Fresh research is forcing the crypto sector to take quantum risk more seriously. A new paper highlighted by CoinDesk argues that future quantum computers may need far fewer qubits than previously assumed to break the elliptic curve cryptography used by many crypto wallets and internet systems. In the most striking estimate, a machine with about 9,988 physical qubits could theoretically crack a widely used form of elliptic curve encryption, though it would take around 1,000 days under that specific architecture. The finding marks a major drop from older assumptions that millions of qubits would be required for this kind of task.
That does not mean someone can drain bitcoin or ether wallets tomorrow. Google’s Quantum AI team separately said in a March 31 white paper that future quantum systems may be able to break the cryptography protecting cryptocurrencies with fewer resources than earlier estimates suggested, but still emphasized that such machines do not exist today. Google’s analysis estimated that breaking ECDSA-256 could require fewer than 500,000 physical qubits, roughly 20 times lower than its 2019 estimate. The broader point from both lines of research is that the threshold appears to be falling faster than expected, which shortens the planning horizon for post-quantum migration even if the practical threat is not immediate.
For crypto, the most exposed assets are not all coins equally, but wallets whose public keys are already visible onchain. That includes older address types, reused addresses, and coins that have already signed transactions in ways that reveal more information to a future attacker. CoinDesk’s reporting on the new studies frames the risk as especially relevant for bitcoin and ether because both depend on elliptic curve cryptography for signature security. In that sense, the new research is less about proving an instant attack and more about showing that the safety margin around existing wallet designs may be thinner than the industry wanted to believe.
The timing matters because governments and security standards bodies are already moving. NIST finalized its first post-quantum cryptography standards in 2024, and Google has publicly argued that responsible disclosure around crypto vulnerabilities is meant to encourage migration planning rather than panic. The message coming out of this new wave of quantum research is not that crypto is finished. It is that wallet security, signature schemes, and protocol upgrade paths may need to evolve sooner and more deliberately than many market participants expected.





































































































