New research indicates that quantum computers might require far fewer qubits than previously estimated to compromise the encryption protecting major cryptocurrencies like Bitcoin and Ether. This finding accelerates the urgency for the crypto industry to transition toward quantum-resistant security measures.
Quantum Threat Assessment: Qubit Requirements Plummet
A collaborative research paper originating from Caltech and the quantum startup Oratomic presents a stark reduction in the estimated hardware needed for a successful cryptographic attack. The study posits that the Elliptic Curve Cryptography (ECC-256), which secures assets on major blockchains, could be broken using only about 10,000 physical qubits.
Shor's Algorithm Timeline Compression
This new estimate dramatically undercuts previous projections, which often cited hundreds of thousands of qubits as the minimum requirement. The requirements for running Shor’s algorithm, the quantum method used to break public-key encryption, have seen a massive reduction.
- In 2012, estimates for breaking public-key encryption stood at roughly 1 billion physical qubits.
- Current estimates, based on this new research, have compressed that requirement five orders of magnitude to approximately 10,000 qubits today.
Specific Attack Timelines Detailed
The authors utilized Google's quantum circuits as a benchmark for their calculations, focusing on a neutral-atom quantum computer setup. Such a system, employing around 26,000 qubits, is projected to crack ECC-256 in roughly 10 days.
ECC-256 is considered more vulnerable because it offers comparable security using smaller key sizes, making it easier for quantum machines to process. This 10-day window, however, suggests that rapid, live transaction interception attacks (cracking a key in minutes) remain unlikely under these specific assumptions.
RSA Encryption Remains More Resilient
The research also analyzed RSA-2048, the standard used by financial institutions to secure traditional Web2 platforms. This older encryption method proves more challenging for current quantum projections.
To break RSA-2048, the study estimates that a highly parallelized quantum setup would require approximately 102,000 qubits and about three months to complete the task.
Implications and Conflicts of Interest
These findings underscore a critical race against time: can the cryptocurrency industry migrate to quantum-resistant platforms before the cost of mounting an attack becomes prohibitively low?
It is important to note the context surrounding the paper. All nine authors hold shares in Oratomic, and six are employed by the company. This positions the research both as a scientific breakthrough and as a potential roadmap favoring their specific hardware approach.
While the immediate risk to funds already stored in vulnerable addresses—estimated to include 6.9 million BTC in early or reused wallets—is not eliminated, the overall direction of quantum capability is becoming increasingly clear.
Comments 0