Is crypto security at risk? Google warns of 20x faster quantum threat

ambcryptoОпубліковано о 2026-03-31Востаннє оновлено о 2026-03-31

Анотація

Google's research indicates quantum computing advances could threaten cryptocurrency security by breaking widely used encryption standards. The report warns cryptographically relevant quantum computers (CRQCs) with approximately 1,200-1,450 logical qubits could potentially break 256-bit elliptic curve encryption in minutes. This capability might compromise Bitcoin private keys in under nine minutes and expose up to 1,000 Ethereum wallets in roughly nine days, with an estimated 6.7 million Bitcoin addresses currently vulnerable. Google emphasizes a 20-fold reduction in required physical qubits, accelerating the quantum threat timeline. In response, Google advocates transitioning to post-quantum cryptographic standards by 2029, though implementation requires coordinated upgrades and policy changes. Failure to adapt may lead to exploitation risks and market instability. Asian countries show the highest search interest in post-quantum cryptography solutions.

Security concerns around cryptocurrencies are intensifying after new research from Google warned that advances in quantum computing could undermine the cryptographic foundations securing billions in digital assets.

The report highlights how emerging quantum systems may soon be capable of breaking widely used encryption standards, raising fresh questions about the long-term resilience of blockchain networks such as Bitcoin and Ethereum.

Quantum threat puts crypto security at risk

The findings come at a critical time for the cryptocurrency industry, as institutional investors and governments increasingly embrace digital assets. Furthermore, a successful breach of cryptographic systems would leave wallets vulnerable to theft and undermine trust in blockchain infrastructure. As a result, this trust, which is based on the assumption of computational security, may be severely undermined.

Google’s research outlines a scenario where cryptographically relevant quantum computers (CRQCs) could decrypt both public and private keys. This would allow attackers to gain control of wallets and execute fraudulent transactions.

The report focuses on blockchains that use the industry standard 256-bit elliptic curve discrete logarithm problem (ECDLP-256). Furthermore, it estimates that a sufficiently advanced quantum system, with approximately 1,200 to 1,450 logical qubits and fewer than 500,000 physical qubits, could break this encryption in minutes. As a result, once such quantum capabilities are developed, the security of these blockchains could be jeopardized.

For context, such a system could compromise Bitcoin private keys in under nine minutes, faster than the network’s average block time. In Ethereum’s case, the same capability could enable attackers to access up to 1,000 wallets in roughly nine days. Google estimates that approximately 6.7 million Bitcoin addresses are currently among the most vulnerable.

“This represents an approximately 20-fold reduction in the number of physical qubits required to solve ECDLP-256,” the researchers noted, underscoring how quickly the technical barrier is shrinking.

Google urges a post-quantum shift by 2029

In response to these risks, Google has set a 2029 target for transitioning toward post-quantum cryptographic standards. The shift would involve replacing existing encryption schemes with quantum-resistant alternatives across blockchain networks.

However, the transition is expected to be complex and time-intensive. It will require coordinated upgrades, changes to wallet infrastructure, and new policies addressing dormant or vulnerable addresses. This is particularly applicable to those addresses linked to lost private keys.

“While viable solutions like post-quantum cryptography exist, they will take time to implement, increasing the urgency to act.”

Additional mitigation measures include discouraging address reuse and identifying exposed wallets before quantum systems reach critical capability.

Projects that fail to adapt could face both technical and market consequences. Beyond the risk of exploitation, delayed upgrades may trigger declining valuations and increased fear, uncertainty, and doubt (FUD) among investors.

Data from Google Trends, at press time, indicates that Asian countries show the highest concern for “post-quantum cryptography,” with South Korea, China, and Singapore leading search interest.


Final Summary

  • Google warns that advances in quantum computing could impact cryptocurrencies.
  • The report suggests that digital assets may become vulnerable to hacks within minutes.

Пов'язані питання

QWhat is the main security concern for cryptocurrencies according to Google's research?

AGoogle warns that advances in quantum computing could undermine the cryptographic foundations securing digital assets, potentially breaking widely used encryption standards.

QHow quickly could a quantum system compromise Bitcoin private keys based on the report?

AA sufficiently advanced quantum system could compromise Bitcoin private keys in under nine minutes, faster than the network's average block time.

QWhat is Google's target year for transitioning to post-quantum cryptographic standards?

AGoogle has set a 2029 target for transitioning toward post-quantum cryptographic standards to address quantum computing threats.

QWhich countries show the highest concern for 'post-quantum cryptography' according to Google Trends?

AAsian countries, particularly South Korea, China, and Singapore, show the highest search interest for 'post-quantum cryptography'.

QWhat are some mitigation measures mentioned to counter quantum threats?

