
In brief
Scientists say the quantum risk to Bitcoin remains a decade or more away.
New cryptography standards aim to harden systems before “Q-Day,” but experts warn that Bitcoin’s governance makes upgrades slow and political.
Markets could crash on fear alone long before quantum math catches up.
Bitcoin’s quantum reckoning may still be years away, but the fear has already arrived. Breakthroughs from Google, Caltech, and IBM have reignited debate over a looming “Q-Day”—the moment when a quantum computer could shatter the cryptography securing Bitcoin and decentralized finance.
Yet experts warn that the real danger may come first from people—not equations—with panic, premature market reactions, and slow developer preparation could shake confidence long before any code actually fails.
Fear moves faster than math
In crypto, panic spreads faster than reason. The market may run on code, but emotion still moves the price.
Yoon Auh, founder of post-quantum cryptography company BOLTS Technologies, warned that even one mistaken claim about quantum computers breaking Bitcoin could set off a chain reaction, pointing to a recent flash crash in the market last month.
“Crypto had a little flash crash,” Auh told Decrypt. “A $50 to $100 million sell-off—basically nothing in traditional markets—triggered massive losses across blockchain assets. That shows how fragile the system still is.”
Earlier this month, a single post from President Donald Trump threatening 100% tariffs on Chinese imports triggered the largest single-day crypto wipeout in history, erasing $19 billion in liquidations as Bitcoin briefly plunged below $102,000.
Auh said the same dynamic could unfold after a quantum scare: “Imagine hearing someone say, ‘[Elliptic-curve cryptography] can be broken now, maybe not instantly, but soon.’ Everyone would rush for the exit. The system would trip over itself.”
The industry has seen it before. In 2017, a false 4Chan post claiming Ethereum founder Vitalik Buterin had died erased billions in market value before traders realized it was fake. The sell-off showed how quickly trust can collapse when information outruns verification.
The quantum timeline: You are here
Quantum computers operate on principles that differ from anything in classical computing. Instead of bits that are either 0 or 1, qubits can exist in multiple states at once. When qubits become linked—a property called entanglement—they can process many possibilities simultaneously. That property makes certain kinds of math, like factoring and discrete logarithms, exponentially more efficient to solve.
In 1994, mathematician Peter Shor proved that a sufficiently powerful quantum computer could, in theory, break the encryption securing everything from credit cards to Bitcoin wallets. Bitcoin relies on elliptic-curve cryptography, or ECC, which turns private keys into public ones through equations that are easy to compute, but practically impossible to reverse.
A large-enough quantum computer could run Shor’s algorithm to invert that math, revealing the private key behind any exposed public key on the blockchain.
Bitcoin’s specific system, known as secp256k1, uses these elliptic-curve equations to generate and verify signatures. A quantum computer powerful enough to perform these calculations could recover private keys and empty wallets associated with visible public keys. A 256-bit elliptic-curve key provides roughly the same classical security as a 3,072-bit RSA key—extremely strong by today’s standards.
For now, that danger remains theoretical. The world’s largest quantum processors—IBM’s Condor with 1,121 qubits and Caltech’s neutral-atom array exceeding 6,000 qubits—are far from the millions of physical qubits needed to produce even a few thousand logical qubits for fault-tolerant computation.
Current research suggests that around 2,000 to 3,000 logical qubits would be required to break Bitcoin’s elliptic-curve encryption with Shor’s algorithm. Reaching that level will likely take another decade or more, though optimistic projections by IBM and Google place such machines in the early to mid-2030s.
“The quantum threat to cryptography is real and serious,” Edward Parker, a physicist at the RAND Corporation, told Decrypt. “Some people think quantum computers will never threaten encryption, and that might be true. But there’s enough risk that we need to prepare well ahead of time.”
That measured caution often gets twisted online, and warnings meant to spark discussion and preparation instead fuel a wave of alarmism, and exaggerated ‘quantum apocalypse’ rhetoric.
The U.S. government is already moving in that direction. A 2022 presidential directive, National Security Memorandum 10, ordered federal agencies to begin upgrading to post-quantum encryption—a rare case of long-term coordination across departments. Parker pointed to research in 2023 led by cryptographer Michele Mosca that put the median estimate for a cryptographically relevant quantum computer around 2037.
Research scientist Ian MacCormack agreed that public fear has run ahead of what the technology can actually do.
“Quantum computers are nowhere near powerful enough to break RSA-2048 or any encryption of meaningful size,” he said. “Getting the error rates down and combining thousands of qubits to do something practical will take time, money, and trial and error.”
MacCormack said the mystique of quantum computing, however, often amplifies fear.
“People hear about quantum computing and it sounds god-like or incomprehensible,” he said. “But regardless of its potential, it’s just an incredibly difficult engineering problem. Developing quantum-resistant encryption will almost certainly happen faster than building a quantum computer capable of breaking current encryption.”
Coin Metrics co-founder and Castle Island Ventures Partner Nic Carter recently called quantum computing “the biggest risk to Bitcoin.” In his essay “Bitcoin and the Quantum Problem,” he notes that nearly a quarter of all Bitcoin—about 4 million coins—already sits in addresses that have exposed public keys. Those are theoretically vulnerable once practical quantum decryption arrives. Confidence in Bitcoin’s unbreakable math could fracture long before the math itself does.
