Google research flags quantum attack risk as Ethereum advances post-quantum roadmap

ambcryptoОпубликовано 2026-03-31Обновлено 2026-03-31

Введение

New research involving Google warns that quantum computers with approximately 1,200–1,450 logical qubits could break elliptic curve cryptography—including the secp256k1 standard used in Bitcoin and Ethereum—within minutes. The study highlights two primary risks: “on-spend” attacks, where a quantum system could derive a private key during the 9–12 minute transaction confirmation window, and “at-rest” attacks on dormant wallets with exposed public keys. In response, Ethereum has launched a multi-year post-quantum roadmap aimed at transitioning to quantum-resistant cryptographic system across its protocol layers. However, the shift introduces challenges such as larger signatures, higher computational demands, and the need for coordinated upgrades. User migration to new wallet standards and the vulnerability of older assets also remain significant hurdles. While quantum threats are not immediate, the research underscores the importance of proactive preparation to mitigate long-term risks. Industry leaders like Changpeng Zhao acknowledge that, although transition is feasible, decentralized coordination and potential forks could complicate the process.

New research involving Google has outlined how quantum computers could one day break the cryptographic systems underpinning major blockchains. It reinforces recent efforts by Ethereum Foundation to prepare for a post-quantum future.

The paper estimates that quantum systems with roughly 1,200–1,450 logical qubits could break widely used elliptic curve cryptography. This includes the secp256k1 standard used in Bitcoin and Ethereum, within minutes.

The findings come days after Ethereum detailed a multi-year plan to transition toward quantum-resistant cryptography, highlighting the growing focus on long-term network security.

Quantum attack window could be measured in minutes

One of the paper’s key findings centers on so-called “on-spend” attacks. This is where a quantum computer could derive a user’s private key after a transaction is broadcast but before it is confirmed.

Researchers estimate this window could be as short as 9–12 minutes, potentially turning the transaction mempool into an attack surface.

Beyond active transactions, the paper also highlights risks to dormant wallets. Addresses with exposed public keys could be vulnerable to “at-rest” attacks, potentially putting older holdings at risk if quantum capabilities advance.

Ethereum’s roadmap gains urgency

Ethereum’s recently launched post-quantum security hub outlined a phased migration across its execution, consensus, and data layers, emphasizing “cryptographic agility” to enable gradual upgrades.

While the Ethereum Foundation has previously described quantum threats as long-term, the latest research suggests that preparation timelines may need to accelerate.

The transition is expected to take years, as post-quantum cryptographic schemes introduce larger signatures and increased computational demands, requiring careful coordination across the network.

Broader attack surface raises additional concerns

The paper notes that Ethereum’s architecture may present a broader attack surface compared to simpler blockchain systems. This is because it relies on smart contracts, proof-of-stake validators, and data availability mechanisms.

This complexity could make coordination more challenging as networks evaluate which post-quantum standards to adopt.

Responding to growing discussion around the topic, Changpeng Zhao said there was “no need to panic.” He noted that blockchain systems can transition to quantum-resistant algorithms.

However, he acknowledged that decentralized coordination, potential forks, and user wallet migrations could complicate the process.

Migration challenges extend beyond technology

Beyond protocol-level changes, the shift to post-quantum cryptography will likely require users to migrate funds to new wallet standards actively.

Industry participants have also raised questions about dormant assets, including early Bitcoin holdings, which may become vulnerable if not updated in time.

The paper emphasizes that while quantum computing does not pose an immediate threat, delaying preparation could increase long-term risks as the technology advances.


Final Summary

  • New research suggests quantum attacks on blockchain cryptography could eventually occur within minutes, reinforcing the need for early preparation.
  • Ethereum’s multi-year transition plan reflects growing urgency, though coordination and user migration remain key challenges.

Связанные с этим вопросы

QAccording to the Google research, how many logical qubits would a quantum computer need to break the elliptic curve cryptography used in Bitcoin and Ethereum?

AThe research estimates that quantum systems with roughly 1,200–1,450 logical qubits could break the widely used elliptic curve cryptography, including the secp256k1 standard.

QWhat is the estimated time window for a quantum 'on-spend' attack on a transaction before it is confirmed?

AResearchers estimate the window for an 'on-spend' attack could be as short as 9–12 minutes.

QWhat is the name of the initiative recently launched by the Ethereum Foundation to address quantum threats?

AEthereum recently launched a post-quantum security hub to outline a phased migration plan.

QBeyond the protocol-level changes, what additional challenge does the shift to post-quantum cryptography present for users?

AThe shift will likely require users to actively migrate their funds to new wallet standards.

QWhat did Changpeng Zhao (CZ) say regarding the quantum threat to blockchain systems?

AChangpeng Zhao said there was 'no need to panic,' noting that blockchain systems can transition to quantum-resistant algorithms, though he acknowledged that decentralized coordination could complicate the process.

