Google research flags quantum attack risk as Ethereum advances post-quantum roadmap

ambcryptoPublished on 2026-03-31Last updated on 2026-03-31

Abstract

New research involving Google warns that quantum computers with approximately 1,200–1,450 logical qubits could break elliptic curve cryptography—including the secp256k1 standard used in Bitcoin and Ethereum—within minutes. The study highlights two primary risks: “on-spend” attacks, where a quantum system could derive a private key during the 9–12 minute transaction confirmation window, and “at-rest” attacks on dormant wallets with exposed public keys. In response, Ethereum has launched a multi-year post-quantum roadmap aimed at transitioning to quantum-resistant cryptographic system across its protocol layers. However, the shift introduces challenges such as larger signatures, higher computational demands, and the need for coordinated upgrades. User migration to new wallet standards and the vulnerability of older assets also remain significant hurdles. While quantum threats are not immediate, the research underscores the importance of proactive preparation to mitigate long-term risks. Industry leaders like Changpeng Zhao acknowledge that, although transition is feasible, decentralized coordination and potential forks could complicate the process.

New research involving Google has outlined how quantum computers could one day break the cryptographic systems underpinning major blockchains. It reinforces recent efforts by Ethereum Foundation to prepare for a post-quantum future.

The paper estimates that quantum systems with roughly 1,200–1,450 logical qubits could break widely used elliptic curve cryptography. This includes the secp256k1 standard used in Bitcoin and Ethereum, within minutes.

The findings come days after Ethereum detailed a multi-year plan to transition toward quantum-resistant cryptography, highlighting the growing focus on long-term network security.

Quantum attack window could be measured in minutes

One of the paper’s key findings centers on so-called “on-spend” attacks. This is where a quantum computer could derive a user’s private key after a transaction is broadcast but before it is confirmed.

Researchers estimate this window could be as short as 9–12 minutes, potentially turning the transaction mempool into an attack surface.

Beyond active transactions, the paper also highlights risks to dormant wallets. Addresses with exposed public keys could be vulnerable to “at-rest” attacks, potentially putting older holdings at risk if quantum capabilities advance.

Ethereum’s roadmap gains urgency

Ethereum’s recently launched post-quantum security hub outlined a phased migration across its execution, consensus, and data layers, emphasizing “cryptographic agility” to enable gradual upgrades.

While the Ethereum Foundation has previously described quantum threats as long-term, the latest research suggests that preparation timelines may need to accelerate.

The transition is expected to take years, as post-quantum cryptographic schemes introduce larger signatures and increased computational demands, requiring careful coordination across the network.

Broader attack surface raises additional concerns

The paper notes that Ethereum’s architecture may present a broader attack surface compared to simpler blockchain systems. This is because it relies on smart contracts, proof-of-stake validators, and data availability mechanisms.

This complexity could make coordination more challenging as networks evaluate which post-quantum standards to adopt.

Responding to growing discussion around the topic, Changpeng Zhao said there was “no need to panic.” He noted that blockchain systems can transition to quantum-resistant algorithms.

However, he acknowledged that decentralized coordination, potential forks, and user wallet migrations could complicate the process.

Migration challenges extend beyond technology

Beyond protocol-level changes, the shift to post-quantum cryptography will likely require users to migrate funds to new wallet standards actively.

Industry participants have also raised questions about dormant assets, including early Bitcoin holdings, which may become vulnerable if not updated in time.

The paper emphasizes that while quantum computing does not pose an immediate threat, delaying preparation could increase long-term risks as the technology advances.


Final Summary

  • New research suggests quantum attacks on blockchain cryptography could eventually occur within minutes, reinforcing the need for early preparation.
  • Ethereum’s multi-year transition plan reflects growing urgency, though coordination and user migration remain key challenges.

Related Questions

QAccording to the Google research, how many logical qubits would a quantum computer need to break the elliptic curve cryptography used in Bitcoin and Ethereum?

AThe research estimates that quantum systems with roughly 1,200–1,450 logical qubits could break the widely used elliptic curve cryptography, including the secp256k1 standard.

QWhat is the estimated time window for a quantum 'on-spend' attack on a transaction before it is confirmed?

AResearchers estimate the window for an 'on-spend' attack could be as short as 9–12 minutes.

QWhat is the name of the initiative recently launched by the Ethereum Foundation to address quantum threats?

AEthereum recently launched a post-quantum security hub to outline a phased migration plan.

QBeyond the protocol-level changes, what additional challenge does the shift to post-quantum cryptography present for users?

AThe shift will likely require users to actively migrate their funds to new wallet standards.

QWhat did Changpeng Zhao (CZ) say regarding the quantum threat to blockchain systems?

AChangpeng Zhao said there was 'no need to panic,' noting that blockchain systems can transition to quantum-resistant algorithms, though he acknowledged that decentralized coordination could complicate the process.

Related Reads

The Cost of an 11.5% Annualized Return: Will MicroStrategy's STRC Face a Moment of Reckoning?

This article analyzes the potential risks associated with MicroStrategy's (MSTR) use of structured financial products like STRC to leverage its BTC exposure. While these tools have enabled impressive returns (e.g., 11.5% annualized) and fueled significant capital inflows ($13.5B outstanding), they also create substantial annual dividend obligations (~$400M). The author argues that this structure, while effective in a bull market, could become a liability if BTC price stagnates or declines. The core risk is a potential negative feedback loop: the growing dividend burden from continued STRC issuance may eventually outweigh the benefits of increased BTC holdings. To meet these obligations, MicroStrategy might need to use new issuance proceeds for dividends instead of buying more BTC, which could disappoint equity investors. If the market capitalization (mNAV) falls below the value of its BTC holdings, the company could be forced to sell BTC instead of issuing new shares, potentially triggering a panic. The author estimates a potential inflection point in 6 months, where annual dividend costs reach $3-4B. At that stage, CEO Michael Saylor might face a difficult choice: sell BTC to meet obligations or sacrifice the credibility of the preferred shares by halting dividends. The article concludes that this financial engineering, while powerful, could ultimately "backfire" on MicroStrategy if market conditions turn.

marsbit4m ago

The Cost of an 11.5% Annualized Return: Will MicroStrategy's STRC Face a Moment of Reckoning?

marsbit4m ago

Trading

Spot
Futures

Hot Articles

Discussions

Welcome to the HTX Community. Here, you can stay informed about the latest platform developments and gain access to professional market insights. Users' opinions on the price of ETH (ETH) are presented below.

活动图片