Quantum computing poses an imminent threat to Bitcoin’s cryptography: researchers estimate that between ~700 and 2,300 logical qubits running Shor’s algorithm could reconstruct private keys from public keys, exposing on‑chain addresses unless urgent migration to quantum‑resistant signatures occurs.
-
Quantum threshold: ~700–2,300 logical qubits could break ECDSA.
-
Public keys exposed on-chain are at immediate long‑term risk because encrypted data can be harvested now and broken later.
-
Major labs (Google, IBM, state labs) and private funding accelerate arrival of dangerous quantum capabilities.
Quantum computing threat to Bitcoin: urgent call to migrate to quantum‑safe signatures—read how developers, exchanges, and holders should prepare.
How does quantum computing threaten Bitcoin?
Quantum computing threatens Bitcoin by making it feasible to derive private keys from public keys using algorithms like Shor’s. If machines with a few hundred to a few thousand logical qubits arrive, signatures that secure transactions today could be reversed, allowing stolen funds and retroactive compromise of historic public keys.
Are quantum computers close to breaking Bitcoin’s cryptography?
Public research and expert commentary indicate the danger is nearer than previously believed. Estimates discussed by industry experts such as Charles Edwards (Capriole Investments) and by quantum research papers suggest a required range of roughly 700 to 2,300 logical qubits to run Shor’s algorithm at scale for elliptic‑curve cryptography used by Bitcoin. Achieving those logical qubit counts requires many more physical qubits plus error correction, but major groups — including large tech labs and state‑backed programs — are investing heavily and making fast progress. That shifts risk horizons from the 2040s into the late 2020s for certain attack vectors.
“Q-Day” for Bitcoin
Researchers and commentators use the term “Q‑Day” to describe the point when quantum machines can practically break widely used cryptographic primitives. On Q‑Day, any publicly revealed key becomes a target: attackers can harvest blockchain data today and decrypt it later once they possess sufficient quantum resources. That means addresses and transactions that were safe under classical assumptions could be exposed retrospectively.
Charles Edwards has warned that a realistic arrival window for dangerous quantum capability may be within the next 2–3 years, urging rapid remediation. Studies cited in public quantum literature support concern that the numerical threshold for practical attacks is smaller than earlier conservative estimates.
Frequently Asked Questions
Can quantum computers steal Bitcoin that was sent years ago?
Yes. Because blockchain data is public, adversaries can copy transaction data and public keys now and wait until they possess quantum capacity to derive private keys later. Any address that has ever revealed a public key (for example, after spending from an address) becomes vulnerable if quantum attacks become feasible.
What can holders, developers, and exchanges do right now?
Switch to or support quantum‑resistant signature schemes, avoid reusing addresses, and prioritize migration of high‑value hot wallets. Exchanges and custodians should inventory keys, implement key‑rotation policies, and fund R&D for migration plans so funds can be transferred before a credible Q‑Day arrives.
Key Takeaways
- Imminent technical risk: Quantum advances shorten timelines for attacks against ECDSA and related schemes.
- Harvest‑and‑wait threat: Public blockchain data can be collected now and exploited later once quantum capacity exists.
- Action required: Developers, custodians, and holders should adopt migration plans to quantum‑resistant cryptography and rotate exposed keys.
Conclusion
The crypto ecosystem faces a concrete cryptographic threat from quantum computing that requires coordinated technical and operational responses. Citing expert commentary from industry figures and public quantum research, this report stresses that migration to quantum‑safe signatures, comprehensive key management, and advance planning are essential to protect funds before a potential Q‑Day. COINOTAG recommends stakeholders begin and accelerate migration efforts now. Published: 2025‑10‑14. Updated: 2025‑10‑14.
Author/Organization: COINOTAG