Quantum Threats to Bitcoin — Part 1
Bitcoin’s security is based on hard math.
Quantum computers break that assumption.
Let’s walk through how visually.
Bitcoin’s Security is Based on Math
Bitcoin uses math (ECDSA, secp256k1, ..) to protect your coins.
So far, no one can break it…
So far, no one can break it…
1- But Quantum Breaks That Math
Quantum computers can punch through math-based defenses.
What’s hard for your laptop becomes easy for a quantum machine.
What’s hard for your laptop becomes easy for a quantum machine.
2- Classical Computers Use Bits
Bits can only be 0 or 1.
All computations are done one step at a time.
All computations are done one step at a time.
3- Quantum Computers Use Qubits
Qubits can be 0, 1, or both.
This allows quantum computers to do things in parallel (a massive leap in speed)
This allows quantum computers to do things in parallel (a massive leap in speed)
5- Parallelism Changes Everything
Classical = tries one possibility at a time.
Quantum = tries all possible combinations simultaneously.
Quantum = tries all possible combinations simultaneously.
🔐 What Does This Have to Do with Bitcoin?
Bitcoin uses elliptic curve cryptography (ECC).
Private key
Private key
k
, public key P = k*G
.🔁 ECC Is Easy One Way, Hard the Other
Easy: k → P
Hard: P → k
This asymmetry protects your Bitcoin.
Hard: P → k
This asymmetry protects your Bitcoin.
🕳️ Brute Force Takes Forever
A normal computer would need ~10³⁸ operations to go from public key → private key.
That’s trillions of years.
That’s trillions of years.
🧠 Pollard’s Rho: The Best Classical Attack
Right now, attackers try all keys one-by-one.
The best known method is Pollard’s rho (still slow)
The best known method is Pollard’s rho (still slow)
💥 Shor’s Algorithm Changes That
Quantum computers can run Shor’s algorithm, which breaks ECC.
It only takes around 10⁶ steps.
It only takes around 10⁶ steps.
Classical: “Trillions of years”
Quantum: “Hours to days”
🚨 When You Spend BTC, You’re Vulnerable
When you spend, your public key is revealed.
A CRQC could see it, extract your private key, and steal your funds.
A CRQC could see it, extract your private key, and steal your funds.
📉 20–50% of All Bitcoin at Risk
“Roughly 4–10 million BTC could be stolen if CRQCs arrive.”
— Last Chaincode Labs report on "Bitcoin and Quantum Computing"
🕰️ When Will They Arrive?
Experts give a 50% chance we’ll see quantum computers that can break ECC by 2030–2035.
NIST plans to ban ECC by 2035.
NIST plans to ban ECC by 2035.
🔜 Next Up
Script Types and Their Quantum Vulnerability (P2PK, P2PKH, P2TR, etc.)
🧡 Stay Updated
We’ll be sharing more visual explainers on quantum threats, Bitcoin script vulnerabilities, and post-quantum proposals.
Follow @Bitcoin_Devs to stay in the loop.
Inspired by the Chaincode Research Report on Quantum Threats to Bitcoin.