECC in operationally useful time. Current consensus estimates place QDay somewhere between 2030 and 2050, with Google's internal roadmap targeting useful fault-tolerant quantum computation by 2029. Project Eleven, a security group focused on quantum risk to digital assets, estimates roughly 7 million BTC — worth approximately $470 billion as of March 2026 — may be vulnerable under a broad exposure definition. The wide QDay range reflects deep uncertainty in hardware scaling timelines, but Google's March 2026 circuit efficiency findings have shifted expert opinion toward the earlier end of that window.

What NIST Post-Quantum Cryptography Standards Apply to Blockchain Security and Wallet Protection?

In August 2024, the U.S. National Institute of Standards and Technology (NIST) finalised the first three post-quantum cryptography (PQC) standards, concluding an eight-year standardisation process. The three standards — FIPS 203, FIPS 204, and FIPS 205 — specify algorithms designed to resist attacks from both classical and quantum computers, replacing cryptographic primitives built on integer factorisation and elliptic curve mathematics. These standards represent the primary migration targets for any blockchain protocol currently using ECDSA for transaction signing.

FIPS 203 specifies ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism), derived from the Kyber algorithm, and covers secure key exchange rather than digital signatures. FIPS 204 specifies ML-DSA (Module-Lattice-Based Digital Signature Algorithm), derived from CRYSTALS-Dilithium, and is designated by NIST as the primary standard for protecting digital signatures — the function ECDSA currently performs in Bitcoin and Ethereum transaction signing. FIPS 205 specifies SLH-DSA (Stateless Hash-Based Digital Signature Algorithm), derived from SPHINCS+, and serves as a conservative backup for digital signatures in case lattice-based assumptions are later challenged.

 

FIPS 203

Algorithm Name: ML-KEM (Kyber-768)

Type: Key encapsulation

Quantum Security Level: Level 3 (~AES-192)

Public Key Size: 1,184 bytes

Signature Size: N/A

Blockchain Applicability: Secure channel / key exchange

FIPS 204

Algorithm Name: ML-DSA-65 (Dilithium)

Type: Digital signature

Quantum Security Level: Level 3 (~AES-192)

Public Key Size: 1,952 bytes

Signature Size: 3,309 bytes

Blockchain Applicability: Transaction signing (ECDSA replacement)

FIPS 205

Algorithm Name: SLH-DSA (SPHINCS+)

Type: Digital signature

Quantum Security Level: Level 3 (~AES-192)

Public Key Size: 32 bytes

Signature Size: 17,088 bytes

Blockchain Applicability: Backup signature scheme

 

Data current as of April 2026.

Lattice-based cryptography — the mathematical foundation of ML-KEM and ML-DSA — builds security on the difficulty of finding the shortest vector in a high-dimensional geometric grid, a problem that neither classical nor known quantum algorithms can solve efficiently. For blockchain engineers, the practical trade-off is clear: ML-DSA produces signatures roughly 50 times larger than ECDSA's 64-byte signatures, which increases per-transaction data volume and on-chain storage costs. Protocol designers must weigh this overhead against the security gain when planning migration timelines.

How Do Lattice-Based and Hash-Based Algorithms Differ in Quantum Resistance Properties?

Lattice-based algorithms (ML-KEM, ML-DSA) and hash-based algorithms (SLH-DSA) derive their quantum resistance from entirely different mathematical foundations. Lattice-based schemes offer compact public keys and faster signing speeds, making them the more practical choice for high-throughput blockchain environments that process thousands of transactions per second. Their security, however, rests on relatively new hardness assumptions — specifically the Module Learning With Errors (MLWE) problem — which have not accumulated the decades of cryptanalytic scrutiny that hash functions have.

Hash-based SLH-DSA derives its security solely from the collision resistance of well-established hash functions such as SHA-256 and SHAKE-256, representing a deeply conservative cryptographic choice. The trade-off is signature size: SLH-DSA signatures at security level 3 reach 17,088 bytes, compared to ML-DSA-65's 3,309 bytes — a difference that translates directly into higher on-chain storage and bandwidth costs for any blockchain that adopts it. For this reason, NIST positions SLH-DSA as a backup standard, while recommending ML-DSA as the primary path for systems — including blockchains — that need to replace ECDSA digital signatures.

