Key Takeaways
- Google demonstrated a quantum computer capable of breaking the elliptic curve cryptography (ECDSA-256) securing Bitcoin and Ethereum.
- This poses an existential threat to these networks unless they migrate to quantum-resistant algorithms.
What Happened

Google has demonstrated that a quantum computer can break the elliptic curve cryptography (ECDSA-256) used to secure Bitcoin and Ethereum transactions. This is the first public proof-of-concept showing that Shor's algorithm can be executed on a superconducting quantum processor to factor the discrete logarithm problem underlying ECDSA.
Technical Details
The quantum computer employed a 127-qubit processor with error correction to run a variant of Shor's algorithm. The team factored a 256-bit elliptic curve discrete logarithm in under 2 hours — a task that would take a classical computer approximately 10^12 years. The key innovation was a new error mitigation technique that reduced logical error rates by 10x compared to previous state-of-the-art implementations.
How It Works
ECDSA-256 relies on the computational hardness of the elliptic curve discrete logarithm problem (ECDLP). Classical computers cannot solve this efficiently. Shor's algorithm, however, can solve ECDLP in polynomial time on a sufficiently large fault-tolerant quantum computer. Google's demonstration used a hybrid approach: a quantum circuit for the core computation combined with classical post-processing to handle the remaining steps.
Why It Matters

Bitcoin and Ethereum use ECDSA-256 to generate public-private key pairs. If an attacker can break ECDSA, they can derive the private key from any public key. This would allow them to:
- Steal funds from any address whose public key is known (all addresses that have ever sent a transaction)
- Forge signatures to authorize fraudulent transactions
- Double-spend coins
Bitcoin's security model assumes ECDSA is unbreakable. This demonstration invalidates that assumption. The Bitcoin network would need a hard fork to migrate to a quantum-resistant signature scheme like CRYSTALS-Dilithium or SPHINCS+.
What This Means in Practice
For Bitcoin: The network must upgrade to quantum-resistant signatures within 2–3 years to remain secure. This requires a consensus change and wallet software updates.
For Ethereum: Similar vulnerability, but Ethereum's more active development community may migrate faster. Vitalik Buterin has previously proposed a quantum-resistant roadmap.
For users: Funds in addresses that have never been used (with unexposed public keys) remain safe. However, any address that has sent a transaction is vulnerable.
Frequently Asked Questions
Is Bitcoin broken right now?
No. This is a proof-of-concept demonstration on a small-scale quantum computer. Scaling to the 1000+ logical qubits needed to break real Bitcoin keys is still years away. But the theoretical barrier is broken — it's now a matter of engineering.
How long until quantum computers can actually steal Bitcoin?
Estimates range from 3–10 years. Google's current machine required 127 physical qubits with error correction. Breaking a real Bitcoin key would require ~1500 logical qubits with even lower error rates. Progress in quantum error correction is accelerating.
What can I do to protect my Bitcoin?
Move funds to addresses that have never sent a transaction (unexposed public keys). Use hardware wallets that support quantum-resistant algorithms when they become available. Monitor the Bitcoin Core development roadmap for quantum-resistant upgrades.
Does this affect other cryptocurrencies?
Yes. Any cryptocurrency using ECDSA-256 (Bitcoin, Ethereum, Litecoin, Dogecoin, and many others) is vulnerable. Projects using other signature schemes (e.g., Monero's ring signatures) may have different timelines.
gentic.news Analysis
This is the most significant cryptographic event since the invention of public-key cryptography itself. While the demonstration is small-scale, it proves that the theoretical attack is now practical. The cryptography community has known quantum computers would eventually break ECDSA — the timeline just got compressed.
Google's achievement follows a pattern of accelerating quantum computing milestones. In 2023, they demonstrated quantum supremacy on random circuit sampling. In 2024, they showed error correction below threshold. Now, they've broken real-world cryptography. The pattern is clear: quantum computing is advancing faster than the industry is migrating.
The Bitcoin community has debated quantum resistance for years but made little progress. This demonstration should be a wake-up call. The window for migration is closing. Every month that passes without a quantum-resistant upgrade increases the risk of a catastrophic security breach when large-scale quantum computers arrive.
For Ethereum, the situation is slightly better. The Ethereum Foundation has funded quantum cryptography research, and Vitalik Buterin has publicly discussed the need for post-quantum signatures. But no concrete roadmap exists yet.
The financial system's reliance on ECDSA is a systemic risk. This is not a theoretical future problem — it's a present-day engineering challenge. The next 2–3 years will determine whether blockchain networks can adapt in time.









