News
Bitcoin vs Quantum Computing: Will BlackRock’s Warning Come True?
Yes, quantum computers could break Bitcoin’s current security someday, but the industry still has time and clear paths to defend the network if it starts preparing now.
Bitcoin has faced plenty of doubters, yet the latest alarm comes from an unlikely place: BlackRock. In a recent filing the asset-management giant flagged the risk that future quantum computers might crack Bitcoin’s core cryptography and crash the price toward forty thousand dollars. That sounds dramatic, so let’s unpack what is really at stake, what the science says, and how everyday holders can protect their coins.
What Makes Bitcoin Secure Today?
Bitcoin’s safety rests on public-key cryptography. When you create a wallet, it generates a private key (known only to you) and a public key (shared with the world). Anyone can send coins to the public key, but only the matching private key can move them.
Most wallets rely on the Elliptic Curve Digital Signature Algorithm, shortened to ECDSA. According to the National Institute of Standards and Technology, brute-forcing a single 256-bit private key with ordinary computers would take longer than the universe has existed.
Two other design choices add extra armor:
- Bitcoin addresses reveal a hashed version of the public key until the coins are spent.
- Miners verify that every outgoing transaction carries a valid signature, blocking spoofed spends.
As long as private keys remain secret and the math behind ECDSA stays unbroken, attackers are kept out. Classical computers cannot close that gap. Quantum computers promise something different.
Quantum Computing in Plain English
A traditional chip stores information in bits that are either 0 or 1. A quantum chip uses qubits that can be both 0 and 1 at the same time due to superposition. When qubits become entangled, the system can explore many solutions simultaneously, giving certain algorithms a huge speed boost.
Peter Shor proved in 1994 that a powerful enough quantum computer could factor large numbers exponentially faster than any classical machine. Since factoring is related to finding discrete logarithms, the same idea applies to the math that protects Bitcoin wallets. In theory one run of Shor’s algorithm on a large quantum computer can recover a private key from its public key in minutes.
Classical vs Quantum Performance
Task | Classical Computer | Quantum Computer (Shor) |
---|---|---|
Guess a 256-bit Bitcoin private key | Roughly (10^{77}) steps | About (10^{9}) logical qubit operations |
Time at current tech levels | Longer than 13.8 billion years | Still impossible today, maybe hours in future |
Energy cost estimate | Immeasurable | Large but finite, tied to qubit count and error correction |
Notice the gap: the quantum approach is orders of magnitude faster, but only if engineers can build a fault-tolerant system with millions of stable qubits. We are not there yet.
Can Quantum Computers Really Crack Bitcoin? The Numbers
IBM’s Osprey chip hit 433 physical qubits in 2022. Google’s Sycamore has 53 but higher fidelity. According to research published in Nature, breaking RSA-2048 would need roughly twenty million error-corrected qubits running for eight hours. ECDSA-secp256k1, the curve Bitcoin uses, is on a similar scale.
A 2023 study by the University of Sussex concludes that a machine capable of cracking one Bitcoin key in under ten minutes would require around 1.9 billion physical qubits once error correction is included. Industry roadmaps aim for one million physical qubits by 2030. That still leaves a two-order-of-magnitude gap.
So why did BlackRock sound the alarm? Because progress has been faster than many expected. Google researchers cut the estimated qubits needed to crack RSA by a factor of twenty, and similar refinements might shrink the resources for ECDSA. Even a conservative forecast now says a capable system could appear in five to twelve years.
Here is a snapshot of expert expectations:
Source | Year Published | Estimated Arrival of Threat-Level Quantum Computer |
---|---|---|
University of Waterloo | 2020 | 2035 to 2040 |
NSA Commercial Solutions for Classified | 2022 | During the 2030s |
Deutsche Bank Research | 2023 | As early as 2030 |
BlackRock SEC filing | 2024 | Five to seven years |
How Big Is the Risk and When Could It Hit?
Roughly a quarter of all circulating Bitcoin (around five million coins) sits in addresses that have already revealed their public keys through previous spending. Those coins would be an immediate target if a quantum attacker emerged tomorrow.
The rest of the supply remains safer because the public key stays hidden until you spend. Yet after any spend, your new address becomes vulnerable at the next block confirmation if no upgrade has occurred.
Price impact is another concern. The 2022 Chainalysis Crypto Crime Report shows that only four percent of Bitcoin in circulation moves on an average day, so if an attacker started sweeping old addresses, alarms would ring quickly. Panic selling could then push the price toward the forty thousand dollar level BlackRock mentioned.
What the Community Is Doing Right Now
Developers, academics, and standards bodies are not standing still. Work falls into three broad buckets.
Post Quantum Signature Schemes
The US National Institute of Standards and Technology is finalizing new algorithms that resist quantum attacks. Candidates like Dilithium and Falcon rely on lattice problems outside Shor’s reach. A Bitcoin Improvement Proposal could introduce these signatures alongside ECDSA so users can migrate.
Layered Wallet Security
Wallet providers are testing hybrids that sign each transaction twice: once with ECDSA for today’s network and again with a post quantum scheme stored in an OP_RETURN field. While not yet standard, it means early adopters could recover funds after a fork if quantum thefts occur.
Network Wide Upgrade Planning
Bitcoin Core contributor Peter Wuille suggested that a soft fork could add support for quantum resistant scripts without forcing every node to upgrade immediately. Such a change would mimic the approach used for SegWit in 2017.
Experts debate timing. Dr. Michele Mosca, co-founder of the Institute for Quantum Computing, told CoinDesk in 2023, “You want to start the transition ten years before the threat is real, and ideally finish five years ahead.” That clock has arguably started.
Practical Steps for Holders to Stay Safe
- Use Pay to Public Key Hash addresses so your public key remains hidden until you spend.
- When you do move coins, send them to a fresh address immediately rather than reusing the old one.
- Keep sizable holdings in multisig wallets. A thief would need to extract multiple private keys, multiplying the quantum effort required.
- Follow news from Bitcoin Core, NIST, and reputable exchanges for announcements of a post quantum upgrade. Early adopters will likely need to sign a migration transaction.
- Spread funds across several wallets to avoid one single point of failure.
Although these actions do not remove the risk entirely, they buy time and make your stack a less inviting target.
Frequently Asked Questions About Quantum Threats to Bitcoin
Will quantum computing destroy Bitcoin?
Unlikely, since developers can upgrade the protocol to quantum safe signatures, but coins in old addresses would be at risk if owners never move them.
How many qubits are needed to break a Bitcoin private key?
Current studies suggest several million error-corrected qubits, translating to hundreds of millions of physical qubits, far beyond today’s devices.
What is a quantum safe Bitcoin address?
Any address that keeps the public key hidden until spend is considered safer. Taproot and traditional P2PKH addresses fall into this category.
When should I migrate to a post quantum wallet?
Move once a widely accepted standard is live on the Bitcoin network. Until then focus on best practices like avoiding address reuse.
Could regulators freeze Bitcoin during a quantum crisis?
Regulators cannot stop the network globally, but exchanges might halt withdrawals, so holding your own keys remains essential.
Why did BlackRock mention forty thousand dollars?
Their filing used it as a hypothetical price level if investor confidence collapses following a security breach.
Does Ethereum face the same risk?
Yes, Ethereum also uses ECDSA for signatures, though its move to Proof of Stake adds additional considerations.
Conclusion
Quantum computers are coming, though not tomorrow, and Bitcoin still has room to adapt. Stay informed, practice good wallet hygiene, and share this article with friends so more people are ready for the next big upgrade.