What Steps Are Bitcoin and Ethereum Projects Taking to Address Quantum Vulnerability?

Bitcoin holds a market capitalisation of approximately $1.33 trillion as of March 2026, and Ethereum holds approximately $248 billion — making their combined cryptographic infrastructure among the highest-value targets in the event of a CRQC attack. Both ecosystems have begun formal protocol-level discussions on quantum-resistant migration, though neither has finalised or activated a hard fork as of April 2026. Each project faces a shared challenge: replacing ECDSA signatures across millions of active wallets without breaking backward compatibility or triggering network splits.

Bitcoin: BIP-360 and the P2MR Proposal

Bitcoin's primary quantum-resistance proposal is BIP-360, a draft Bitcoin Improvement Proposal (BIP) — the formal process Bitcoin developers use to propose protocol changes. Originally drafted in 2024 as P2QRH (Pay to Quantum Resistant Hash), it was updated in February 2026 to introduce P2MR (Pay-to-Merkle-Root), a new output type that removes Taproot's key-path spend entirely and commits directly to the Merkle root of a Tapscript tree. Developers describe P2MR as a conservative first step: it closes the public-key exposure in modern Taproot addresses without requiring a sweeping cryptographic overhaul of the entire protocol.

BIP-360 remains under community review and has not been merged into Bitcoin Core or activated on the network. A separate developer discussion thread, circulated in December 2024, proposed introducing SPHINCS+ and Dilithium signature algorithms alongside new Bech32-based address formats through a soft fork, preserving backward compatibility with existing wallets. Additionally, a July 2025 draft proposal floated the more contentious idea of freezing coins in legacy quantum-vulnerable address formats — a measure that would affect dormant wallets including those attributed to Satoshi Nakamoto.

Ethereum: EIP-8141 and Vitalik Buterin's Quantum Roadmap

In February 2026, Ethereum co-founder Vitalik Buterin published a structured quantum-resistance roadmap identifying four vulnerable areas in the Ethereum protocol: externally owned account (EOA) ECDSA signatures, BLS consensus layer signatures, KZG polynomial commitments used in data availability, and elliptic curve-based zero-knowledge proof systems. His proposed migration path centres on native account abstraction through EIP-8141, a proposed Ethereum Improvement Proposal (EIP) — Ethereum's equivalent of a BIP — that would separate account identity from signature method, allowing wallets to adopt post-quantum signature schemes without changing their addresses.

EIP-8141 is scheduled for discussion under the Hegota upgrade cycle, planned for the second half of 2026. Current ECDSA signature verification on Ethereum costs approximately 3,000 gas units; quantum-resistant alternatives such as hash-based signatures may require approximately 200,000 gas, significantly increasing transaction costs until mathematical optimisations bring this down. No Ethereum protocol upgrade has activated PQC signature support as of April 2026, and both ecosystems treat this as a medium-term planning horizon, contingent on CRQC development milestones.

How Should Blockchain Projects Plan a Responsible Migration to Post-Quantum Cryptography?

A responsible migration to post-quantum cryptography (PQC) requires structured planning across three phases: inventory, implementation, and full deprecation. NIST's final PQC migration guidelines, published in December 2025, require the most sensitive cryptographic applications to begin migration implementation by 2027, and set a target of full deprecation of RSA and ECC algorithms across all systems by 2035. Google's Quantum AI roadmap sets a 2029 target for fault-tolerant quantum computation, creating an upper bound for the window in which blockchain protocols can complete their migration safely.

Crypto-agility is the foundational design principle that makes phased migration possible. Crypto-agility means building systems so that cryptographic algorithms can be swapped without redesigning the entire protocol — similar to replacing an engine component without rebuilding the chassis. Blockchain protocols that lack crypto-agility — where signature schemes are hardcoded into consensus rules — face the most disruptive migration paths, because any change requires a coordinated hard or soft fork across thousands of independent nodes. Google's March 2026 whitepaper explicitly recommends that blockchain projects build crypto-agility into future protocol upgrades now, before hardware constraints force emergency action.

