Will Quantum Computing Break Crypto?

Réponse Rapide

Quantum computing breaking Bitcoin's encryption by 2030 has approximately 5% probability — current quantum computers have 1,000-1,500 error-prone qubits while breaking Bitcoin's ECDSA-256 would require roughly 4,000 error-corrected logical qubits, equivalent to millions of physical qubits. NIST finalized post-quantum cryptography standards in 2024, and the Bitcoin network has a credible migration path before any realistic quantum threat materializes.

Évaluation de Probabilité

5%

Yes — Breaking Bitcoin ECDSA by 2030

Confidence: high

95%

No — unlikely

Confidence: high

Facteurs Clés

Current Qubit Count vs. Required Threshold

Négatifhigh

IBM's Heron processor achieved 133 physical qubits with improved error rates in late 2023; their roadmap targets 100,000 physical qubits by 2033. Google's Willow chip (2024) demonstrated 105 qubits with a landmark error correction milestone. However, breaking Bitcoin's secp256k1 elliptic curve via Shor's algorithm requires approximately 4,000 error-corrected logical qubits. The overhead ratio for current error correction codes (surface codes) requires roughly 1,000-10,000 physical qubits per logical qubit — meaning Bitcoin-threatening capability requires 4 million to 40 million physical qubits. At current roadmap trajectories, this is a 2040+ problem at earliest.

NIST Post-Quantum Cryptography Standards (PQC)

Mixtehigh

NIST finalized the first post-quantum cryptographic standards in August 2024: CRYSTALS-Kyber (ML-KEM) for key encapsulation, CRYSTALS-Dilithium (ML-DSA) for digital signatures, and SPHINCS+ (SLH-DSA) as a backup signature scheme. These algorithms are based on mathematical problems believed to be hard for both classical and quantum computers (lattice problems, hash-based signatures). The US government mandated federal agencies begin PQC migration planning immediately. Ethereum researchers and Bitcoin developers have both published quantum resistance upgrade proposals. The cryptography defense layer is well ahead of the quantum attack threat.

Shor's Algorithm vs. SHA-256 and ECDSA

Mixtehigh

Bitcoin uses two cryptographic primitives: SHA-256 for proof-of-work mining (Grover's algorithm could halve effective security to 128 bits — still computationally infeasible to attack) and ECDSA for transaction signatures (Shor's algorithm could theoretically break in polynomial time given sufficient qubits). The ECDSA signature scheme is the more vulnerable component — it exposes public keys at transaction broadcast time, giving a quantum attacker a brief window to derive private keys. Crucially, Bitcoin addresses are SHA-256 hashes of public keys until spending, providing one layer of quantum resistance for unspent coins that have never revealed their public key.

IBM, Google, and Competing Quantum Roadmaps

Mixtemedium

IBM's quantum roadmap targets 100,000 physical qubits by 2033 and outlines a path to error-corrected quantum advantage. Google's 2023 paper in Nature on qubit error correction showed a reduction in error rates as qubit count scaled — a crucial proof-of-concept for practical quantum computing. China's quantum program (USTC, through Jiuzhang and Zuchongzhi processors) is less transparent but reportedly well-funded, with 66-qubit systems demonstrated. Microsoft is pursuing topological qubits (announced breakthrough in 2025) which would offer inherently lower error rates if the approach scales, potentially accelerating timelines.

Bitcoin Network Upgrade Feasibility

Mixtemedium

Bitcoin's historically conservative upgrade process (requiring broad consensus among miners, developers, and node operators) is a double-edged sword for quantum resistance. SegWit (2017) and Taproot (2021) demonstrated the network can implement significant cryptographic changes. A quantum-resistant signature scheme (e.g., CRYSTALS-Dilithium) could be implemented via a similar soft fork, with a multi-year transition period. The Bitcoin development community has multiple active proposals (e.g., BIP-360) for post-quantum upgrade paths. The key question is whether Bitcoin's community can achieve consensus before quantum threat materializes — a governance risk rather than a technical one.

Cryptographically Relevant Quantum Computers (CRQC) Timeline

Mixtehigh

Security researchers use the term 'Cryptographically Relevant Quantum Computer' (CRQC) to describe a quantum system powerful enough to break current encryption. The US Department of Homeland Security, NSA, and GCHQ all published advisories in 2023-2024 projecting CRQC feasibility no earlier than the 2030s, with most estimates centering on 2035-2040. The 'harvest now, decrypt later' attack — where adversaries collect encrypted data today to decrypt once CRQC is available — is considered a real threat to long-lived secrets (government communications, long-term identity) but less relevant to time-limited cryptocurrency transactions.

Avis d'Experts

N(

NSA (National Security Agency)

2023-09
The NSA's Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) mandated federal agencies begin PQC migration immediately, with deadlines of 2025-2033 depending on system type. The advisory explicitly stated that 'the threat from a cryptographically relevant quantum computer is not imminent' but that migration timelines for large organizations require immediate planning. NSA's public posture suggests the agency's internal assessment places CRQC arrival at 2030s-2040s, not earlier.