Похожее

North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

North Korean hackers, particularly the notorious Lazarus Group and its subgroup TraderTraitor, have stolen over $500 million from cryptocurrency DeFi platforms in less than three weeks, bringing their total theft for the year to over $700 million. Recent major attacks on Drift Protocol and KelpDAO, resulting in losses of approximately $286 million and $290 million respectively, highlight a strategic shift: instead of targeting core smart contracts, attackers are now exploiting vulnerabilities in peripheral infrastructure. For instance, the KelpDAO attack involved compromising downstream RPC infrastructure used by LayerZero's decentralized validation network (DVN), allowing manipulation without breaching core cryptography. This sophisticated approach mirrors advanced corporate cyber-espionage. Additionally, North Korea has systematically infiltrated the global crypto workforce, with an estimated 100 operatives using fake identities to gain employment at blockchain companies, enabling long-term access to sensitive systems and facilitating large-scale thefts. According to Chainalysis, North Korean-linked hackers stole a record $2 billion in 2025, accounting for 60% of all global crypto theft that year. Their total historical crypto theft has reached $6.75 billion. Post-theft, they employ specialized money laundering methods, heavily relying on Chinese OTC brokers and cross-chain mixing services rather than standard decentralized exchanges. Security experts, while acknowledging the increased sophistication, emphasize that many attacks still exploit fundamental weaknesses like poor access controls and centralized operational risks. Strengthening private key management, limiting privileged access, and enhancing coordination among exchanges, analysts, and law enforcement immediately after an attack are critical to improving defense and fund recovery chances. The industry's challenge now extends beyond secure smart contracts to safeguarding operational security at the infrastructure level.

marsbit57 мин. назад

North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

marsbit57 мин. назад

Circle CEO's Seoul Visit: No Korean Won Stablecoin Issuance, But Met All Major Korean Banks

Circle CEO Jeremy Allaire's recent activities in Seoul indicate a strategic shift for the company, moving away from issuing a Korean won-backed stablecoin and instead focusing on embedding itself as a key infrastructure provider within Korea’s financial and crypto ecosystem. Despite Korea accounting for nearly 30% of global crypto trading volume—with a market characterized by high retail participation and altcoin dominance—Circle has chosen not to compete for the role of stablecoin issuer. Instead, Allaire met with major Korean banks (including Shinhan, KB, and Woori), financial groups, leading exchanges (Upbit, Bithumb, Coinone), and tech firms like Kakao. This approach reflects a broader industry transition: the core of stablecoin competition is shifting from issuance rights to systemic positioning. With Korean regulators still debating whether banks or tech companies should issue stablecoins, Circle is avoiding regulatory uncertainty by strengthening its role as a service and technology partner. The company is deepening integration with trading platforms, building connections, and promoting stablecoin infrastructure. This positions Circle to benefit regardless of which entity eventually issues a won stablecoin. Allaire also noted the potential for a Chinese yuan stablecoin in the next 3–5 years, underscoring a regional trend of stablecoins becoming more regulated and integrated with traditional finance. Ultimately, Circle’s strategy highlights that future influence in the stablecoin market will belong not necessarily to the issuers, but to the foundational infrastructure layers that enable cross-system transactions.

marsbit1 ч. назад

Circle CEO's Seoul Visit: No Korean Won Stablecoin Issuance, But Met All Major Korean Banks

marsbit1 ч. назад

SpaceX Ties Up with Cursor: A High-Stakes AI Gambit of 'Lock First, Acquire Later'

SpaceX has secured an option to acquire AI programming company Cursor for $60 billion, with an alternative clause requiring a $10 billion collaboration fee if the acquisition does not proceed. This structure is not merely a potential acquisition but a strategic move to control core access points in the AI era. The deal is designed as a flexible, dual-path arrangement, allowing SpaceX to either fully acquire Cursor or maintain a binding partnership through high-cost collaboration. This "option-style" approach minimizes immediate regulatory and integration risks while ensuring long-term alignment between the two companies. At its core, the transaction exchanges critical AI-era resources: SpaceX provides its Colossus supercomputing cluster—one of the world’s most powerful AI training infrastructures—while Cursor contributes its AI-native developer environment and strong product adoption. This synergy connects compute power, models, and application layers, forming a closed-loop AI capability stack. Cursor, founded in 2022, has achieved rapid growth with over $1 billion in annual revenue and widespread enterprise adoption. Its value lies in transforming software development through AI agents capable of coding, debugging, and system design—positioning it as a gateway to future software production. For SpaceX, this move is part of a broader strategy to evolve from a aerospace company into an AI infrastructure empire, integrating xAI, supercomputing, and chip manufacturing. Controlling Cursor fills a gap in its developer tooling layer, strengthening its AI narrative ahead of a potential IPO. The deal reflects a shift in AI competition from model superiority to ecosystem and entry-point control. With programming tools as a key battleground, securing developer loyalty becomes crucial for dominating the software production landscape. Risks include questions around Cursor’s valuation, technical integration challenges, and potential regulatory scrutiny. Nevertheless, the deal underscores a strategic bet: controlling both compute and software development access may redefine power dynamics in the AI-driven future.

marsbit2 ч. назад

SpaceX Ties Up with Cursor: A High-Stakes AI Gambit of 'Lock First, Acquire Later'

marsbit2 ч. назад

Торговля

Спот
Фьючерсы

Популярные статьи

Manyu: восходящая мем-звезда на Ethereum, готовая открыть новую эру культуры Shiba

Manyu - это мемтокен на Ethereum, который приносит децентрализованную культурную и развлекательную ценность через вирусное влияние в соцсетях и вовлечённость сообщества.

1.9k просмотров всегоОпубликовано 2025.11.27Обновлено 2025.11.27

Manyu: восходящая мем-звезда на Ethereum, готовая открыть новую эру культуры Shiba

Обсуждения

Добро пожаловать в Сообщество HTX. Здесь вы сможете быть в курсе последних новостей о развитии платформы и получить доступ к профессиональной аналитической информации о рынке. Мнения пользователей о цене на ETH (ETH) представлены ниже.

活动图片