Phase 1: Inventory

Time Frame: Now – 2027

Required Actions: Audit all ECC dependencies; identify exposed address types; adopt FIPS 203/204/205 in new systems

Responsible Parties: Core developers, security teams, exchanges

Key Milestone: NIST FIPS 203/204/205 adoption begins

Phase 2: Hybrid implementation

Time Frame: 2027 – 2029

Required Actions: Deploy hybrid cryptography (classical + PQC signatures in parallel); upgrade wallet software; activate PQC-compatible address formats

Responsible Parties: Protocol teams, wallet providers, custodians

Key Milestone: BIP-360 / EIP-8141 activation on mainnet

Phase 3: Full migration

Time Frame: 2029 – 2035

Required Actions: Deprecate ECDSA; complete wallet migration; monitor CRQC development; deactivate legacy address formats

Responsible Parties: All network participants

Key Milestone: Full ECDSA deprecation; NIST 2035 ECC sunset

 

Data current as of April 2026.

Hybrid cryptography — running a classical algorithm such as ECDSA in parallel with a PQC algorithm such as ML-DSA on every transaction — is the recommended bridge strategy for Phase 2. If a quantum attack invalidates the classical signature, the PQC signature remains valid, and vice versa, ensuring no single algorithm failure can compromise the system. This approach maintains backward compatibility with legacy nodes while quantum-ready nodes verify both signatures, allowing a gradual network transition without a hard cutover.

The blockchain ecosystem also faces an infrastructure layer beyond the protocol itself. Exchanges, custodians, and hardware wallet manufacturers all maintain independent cryptographic stacks that must migrate to NIST FIPS 203/204/205 on their own timelines. Google's March 2026 whitepaper recommends that exchanges prioritise migrating cold storage wallets and reused hot wallet addresses first, as these carry the highest HNDL exposure under the harvest-now-decrypt-later model described in Section 8. The migration window is measurable — but its length depends on hardware progress, and progress is accelerating.

Summary

Elliptic curve cryptography secures the vast majority of cryptocurrency wallets today through the ECDSA signing algorithm, which depends on the computational hardness of ECDLP-256. Shor's algorithm, running on a fault-tolerant quantum computer, could solve ECDLP-256 exponentially faster than any classical method, recovering a private key from an exposed public key and enabling theft of funds. Google's 31 March 2026 whitepaper documents a new, more efficient compilation of this quantum attack, reducing the estimated physical qubit requirement from approximately 9 million to fewer than 500,000 — while confirming that no machine at this scale exists today. Responsible disclosure, guided by ISO/IEC 29147:2018 and reinforced by a zero-knowledge proof, ensured that the crypto community received advance notice without receiving a ready-to-use attack blueprint.

Approximately 6.9 million BTC sit in wallet addresses where the public key is already visible on-chain as of March 2026, making them vulnerable to the harvest-now-decrypt-later (HNDL) attack model regardless of when a CRQC arrives. NIST's August 2024 standards — FIPS 203, FIPS 204, and FIPS 205 — provide the primary cryptographic tools for migration, with FIPS 204 (ML-DSA / Dilithium) designated as the principal replacement for ECDSA in transaction signing. Bitcoin's BIP-360 and Ethereum's EIP-8141 represent the two most active protocol-level responses, though neither has been finalised as of April 2026. NIST's migration guidelines require the most sensitive cryptographic applications to begin PQC implementation by 2027 and target full deprecation of ECC-based algorithms by 2035.

Conclusion

Google's March 2026 circuit efficiency findings confirm that the distance between today's quantum hardware and a deployable CRQC remains large — but it is measurably smaller than prior estimates indicated. The gap between fewer than 500,000 physical qubits needed and the ~105 physical qubits in Google's Willow chip represents years of engineering progress, but the trajectory is consistent and accelerating. The crypto industry now has a verified threat model, a set of standardised migration algorithms in NIST FIPS 203, 204, and 205, and active protocol proposals in BIP-360 and EIP-8141.

Readers of this article can now identify the specific cryptographic components most at risk (ECDSA key pairs and P2PK address formats), distinguish between quantum attack types and their severity levels, and explain why HNDL makes the migration deadline earlier than QDay itself. The window to act is open; the outcome depends on how quickly blockchain protocols, exchanges, and wallet providers implement crypto-agile designs and adopt post-quantum cryptography.

