Quantum computing is moving from theory to practice, and a new whitepaper warns that major cryptocurrencies need to react much faster than they have so far. The study shows that once a powerful enough quantum computer exists, it could break the cryptography behind Bitcoin, Ethereum and other chains in minutes, putting both long‑dormant and active assets at risk.
Singapore Summit: Meet the largest APAC brokers you know (and those you still don't!)
Google Quantum AI released a whitepaper, warning that around 2.3 million dormant, vulnerable BTC could become a multi‑billion‑dollar prize the moment a powerful quantum machine comes online.
- Options Technology Introduces Quantum Computing Into Market Infrastructure Behind FX and CFDs
- Banks Prepare for a Quantum Cypherpunk Future
- Quantum Computing and Payment Security
Simply, this new research says that once powerful quantum computers arrive, they will be able to “guess” some old Bitcoin keys fast enough to move coins that nobody can currently access, turning a huge pool of forgotten BTC into a prize for whoever gets the technology first.
Google Quantum AI released a whitepaper warning that cracking 256-bit ECC, widely used in crypto wallets, requires fewer resources than expected. With under 500k physical qubits, it could be cracked in minutes. Google urged the industry to accelerate its migration to Post-Quantum… pic.twitter.com/DpdSPmYhYc
— Wu Blockchain (@WuBlockchain) March 31, 2026
Dormant Bitcoin as a Quantum Time Bomb
Technically, the paper estimates that a future “fast‑clock” quantum computer with fewer than 500,000 physical qubits could use Shor’s algorithm to break Bitcoin’s 256‑bit elliptic curve in about nine minutes from a primed state.
That speed is comparable to Bitcoin’s average 10‑minute block time, meaning an attacker could potentially intercept some pending transactions and redirect funds before they confirm.
Read more: Quantum Computing and Payment Security
Google’s team showed, on paper, that you no longer need a sci‑fi‑level quantum supercomputer to break the math that protects Bitcoin and Ethereum. You “just” need a realistically sized, next‑generation machine, and once that exists an attacker could watch the network, grab your public key while your transaction sits waiting to be confirmed, and mathematically recover your private key fast enough to steal the coins before they hit a block.
Vitalik Buterin warned at the Devconnect conference that elliptic curve cryptography could be broken by quantum computing before the 2028 U.S. presidential election, urging Ethereum to upgrade to quantum-resistant cryptography within four years. He also stated that future…
— Wu Blockchain (@WuBlockchain) November 19, 2025
Industry Outlook: From FUD to Forced Migration
The whitepaper argues that full migration to post‑quantum cryptography is technically clear but politically and operationally difficult. Post‑quantum signatures are larger and heavier, so upgrades would raise bandwidth and storage needs and almost certainly reopen old governance fights, especially in Bitcoin.
“Pull your cryptographic inventory. Flag every ECC-256 implementation on high-value assets. Identify every system where the algorithm is hardcoded rather than configurable. Those are your agility gaps and your longest-lead-time risk,” commented Cory Missimore, AI Governance expert.
At the same time, leaving dormant assets untouched invites a race between criminals, states and possibly regulated “digital salvage” operators seeking legal rights to recover and liquidate compromised coins.
Interestingly, Ethereum co-founder, Vitalik Buterin, shares similar views. He recently told developers that the kind of cryptography Ethereum uses today might be breakable by quantum computers sooner than many expect, possibly even before the 2028 U.S. election, so the network should move to quantum‑resistant cryptography within about four years.
At the same time, he argued that most new experimentation should happen on Layer 2s, in wallets and in privacy tech, while keeping the base layer as simple and stable as possible.