Source: NSA (National Security Agency)

GQ

Google Quantum AI (Hartmut Neven)

2024-12
Neven, director of Google's quantum AI lab, described the December 2024 Willow chip milestone as demonstrating that quantum error rates decrease as chip scales — historically the opposite was true. He projected that practically relevant quantum advantage (outperforming classical computers on useful tasks) is achievable within the 2020s, though he was careful to distinguish 'quantum advantage' from 'breaking cryptography.' Neven's timeline is aggressive; most independent experts consider the jump from quantum advantage on specific tasks to CRQC capability substantial.

Source: Google Quantum AI (Hartmut Neven)

VB

Vitalik Buterin, Ethereum Co-founder

2024-03
Buterin published a detailed analysis on EIP-7560 (abstract accounts for quantum resistance) noting that Ethereum's account abstraction roadmap provides a natural migration path to post-quantum signatures. He assessed that Ethereum has years of runway before quantum threat is realistic and that a hard fork to quantum-resistant signatures, while disruptive, is technically feasible. He particularly noted that wallets that have never sent a transaction expose only their public key hash — not the underlying public key — providing meaningful quantum resistance for long-term holdings.

Source: Vitalik Buterin, Ethereum Co-founder

NC

NIST Computer Security Division

2024-08
NIST's finalization of ML-KEM, ML-DSA, and SLH-DSA represents the culmination of a 6-year competition involving 69 initial submissions from global cryptographers. The standards are designed to be conservative — providing security margins well beyond current quantum capabilities. NIST explicitly noted these standards are intended for systems protecting data with 30+ year sensitivity requirements, providing a substantial buffer against near-term quantum threats.

Source: NIST Computer Security Division

CA

Chinese Academy of Sciences Research Team

2023-01
A January 2023 paper caused alarm when Chinese researchers claimed RSA-2048 could be broken with only 372 qubits using a hybrid quantum-classical algorithm. Independent review found the paper made optimistic assumptions that did not hold under rigorous analysis — the algorithm likely requires millions of qubits in practice, consistent with prior estimates. The episode highlighted both the vigilance required in monitoring quantum advances and the risk of premature alarm from incompletely reviewed claims.

Source: Chinese Academy of Sciences Research Team

Contexte Historique

ÉvénementRésultat
Historical ContextPeter Shor's 1994 algorithm proved theoretically that a sufficiently powerful quantum computer could factor large integers in polynomial time — directly threatening RSA encryption. Lov Grover's 1996 algorithm demonstrated quadratic speedup for unstructured search, halving the effective security of s

Agir sur cette Analyse

Si vous croyez en la direction du marché crypto, voici les meilleures plateformes pour agir.

B
BC.Game

Bonus: 300% up to $20,000

C
Cloudbet

Bonus: 100% up to 5 BTC

B
Bitcasino

Bonus: 20% cashback on losses

S
Stake

Bonus: 200% up to $3,000

Questions Liées

Foire aux Questions

Breaking Bitcoin's ECDSA-256 signature scheme using Shor's algorithm would require approximately 4,000 fault-tolerant logical qubits. Given current error rates, achieving 4,000 logical qubits requires between 4 million and 40 million physical qubits (depending on error correction overhead). IBM's most advanced processor has 133 physical qubits (2024); their 2033 target is 100,000 physical qubits — still 40x below the low end of the requirement. The gap is enormous, and represents a hardware engineering challenge spanning multiple decades at current improvement rates.
Yes — the Quantum Resistant Ledger (QRL) uses XMSS (eXtended Merkle Signature Scheme) hash-based signatures, which are quantum-resistant by design. IOTA uses Winternitz One-Time Signatures, providing partial quantum resistance. Algorand and Cardano have published post-quantum roadmaps aligned with NIST PQC standards. Ethereum's account abstraction (EIP-4337) provides a path to quantum-resistant wallets. Bitcoin's Taproot upgrade introduced Schnorr signatures which are not quantum-resistant but provide other benefits; a BIP-360 proposal for quantum resistance exists in draft form.
No — there is zero practical quantum threat to Bitcoin wallets today. The largest quantum computers cannot factor numbers larger than 21, while Bitcoin keys involve 256-bit elliptic curve mathematics. Security agencies including NSA and GCHQ place meaningful quantum threat decades away. For practical security, the risks from weak passwords, phishing attacks, exchange hacks, and seed phrase exposure are orders of magnitude higher than quantum computing. The primary prudent action is to use a unique Bitcoin address for each transaction and never reuse addresses — standard hygiene that also minimizes quantum exposure.
18+Dernière mise à jour: 2026-04-09RTAuteur: Research TeamJeu Responsable

Cette analyse est à titre informatif et ne constitue pas un conseil financier. Les marchés de cryptomonnaies sont très volatils.

International