Technology

Two Quantum Papers Drop Simultaneously — and Together They Collapse the Timeline for Crypto's Biggest Existential Risk

A Caltech and Oratomic research paper posted to arXiv on March 31 found that ECC-256 — the encryption securing Bitcoin and Ethereum wallets — could be broken with as few as 10,000 physical qubits, while a simultaneous Google Quantum AI whitepaper set the threshold at under 500,000 physical qubits, together representing a near five-orders-of-magnitude compression in quantum threat estimates over two decades.

Written By :
MINRK
MINRK
Two Quantum Papers Drop Simultaneously

1. Two Papers, One Day, One Seismic Shift

The quantum computing threat to blockchain cryptography has been discussed in academic and industry circles for years — but on March 31, 2026, two papers published simultaneously moved the conversation from theoretical to urgent in a single news cycle. The first, posted to the arXiv preprint server by researchers from Caltech and quantum computing startup Oratomic, found that the elliptic curve cryptography protecting Bitcoin and Ethereum wallets could be broken using as few as 10,000 physical qubits — collapsing prior estimates that still ran into the hundreds of thousands. The second, a whitepaper from Google Quantum AI, provided independent validation of the directional claim: Google's team calculated that a cryptographically relevant quantum computer capable of breaking ECC-256 would require fewer than 500,000 physical qubits and approximately 1,200 to 1,450 logical qubits — representing a roughly 20-fold reduction from prior Google estimates. The two papers are closely connected and compound each other: the Oratomic team specifically builds on Google's quantum circuits and demonstrates that a neutral-atom architecture could execute the same computation with approximately 50 times fewer physical qubits than Google's own hardware baseline.

2. What ECC-256 Is and Why Its Security Matters

ECC-256 — elliptic curve cryptography using 256-bit keys — is the mathematical foundation on which Bitcoin's and Ethereum's wallet security rests. When a user holds Bitcoin, they control it through a private key, which is a large number derived from a point on an elliptic curve. The public key — the address visible to others — is mathematically related to the private key, but deriving the private key from the public key requires solving the Elliptic Curve Discrete Logarithm Problem, abbreviated ECDLP-256. On a classical computer, solving ECDLP-256 for a 256-bit key would take longer than the age of the universe. On a sufficiently powerful quantum computer running Shor's algorithm — the quantum mathematical technique specifically designed to solve this class of problem — the computation becomes tractable. The question that both papers address is: how powerful does the quantum computer need to be? Prior estimates set that threshold at millions of physical qubits; both new papers set it dramatically lower.

3. The Five-Orders-of-Magnitude Compression

The historical trajectory of qubit requirement estimates for running Shor's algorithm against ECC-256 is striking in its direction. In 2012, researchers estimated approximately one billion physical qubits would be required. The most recent estimates before Tuesday's papers placed the figure in the hundreds of thousands. The Oratomic paper's 10,000-qubit figure and Google's sub-500,000 figure together continue a trend that has compressed the estimated qubit requirement by five orders of magnitude over two decades. Each compression in the estimate reduces the gap between current quantum hardware capabilities and the threshold at which an actual attack becomes feasible. The current state-of-the-art in publicly known quantum hardware sits at hundreds of qubits, not tens of thousands — but the trajectory of the estimates, and the pace at which each new paper has compressed the requirement further, is what has shifted the conversation from distant theoretical concern to near-term operational planning.

4. The Nine-Minute Attack Scenario

The Google whitepaper's most alarming specific finding is the attack timeline: under Google's model, a quantum system operating at the resource threshold it describes could derive a Bitcoin private key in approximately nine minutes once a transaction's public key is briefly exposed. Bitcoin's block confirmation time is approximately ten minutes. The implication is direct: a sufficiently powerful quantum computer could, in theory, observe a Bitcoin transaction being broadcast to the mempool — at which point the sender's public key is briefly visible — derive the corresponding private key in under the confirmation window, and redirect the funds to a different address before the original transaction confirms. Google's researchers estimate that this real-time attack scenario could succeed approximately 41% of the time based on the distribution of transaction confirmation delays. The paper warns that approximately 6.9 million BTC — roughly one-third of the total supply — already sit in wallets where the public key has been exposed in some form and would be vulnerable to a sufficiently capable quantum attacker without even requiring the real-time transaction interception.

5. Taproot's Unintended Consequence

One of the more technically significant findings in the Google paper concerns Bitcoin's 2021 Taproot upgrade — an update that improved transaction privacy and efficiency by introducing a new address format and signature scheme. Taproot, however, makes public keys visible on the blockchain by default in a way that older Pay-to-Public-Key-Hash address formats do not. In the pre-Taproot model, a transaction could be constructed so that the public key is only revealed at the moment of spending — a window that can be minimised by careful operational practice. Under Taproot's default configuration, the public key is embedded directly in the address itself, meaning it is exposed from the moment the wallet receives funds rather than only at the moment of spending. Google's researchers identify this design choice as expanding the population of wallets vulnerable to future quantum attacks — a consequence that was not a design consideration when Taproot was activated, since the quantum threat at that time was assumed to be further away.

