Back to Blog
EducationOctober 18, 2025ยท7 min read

Quantum Computing and Its Impact on Cryptography

Quantum computers could break elliptic curve cryptography securing most wallets. We explain the threat timeline and post-quantum fixes.

Quantum computing poses a theoretical long-term threat to the cryptographic foundations of cryptocurrency. This is one of the most frequently misunderstood risks in crypto โ€” sometimes dismissed as science fiction, sometimes treated as an imminent crisis. A clear technical assessment is useful: what quantum computers can actually do, which cryptographic systems are vulnerable, what the timeline looks like, and what the crypto industry is doing to prepare.

The Cryptographic Basis of Blockchain Security

Bitcoin and most cryptocurrencies rely on two primary cryptographic primitives:

Elliptic Curve Digital Signature Algorithm (ECDSA) โ€” Used to create and verify cryptographic signatures. Your private key signs transactions; the corresponding public key verifies them. The security relies on the difficulty of the Elliptic Curve Discrete Logarithm Problem (ECDLP) โ€” computationally infeasible with classical computers.

SHA-256 (and related hash functions) โ€” Used in Bitcoin's Proof of Work mining and in generating wallet addresses from public keys. Hash functions are one-way: easy to compute in one direction, infeasible to reverse.

What Quantum Computers Could Break

Quantum computers threaten ECDSA specifically through Shor's Algorithm. Given a Bitcoin public key, a sufficiently powerful quantum computer running Shor's Algorithm could compute the corresponding private key โ€” potentially allowing an attacker to steal funds from any address whose public key has been revealed.

This is more specific than it sounds:

  • Exposed public keys โ€” In older Bitcoin address formats (P2PK) and reused addresses, the public key is visible on-chain. These addresses are vulnerable if quantum computers reach sufficient capability.
  • Unrevealed public keys โ€” Modern Bitcoin addresses (P2PKH, P2WPKH) reveal the public key only when a transaction is signed. An unused address is only derivable from a hash, not from an exposed public key. SHA-256 hashing is currently considered quantum-resistant.
  • Transaction window โ€” Even for modern addresses, when you broadcast a transaction, your public key is briefly exposed before inclusion in a block. A quantum computer fast enough to break ECDSA in seconds could theoretically attack during this window.

SHA-256 and similar hash functions are weakened but not broken by quantum computers (Grover's Algorithm provides a quadratic speedup, roughly halving the effective key length โ€” but doubling key size restores security).

The Timeline: Not Imminent

Breaking Bitcoin's current ECDSA security would require a quantum computer with approximately 1,500 logical qubits operating with low error rates (error-corrected physical qubits require hundreds of thousands of imperfect qubits for each logical qubit).

Current state of quantum computing (2025):

  • IBM's Heron processor: 156 qubits
  • Google's Willow chip: 105 qubits, demonstrated quantum advantage in a specific error correction task
  • Error rates: still far too high for practical Shor's Algorithm execution at scale

Most cryptography experts estimate 10-20+ years before quantum computers could threaten current Bitcoin cryptography at scale. This is speculative; quantum computing progress has historically been harder to predict than advocates claim.

Post-Quantum Cryptography

NIST (National Institute of Standards and Technology) completed a multi-year standardization process for post-quantum cryptographic algorithms in 2024. The selected standards:

  • CRYSTALS-Kyber โ€” For key encapsulation (asymmetric encryption)
  • CRYSTALS-Dilithium โ€” For digital signatures
  • FALCON โ€” For digital signatures (more compact but more complex)
  • SPHINCS+ โ€” Hash-based signature scheme, most conservative choice

These algorithms are believed to be secure against both classical and quantum computers. The Ethereum Foundation, Bitcoin Core developers, and other blockchain communities are monitoring standardization progress, with migration plans under discussion.

What Crypto Users Should Know

For individual crypto users today:

  • Quantum threat is not imminent โ€” there is time for the ecosystem to migrate
  • Using modern address formats (SegWit, Taproot for Bitcoin) provides somewhat better quantum resistance than old-format addresses by minimizing public key exposure time
  • Avoid reusing addresses โ€” each time you reuse an address, you extend the time your public key is exposed
  • The major blockchain protocols will migrate cryptographic algorithms as quantum threat approaches practical โ€” this is an ecosystem challenge, not one individual users must solve independently

The quantum computing risk to crypto is real on a long enough time horizon, but it is not a near-term crisis. The appropriate posture is awareness and confidence that protocol-level mitigations will be implemented with sufficient lead time.

Ready to swap privately?

No account required. Start in seconds.

Start swapping โ†’