Making Bitcoin quantum-resistant
Even though the threat is distant, experts say the time to act is now—but it depends on broad coordination.
Rebecca Krauthamer, co-founder and CEO of post-quantum cybersecurity company QuSecure, said the next step is clear: elliptic-curve cryptography has to go.
“You’d need to replace that with one of the post-quantum standardized algorithms like ML-DSA,” she told Decrypt.
ML-DSA, short for Module Lattice-Based Digital Signature Algorithm, is a new post-quantum cryptography standard developed by the U.S. National Institute of Standards and Technology (NIST). It’s built on lattice-based math, a branch of cryptography that hides information within multidimensional grids of numbers.
Cracking those grids would require solving what’s known as the “Learning With Errors” problem—an equation so complex that even a powerful quantum computer can’t untangle it efficiently. That makes ML-DSA far more resistant to decryption than the elliptic-curve systems used in Bitcoin today.
Only a few blockchains today are truly quantum-resistant, while most are still adapting to post-quantum cryptography.
Quantum Resistant Ledger (QRL) was built for quantum safety, using the XMSS hash-based signature scheme standardized by NIST. Cellframe and Algorand use lattice-based algorithms from the NIST suite—Crystals-Dilithium, FALCON, and NTRU—allowing flexible, modular upgrades as standards evolve. IOTA relies on Winternitz one-time signatures in its “Tangle” network, protecting transactions from quantum key recovery. Nervos Network combines classical and lattice-based systems in a hybrid model that enables gradual migration to post-quantum security.
Major chains such as Bitcoin, Ethereum, Cardano, and Solana remain in transition. Ethereum’s 3.0 roadmap includes active research and testnets for post‑quantum signatures, while Bitcoin’s modular Taproot and Schnorr upgrades provide the groundwork for integrating future quantum‑safe cryptography.
That kind of upgrade is feasible, but politically complex. Bitcoin’s security model relies on network-wide consensus among miners, developers, and node operators. Any cryptographic change would require a fork, and that process takes years of discussion and testing.
“Quantum computing can sound abstract,” Krauthamer said. “But the fix is surprisingly straightforward. We already have the math. Governments are mandating quantum-safe standards, and finance will follow. The hard part is making people care before it’s urgent.”
Most experts say the safest path is gradual: add post-quantum support now through new address types or hybrid signatures, get custodians and wallets to use them for new funds, and slowly migrate older wallets. That prevents the chaos of everyone rotating keys at once—a scenario that could damage confidence faster than any real quantum attack.
Bitcoin contributors have already explored post-quantum signatures and hybrid schemes in developer forums. The challenge isn’t finding algorithms; it’s deciding when and how to deploy them.
The governance problem
Scott Aaronson, a computer science professor at the University of Texas at Austin, said Bitcoin’s decentralized model makes upgrades difficult.
“With Ethereum and most other chains, someone can decide to migrate to quantum-resistant crypto when it becomes urgent,” he told Decrypt. “With Bitcoin, you’d need a majority of miners to agree to a fork. And something like $100 billion worth of early coins are still protected only by ECC.”
That lack of central authority could slow adoption. A split or rushed rollout might fracture the network. Still, many Bitcoin developers argue that once a viable upgrade path exists, consensus will form around working code.
Ethereum and Solana have more flexible governance and could adapt faster. Bitcoin’s caution has protected it from bad ideas, but that same conservatism makes big changes hard to implement.
How close is Q-Day?
A quantum computer powerful enough to break Bitcoin’s encryption doesn’t exist yet. Current prototypes count qubits in the thousands, but not the millions of error-corrected qubits required for stable, scalable attacks.
Late last month, Google announced a new milestone in its quantum research: Its 105-qubit “Willow” processor completed a physics simulation in just over two hours that would take the Frontier supercomputer more than three years to reproduce. The experiment used 65 active qubits across 23 circuit layers, and achieved median two-qubit gate errors near 0.0015. The result marked a verifiable quantum speed-up but posed no threat to encryption—progress, not peril.
Even researchers who view quantum computing as a long-term threat say the real danger is still years away.
“I think quantum computation has a reasonable probability—say, more than five percent—of being a major, even existential, long-term risk to Bitcoin and other cryptocurrencies,” Christopher Peikert, a professor of computer science and engineering at the University of Michigan, told Decrypt. “However, it doesn’t appear to be a real risk in the next few years. Quantum-computing technology and engineering still have too far to go before they can threaten modern cryptography.”
The harder part, Peikert added, will be performance once post-quantum systems are deployed. “Post-quantum signatures use much larger keys,” he said. “Since cryptocurrencies rely on many signatures for transactions and blocks, switching to post-quantum or hybrid signatures would significantly increase network traffic and block sizes.”
As for near-term protection, Peikert said the best mitigation is behavioral, not technological.
“In the short term, one should avoid revealing public keys on a public network until absolutely necessary, and give those keys short lifetimes,” he said. “Longer-term, core protocols should be carefully updated to incorporate post-quantum cryptography for the most important functionalities and assets.”
Express agrees that quantum computing won’t break Bitcoin anytime soon; what matters is whether the community can stay calm when it does.
Generally Intelligent Newsletter
A weekly AI journey narrated by Gen, a generative AI model.

