← Back to Quantum PhysicsQuantum computer visualization threatening Bitcoin blockchain security with glowing qubits and cryptocurrency symbols
⚛️ Quantum Physics: Cryptography

Can Quantum Computers Destroy Bitcoin? The Cryptographic Battle for Blockchain's Future

January 12, 2026 7 min read

A sufficiently powerful quantum computer could break the cryptographic keys that protect blockchains. When does this threat become real, and what are the countermeasures?

🔐 How Bitcoin Is Protected Today

Every time you send Bitcoin, the transaction is digitally signed using the ECDSA (Elliptic Curve Digital Signature Algorithm) on the specific elliptic curve secp256k1. Your private key — a 256-bit number — creates a signature proving that you authorized the transfer. The public key, derived from the private key through mathematical operations on the elliptic curve, allows anyone to verify the signature without learning the private key.

The security rests on a mathematical problem: the elliptic curve discrete logarithm problem. With classical computers, recovering the private key from the public one takes more time than the age of the universe. Meanwhile, mining relies on SHA-256, a cryptographic hash function that converts data into a unique 256-bit “fingerprint.” Miners try billions of random numbers (nonces) per second to find one that produces a hash below a target. These two mechanisms — ECDSA for signatures, SHA-256 for mining — are blockchain's twin guardians. But only one of them is truly threatened by quantum computers.

⚛️ Shor's Algorithm — The Quantum Nightmare

In 1994, mathematician Peter Shor at Bell Labs published an algorithm that changed everything. Shor's algorithm can solve the discrete logarithm and integer factorization problems in polynomial time on a quantum computer — exponentially faster than any classical algorithm. This means that both RSA (which protects the internet) and ECDSA (which protects cryptocurrencies) would be completely vulnerable to a sufficiently powerful quantum computer.

According to analysis by Aggarwal, Brennen, Lee, Santha, and Tomamichel (2018), ECDSA digital signatures “could be completely broken by a quantum computer.” By contrast, for mining the threat is far smaller: Grover's algorithm provides only quadratic speedup in searching for nonces — insufficient against specialized ASICs running at GHz speeds while quantum gates operate roughly 1,000 times slower. In simple terms: the real threat isn't to mining but to signatures — that is, to your wallets.

126,133 Cat qubits to break secp256k1
9 hours Time to crack 256-bit curve
~$500 bn Bitcoin value at risk
76+ days Minimum migration downtime

🔢 How Many Qubits Are Actually Needed?

The answer depends on architecture. In a study published in Physical Review Letters in 2023, Gouzien, Ruiz, Le Régent, Guillaud, and Sangouard showed that using cat qubits (quantum bits based on superposition of coherent light states) with repetition code, Bitcoin's 256-bit elliptic curve can be broken in 9 hours using 126,133 cat qubits and 19 photons per cat state. This is the most precise resource estimate specifically for Bitcoin's secp256k1 curve.

For broader cryptographic systems, Ekerå and Gidney estimated that approximately 20 million qubits are needed to factor an RSA-2048 number. Oded Regev (NYU) improved Shor's algorithm to n3/2 quantum operations (instead of n2), reducing the requirements. Today's quantum computers have “at most a few hundred” qubits, as Quanta Magazine notes — thousands of times fewer than needed. However, the technology is advancing. According to a 2024 analysis, quantum devices capable of breaking ECDSA are “expected with reasonable probability within a decade.”

📊 Cryptographic Systems vs Quantum Threat

SystemUseQuantum ThreatQubit Estimate
ECDSA (secp256k1)Bitcoin Signatures🔴 Critical (Shor)~126,000 cat qubits
RSA-2048Web / TLS / Email🔴 Critical (Shor)~20,000,000 qubits
SHA-256Bitcoin Mining🟡 Low (Grover)Quadratic speedup only
ML-DSA (Dilithium)Post-quantum signatures🟢 ResistantNo known attack

🛡️ The Post-Quantum Defense

The cryptographic community's response began long before quantum computers became a practical threat. Already in August 2015, the NSA announced its transition to quantum-resistant cryptography. In 2024, NIST (the U.S. National Institute of Standards and Technology) published the first three post-quantum cryptography standards: ML-KEM (FIPS 203, formerly CRYSTALS-Kyber) for key exchange, ML-DSA (FIPS 204, formerly CRYSTALS-Dilithium) for digital signatures, and SLH-DSA (FIPS 205, formerly SPHINCS+) as a hash-based alternative.

All three are based on lattice-based cryptography, primarily on the Learning With Errors (LWE) problem — a mathematical problem that, unlike factorization, does not appear vulnerable to Shor's algorithm. Impressively, ML-DSA signature verification at security level 5 takes only 0.14 ms, compared to ECDSA's 0.88 ms — post-quantum cryptography can be faster than today's standard.

⚠️ The SIDH Warning

In August 2022, post-quantum candidate SIDH (Supersingular Isogeny Diffie-Hellman) — a NIST finalist — was cracked in 62 minutes on an ordinary laptop by Wouter Castryck and Thomas Decru (KU Leuven), using a 1997 theorem by mathematician Ernst Kani. The attack was classical, not quantum. “We killed one of our favorite systems,” the researchers said. The story shows that finding “quantum-proof” mathematics is just as difficult as building the quantum computers themselves.

⏳ Harvest Now, Decrypt Later — The Invisible Threat

Even if quantum computers cannot break cryptography today, there is an imminent strategy known as "harvest now, decrypt later": state and non-state actors are storing encrypted data now with the intention of decrypting it in the future, when quantum computers become powerful enough. For data with long sensitivity lifespans — state secrets, medical records, financial information — this threat is already real.

In blockchain, the problem is even more pressing. According to Pont, Kearney, Moyler, and Perez-Delgado (2024), transitioning Bitcoin to quantum-safe signatures requires at least 76 days of downtime — and this involves approximately $500 billion in cryptocurrencies. The transition “must be fully completed before a quantum ECDSA-breaking device exists,” the researchers note — meaning the countdown has already begun. In January 2026, Papadopoulos proposed a pioneering Ethereum smart contract that automatically detects when a quantum device reaches cryptographic supremacy and activates quantum-safe signatures as a fallback.

"Cryptography works until it's cracked."

— Quanta Magazine, “Cryptography's Future Will Be Quantum-Safe” (2022)

The Bitcoin community still has time — but not unlimited. The mathematics behind lattice-based cryptography are currently the most promising, but the SIDH story shows that no promise is final. The only certainty is that transitioning to post-quantum protocols is not a luxury — it is a necessity. And the sooner it begins, the less it will cost.

📚 Sources

Bitcoin Quantum Computing Shor's Algorithm Blockchain Security Post-Quantum Cryptography NIST ECDSA Quantum Threat