AMitigation measures include discouraging address reuse, identifying exposed wallets, and transitioning to quantum-resistant encryption schemes.

Пов'язані матеріали

From Robinhood to Polymarket: Is the Era of Integrating All Assets on a Single Platform Coming?

From Robinhood to Polymarket: The Era of All-in-One Asset Platforms Is Coming Asset classes are rapidly converging. Platforms that once specialized in single categories—such as stocks, cryptocurrencies, or prediction markets—are now moving toward offering all three. Robinhood pioneered this model, starting with equities, adding crypto in 2018, and prediction markets in 2025. This strategy has proven resilient: when crypto revenues fell, other segments like options and stocks filled the gap. Now, prediction market leaders Polymarket and Kalshi are moving in the same direction, both announcing perpetual futures trading on April 21, 2026, pending regulatory approval. These futures will cover assets like Bitcoin, gold, and stocks such as Nvidia. This trend mirrors the consolidation seen in consumer tech, like smartphones replacing dedicated cameras and MP3 players. Younger users, accustomed to interacting with multiple asset types from an early age, will increasingly demand unified platforms. A key competitive advantage in prediction markets is collateral utilization—idle assets locked during betting periods. Polymarket’s move into perpetuals may be a strategy to generate yield from that capital, similar to earlier DeFi integrations like PolyAave. As the regulatory landscape evolves, traditional finance is also likely to incorporate crypto and prediction markets, further accelerating this convergence.

marsbit11 хв тому

From Robinhood to Polymarket: Is the Era of Integrating All Assets on a Single Platform Coming?

marsbit11 хв тому

OpenAI Goes Left, DeepSeek Goes Right

On April 24, 2026, DeepSeek released V4, a Chinese large language model offering a free "million-token context window," enabling it to process vast amounts of data like entire books or years of corporate documents in one go. In contrast, OpenAI’s GPT-5.5, released around the same time, is more powerful but significantly more expensive, charging up to $180 per million output tokens. DeepSeek’s strategy represents a shift from a pure AI research firm to a heavy-infrastructure player, building data centers in Inner Mongolia’s Ulanqab to bypass U.S. chip export restrictions. This move, supported by Huawei’s Ascend chips and China’s cheap green electricity, highlights a fundamental divergence in AI development models: U.S. firms focus on high-cost, high-margin services, while Chinese players like DeepSeek prioritize accessibility and affordability. Facing intense talent poaching from tech giants, DeepSeek is seeking a $44 billion valuation funding round to retain researchers and scale infrastructure. Meanwhile, Chinese manufacturers are compressing AI models to run on smartphones, making AI accessible offline and across the Global South. Through open-source models and localized solutions, Chinese AI is empowering non-English speakers and low-income users, driving a form of "digital equality." While Silicon Valley builds walled gardens, DeepSeek and others are turning AI into a public utility—like tap water—flowing freely to those previously left behind.

marsbit37 хв тому

OpenAI Goes Left, DeepSeek Goes Right

marsbit37 хв тому

$292 Million KelpDAO Cross-Chain Bridge Hack: Who Should Foot the Bill?

On April 18, 2026, an attacker stole 116,500 rsETH (worth ~$292M) from KelpDAO’s cross-chain bridge in 46 minutes—the largest DeFi exploit of 2026. The stolen assets were deposited into Aave V3 as collateral, causing $177–200M in bad debt and triggering a cascade of losses across nine DeFi protocols. Aave’s TVL dropped by ~$6B overnight. This legal analysis argues that KelpDAO and LayerZero Labs share concurrent liability, with fault apportioned 60%/40%. KelpDAO negligently configured its bridge with a 1-of-1 decentralized verifier network (DVN)—a single point of failure—despite LayerZero’s explicit recommendation of a 2-of-3 setup. LayerZero, which operated the compromised DVN, failed to secure its RPC infrastructure against a known poisoning attack vector. Both protocols’ terms of service cap liability at $200 (KelpDAO) or $50 (LayerZero), but these limits are likely unenforceable due to unconscionability, gross negligence exceptions, and potential securities law invalidation (if rsETH is deemed a security under the Howey test). Aave’s governance also faces fiduciary duty claims for raising rsETH’s loan-to-value ratio to 93%—far above competitors’ 72–75%—without adequately assessing bridge risks, amplifying the systemic fallout. Practical recovery targets include LayerZero Labs (a registered Canadian entity), KelpDAO’s founders, auditors, and identifiable Aave governance delegates. The incident underscores escalating legal risks for DeFi protocols, infrastructure providers, and governance participants.

marsbit1 год тому

$292 Million KelpDAO Cross-Chain Bridge Hack: Who Should Foot the Bill?

marsbit1 год тому

Торгівля

Спот
Ф'ючерси
活动图片