Live News ›

Quantum Threat Accelerates: 10,000 Qubits Could Break Crypto Encryption

TECH
Whalesbook Logo
AuthorKavya Nair|Published at:
Quantum Threat Accelerates: 10,000 Qubits Could Break Crypto Encryption
Overview

New research indicates quantum computers require as few as 10,000 physical qubits to break the encryption safeguarding Bitcoin and Ethereum wallets. This drastically reduces previous estimates, signaling an urgent need for the cryptocurrency industry to transition to quantum-resistant platforms before vulnerabilities become cost-effectively exploitable.

Quantum Computing Threat Evolves

The research, posted Monday to the arXiv preprint server, specifically targets Elliptic Curve Cryptography (ECC-256), the standard that secures Bitcoin and Ethereum. Researchers suggest a quantum system with approximately 10,000 physical qubits could break this encryption, a significant drop from prior estimations that often ran into hundreds of thousands. This compression of required resources accelerates the potential timeline for attacks, enabling attackers to derive private keys and seize control of digital assets potentially within days.

Breaking Encryption Standards

Under the paper's assumptions, a system with around 26,000 qubits could theoretically break ECC-256 in about 10 days. While RSA-2048, a standard used by many financial institutions for Web2 platforms, requires more qubits (estimated at 102,000 for a similar attack within three months), it is also facing eventual vulnerability. Elliptic curve cryptography is more susceptible due to its smaller key sizes achieving comparable security, making it a more accessible target for quantum machines.

Industry Response and Caveats

This development marks one of the sharpest compressions yet in the projected timeline for quantum threats. Estimated qubit requirements for Shor's algorithm, the method for breaking public-key encryption, have fallen dramatically over two decades. The findings come with a caveat: all nine authors are shareholders in Oratomic, and six are employed by the company, suggesting the research may also serve as a roadmap for their hardware approach. The core question now shifts from 'if' quantum systems can break crypto, to 'when' and 'if' the industry can migrate to quantum-resistant platforms before the cost of securing assets collapses.

Broader Implications

While the rapid 'on-spend' attack of cracking a key in minutes is unlikely under these specific assumptions, the long-term risk to funds in existing vulnerable addresses remains significant. Millions of Bitcoin are tied to early or reused addresses that could be targeted. The focus is increasingly on the migration to quantum-resistant cryptographic solutions.

Disclaimer:This content is for informational purposes only and does not constitute financial or investment advice. Readers should consult a SEBI-registered advisor before making decisions. Investments are subject to market risks, and past performance does not guarantee future results. The publisher and authors are not liable for any losses. Accuracy and completeness are not guaranteed, and views expressed may not reflect the publication’s editorial stance.