6. The Responsible Disclosure Approach

The Google Quantum AI team made an explicit and notable decision about how to share its findings: it published the resource estimates and attack timelines but withheld the actual quantum circuits that would implement the attack. In their place, the team published a zero-knowledge proof — a cryptographic construct that allows anyone to verify that the claimed computation is achievable without learning how to perform it. The rationale, articulated by the paper's authors including Director of Quantum Algorithms Ryan Babbush and VP of Quantum AI Hartmut Neven, is that publishing the circuits themselves would provide potential attackers with a functional blueprint. The decision to engage with the U.S. government before publication and to use zero-knowledge proof disclosure represents a new methodology for responsible vulnerability disclosure that Google explicitly urged other research teams to adopt. The fact that a technology company of Google's scale chose to approach this disclosure with such deliberate care about the potential for misuse signals that the research is being treated as having genuine near-term security implications rather than purely academic significance.

7. Justin Drake and the 2032 Estimate

Ethereum Foundation researcher Justin Drake, whose own cryptographic work was cited in the Google paper, offered the most specific forward-looking assessment of any prominent technical voice in the immediate response to the dual publications. Drake stated publicly that his confidence in "Q-Day" — the moment when a quantum computer capable of breaking current cryptography becomes operational — arriving by 2032 had jumped significantly following the two papers. His framing explicitly acknowledges that the papers attack different layers of the problem and that their compounding effect is additive: the Google paper demonstrates more efficient algorithm compilation, while the Oratomic paper demonstrates more efficient hardware architecture for executing those algorithms. Drake also flagged the possibility that further breakthroughs may not be publicly disclosed, noting that research of this sensitivity could face pressure toward secrecy, and that the public record of quantum progress may therefore understate the actual trajectory.

8. The Institutional Exposure Across Chains

The vulnerability described in the papers is not unique to Bitcoin — it extends across every blockchain that uses elliptic curve cryptography as the basis for wallet security and transaction validation. Google's whitepaper specifically flags that Ethereum, Solana, and other major chains face similar exposure through their wallet architectures, and additionally identifies blockchain-specific structures — Ethereum's KZG trusted setup, Zcash's Sapling protocol, and Litecoin's MimbleWimble implementation — as embedding elliptic curve hardness into fixed public parameters that cannot be updated without fundamental protocol changes. Security researcher Conor Deegan highlighted a pattern identified across these systems: a successful quantum attack on the elliptic curve problem would function as a one-time computational cost that produces indefinitely reusable classical exploits — meaning that once a private key derivation method is operational, it can be applied repeatedly at essentially zero marginal cost.

9. The Asymmetry Between Centralised and Decentralised Systems

One of the most substantive arguments in the debate about quantum risk to crypto is the observation that quantum attacks would threaten all digital security systems simultaneously — banking infrastructure, military communications, and every HTTPS website on the internet would face the same cryptographic vulnerability as Bitcoin and Ethereum. The Google paper addresses this framing directly and identifies a crucial asymmetry: centralised systems, from banks to military networks, can push software updates to their users through administrative authority. A central bank can mandate that all connected institutions migrate to post-quantum cryptography by a specified date and can enforce that mandate through operational protocols. Bitcoin cannot. Bitcoin's governance requires broad consensus among a decentralised developer community, node operators, and miners — a coordination challenge that makes forced migration to post-quantum standards structurally more difficult and time-consuming than the equivalent migration for any centrally governed system.

10. What Happens Next and What the Industry Must Do

The consensus response from the technical community on March 31 was that post-quantum cryptography migration is the correct response and that it is achievable — but that the timeline urgency has materially increased. Ethereum has an eight-year head start through its dedicated post-quantum security research programme and a four-fork migration roadmap culminating in a 2029 target. Bitcoin has no coordinated post-quantum migration plan, no dedicated funding, and no agreed timeline — a governance gap that the Google and Oratomic papers make significantly more consequential than it appeared even a week earlier. Google's own 2029 migration deadline for its authentication services now appears not as an ambitious corporate target but as a conservative planning horizon given the direction of the research. Binance founder Changpeng Zhao's public framing — that upgrading to quantum-resistant algorithms is straightforward in principle but complex in execution for decentralised networks — captures the core challenge accurately. The question is not whether the cryptographic solution exists. Post-quantum standards from NIST, including ML-DSA, provide a technically validated migration path. The question is whether Bitcoin's governance can coordinate and execute that migration before a cryptographically relevant quantum computer is operational.

Related Articles

NEWSLETTERS

Don't miss another story.

Subscribe to the MINRK Newsletter today.

By signing up, you will receive emails about MINRK products and you agree to our terms of use and privacy policy.

Crypto Daybook Americas

Market analysis for crypto traders and investors.

EVERY WEEKDAY

Crypto for Advisors

Defining crypto, digital assets and the future of finance for financial advisors.

EVERY THURSDAY

The Protocol

Exploring the tech behind crypto one block at a time.

WEEKLY

Crypto Long & Short

A must read for institutions. Insights, news and analysis delivered weekly.

EVERY WEDNESDAY

CoinDesk Headlines

The biggest crypto news and ideas of the day.

EVERY WEEKDAY

State of Crypto

Examining the intersection of cryptocurrency and government.

WEEKLY

Research Reports

Join thousands of readers who rely on MINRK for data-driven insights on the latest digital asset trends.

MONTHLY