Why You Might Be Interested?

Anyone holding cryptocurrency in a wallet that has ever sent a transaction, anyone building or auditing blockchain infrastructure, and anyone tracking cryptographic risk in digital asset portfolios will find this article directly relevant — because the exposed public keys, the HNDL threat model, and the NIST migration standards described here affect the security of assets held today, not only in a post-CRQC future.

- Google's March 2026 whitepaper reduces the quantum threat timeline for cryptocurrency, but NIST PQC standards and responsible disclosure give the industry a structured migration window.

Quick Stats

  • Physical qubit reduction: Google's new ECDLP-256 circuits require fewer than 500,000 physical qubits, down from ~9 million in the prior best estimate — a ~20× reduction (March 2026).
  • Google circuit specifications: Low-qubit variant — ~1,200 logical qubits, ~90 million Toffoli gates; low-gate variant — ~1,450 logical qubits, ~70 million Toffoli gates (31 March 2026).
  • BTC in quantum-vulnerable addresses: approximately 6.9 million BTC across all exposed address types (as of March 2026).
  • Bitcoin market capitalisation: approximately $1.33 trillion (as of March 2026).
  • Ethereum market capitalisation: approximately $248 billion (as of March 2026).
  • NIST PQC standards finalised: FIPS 203, FIPS 204, and FIPS 205 approved on 13 August 2024, concluding an eight-year standardisation process.
  • NIST ECC deprecation deadline: full deprecation of RSA and ECC algorithms across all systems targeted by 2035, per NIST migration guidelines (December 2025).
  • QDay consensus range: 2030–2050, with Google's internal roadmap targeting fault-tolerant quantum computation by 2029.

Data current as of April 2026.

FAQ

?Can quantum computers break Bitcoin today?

No quantum computer available today can break Bitcoin's ECC. Google's Willow chip, released in December 2024, operates at 105 physical qubits — a small fraction of the fewer than 500,000 physical qubits that Google's own 2026 whitepaper estimates would be needed for the attack. The threat is credible on a long planning horizon, but no operational CRQC exists at the required scale.

?What makes some Bitcoin addresses more vulnerable than others?

Bitcoin addresses in the legacy P2PK (pay-to-public-key) format store the full public key directly in the transaction output, making it permanently readable and recoverable by a future CRQC. Addresses that have sent at least one outgoing transaction also expose their public key on-chain. Addresses that have only received funds — and have never broadcast a transaction — keep the public key behind a cryptographic hash and are not directly exposed to the storage attack model.

?What is the difference between a logical qubit and a physical qubit?

A physical qubit is a raw hardware unit prone to noise and errors. Hundreds of physical qubits are required under surface code error correction to produce one stable, error-corrected logical qubit reliable enough to run algorithms like Shor's. Google's two ECDLP-256 circuits require 1,200–1,450 logical qubits, which translates to hundreds of thousands of physical qubits — far beyond current hardware.

?Why does HNDL matter if no CRQC exists yet?

The harvest-now-decrypt-later (HNDL) attack model does not require a CRQC today. Adversaries can collect publicly visible blockchain data — including exposed public keys in P2PK outputs and reused addresses — right now at zero marginal cost, because the Bitcoin ledger is permanently public. The Federal Reserve paper from September 2025 identifies HNDL as an active, ongoing threat rather than a future risk. The effective migration deadline is not QDay but the present.

?Which NIST standard replaces ECDSA for transaction signing?

FIPS 204 (ML-DSA, derived from CRYSTALS-Dilithium) is NIST's primary standard for digital signatures — the function ECDSA currently performs in Bitcoin and Ethereum transaction signing. ML-DSA produces signatures of approximately 3,309 bytes at security level 3, compared to ECDSA's 64 bytes, which increases per-transaction data volume on-chain. FIPS 205 (SLH-DSA) serves as a conservative hash-based backup but generates signatures of approximately 17,088 bytes, making it less suitable for high-throughput blockchains.

?What is crypto-agility and why does it matter for blockchains?

