Key Takeaways
- A new Google Quantum AI study reveals that advanced quantum computers could break Bitcoin’s encryption in approximately nine minutes
- With Bitcoin’s confirmation time averaging 10 minutes, this creates a dangerously narrow one-minute security buffer
- Required qubit count has plummeted from millions to fewer than 500,000 — a dramatic 20-fold decrease
- Google has accelerated its quantum computing development roadmap, now targeting 2029
- Elon Musk responded humorously, noting quantum computers could help recover access to wallets with forgotten passwords
Researchers at Google have released a groundbreaking whitepaper demonstrating that quantum computers using architecture similar to their Willow chip could extract a Bitcoin private key from its corresponding public key in approximately nine minutes. Since Bitcoin transactions typically require about ten minutes for confirmation, this creates an alarmingly slim safety margin of just sixty seconds.
Within this brief timeframe, a malicious actor could potentially capture an active transaction from the mempool — where unconfirmed transactions await processing — before blockchain confirmation occurs. According to the research, such an attack would have a success probability approaching 41%.
The study, produced by Google Quantum AI, specifically targets the 256-bit Elliptic Curve Discrete Logarithm Problem (ECDLP), which forms the foundation of Bitcoin‘s cryptographic security. Earlier threat assessments relied on RSA-2048, an older encryption protocol, which led to considerably more optimistic timelines.
Perhaps most concerning is the dramatic reduction in computational resources required. Previous studies indicated that breaking Bitcoin’s cryptographic defenses would demand tens of millions of qubits. This latest research slashes that figure to under 500,000 — representing a staggering 20-fold decrease. The attack would need only 1,200 logical qubits operating at a 0.1% error rate.
Google has also reportedly accelerated its internal quantum computing development schedule, now aiming for 2029.
Independently, a research collective called Oratomic has published corroborating findings. Utilizing neutral-atom hardware and an alternative technical methodology, they demonstrated that Shor’s algorithm — the quantum technique employed to crack encryption — can function at cryptographically significant scales using between 10,000 and 22,000 qubits.
Two independent research teams. Two distinct hardware platforms. Both reaching remarkably similar conclusions.
The Challenge of Upgrading Bitcoin’s Security
Transitioning Bitcoin to post-quantum cryptographic standards isn’t a straightforward software patch. It necessitates a hard fork, which demands widespread consensus across the decentralized community — a process historically fraught with delays and disagreements in Bitcoin’s governance structure.
Post-quantum cryptographic signatures are significantly larger than existing signatures, which would increase bandwidth consumption, storage requirements, and computational overhead throughout the entire network infrastructure.
Even assuming rapid consensus, the actual migration process would span months. Given Bitcoin’s current transaction throughput, transferring all existing coins to quantum-resistant addresses — even if the network processed nothing else — would require several months at minimum.
Security experts caution that waiting until a cryptographically relevant quantum computer is publicly demonstrated — commonly referred to as “Q-Day” — would be catastrophically late. By that moment, digital signature security may already be fundamentally compromised.
Elon Musk’s Perspective
Elon Musk addressed the Google warnings on X, where his audience exceeds 237 million followers. He highlighted an unexpected “plus side” to quantum computing breaking Bitcoin: individuals who have lost their wallet passwords might eventually regain access to their funds.
His observation touches on a genuine issue — quantum computing capabilities sufficient to break cryptographic protections could equally unlock wallets that have remained inaccessible due to forgotten credentials.
The Google research paper carries the title “Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations.”