Crypto-agility is the design principle of building systems so that cryptographic algorithms can be swapped without redesigning the entire protocol. Blockchain protocols where signature schemes are hardcoded into consensus rules face the most disruptive migration paths, because any change requires a coordinated hard or soft fork across thousands of independent nodes. Google's March 2026 whitepaper explicitly recommends that blockchain projects build crypto-agility into future protocol upgrades now, before hardware constraints force emergency action.

?What is the current status of Bitcoin and Ethereum quantum-resistance proposals?

Bitcoin's BIP-360, updated in February 2026 to introduce the P2MR (Pay-to-Merkle-Root) output type, removes public key exposure in Taproot addresses but has not been merged into Bitcoin Core or activated on the network as of April 2026. Ethereum co-founder Vitalik Buterin published a structured quantum-resistance roadmap in February 2026, and EIP-8141 — which enables wallets to adopt post-quantum signature schemes through native account abstraction — is scheduled for discussion under the Hegota upgrade cycle planned for the second half of 2026.

References / Sources

Primary Research & Technical Papers
  • Core technical sources for the article's central findings on quantum circuit efficiency and ECDLP-256 attack resource estimates.
  • Google Quantum AI: Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations (quantumai.google, Mar 2026)
  • Google Research Blog: Safeguarding Cryptocurrency by Disclosing Quantum Vulnerabilities Responsibly (research.google, Mar 2026)
  • The Quantum Insider: Q-Day Just Got Closer — Three Papers in Three Months Are Rewriting the Quantum Threat Timeline (thequantuminsider.com, Mar 2026)
  • Security Week: Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption (securityweek.com, Mar 2026)
Regulatory Standards & Government Sources
  • Official government and standards-body publications establishing post-quantum cryptography requirements, migration timelines, and vulnerability disclosure frameworks.
  • NIST CSRC: Post-Quantum Cryptography FIPS 203, 204, and 205 Approved (csrc.nist.gov, Aug 2024)
  • Federal Reserve Board / Federal Reserve Bank of Chicago: "Harvest Now Decrypt Later" — Examining Post-Quantum Cryptography and the Data Privacy Risk to Bitcoin (federalreserve.gov, Sep 2025)
  • ISO: ISO/IEC 29147:2018 — Information Technology: Vulnerability Disclosure Processes (iso.org, 2018)
  • NIST: Final Post-Quantum Cryptography Migration Guidelines (csrc.nist.gov, Dec 2025)
Blockchain Protocol Proposals & Ecosystem Responses
  • Active Bitcoin and Ethereum improvement proposals addressing quantum-resistant address formats, signature schemes, and migration planning.
  • Bitcoin Core: BIP-360 — Pay to Quantum Resistant Hash / P2MR (github.com/bitcoin/bips, Feb 2026)
  • Vitalik Buterin / Ethereum Foundation: Ethereum Quantum Resistance Roadmap (ethereum.org, Feb 2026)
  • CryptoRank: EIP-8141 — Critical Decision Looms for Hegota Upgrade Security (cryptorank.io, Mar 2026)
  • Bitcoin Optech: Quantum Resistance Topic Overview (bitcoinops.org, Apr 2026)
Market Data & Threat Quantification
  • Quantitative exposure estimates, market capitalisation data, and independent security analysis supporting threat assessment figures.
  • Project Eleven: A Look at Post-Quantum Proposals for Bitcoin (blog.projecteleven.com, Jun 2025)
  • CryptoRank: How Much BTC Is Exposed to Quantum Risk (cryptorank.io, Mar 2026)
  • Galaxy Research: Bitcoin Is Rising to the Challenge of Quantum Readiness (galaxy.com, Mar 2026)
  • Palo Alto Networks: Brief — Cryptographically Relevant Quantum Computers (paloaltonetworks.com, 2025)

Related articles

Latest articles

Coinpaprika education

Discover practical guides, definitions, and deep dives to grow your crypto knowledge.

Cryptocurrencies are highly volatile and involve significant risk. You may lose part or all of your investment.

All information on Coinpaprika is provided for informational purposes only and does not constitute financial or investment advice. Always conduct your own research (DYOR) and consult a qualified financial advisor before making investment decisions.

Coinpaprika is not liable for any losses resulting from the use of this information.

Go back to Education