{"id":907396,"date":"2026-05-21T12:22:20","date_gmt":"2026-05-21T17:22:20","guid":{"rendered":"https:\/\/newsycanuse.com\/index.php\/2026\/05\/21\/9-minutes-to-crack-a-bitcoin-wallet-how-real-is-the-quantum-threat\/"},"modified":"2026-05-21T12:22:20","modified_gmt":"2026-05-21T17:22:20","slug":"9-minutes-to-crack-a-bitcoin-wallet-how-real-is-the-quantum-threat","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2026\/05\/21\/9-minutes-to-crack-a-bitcoin-wallet-how-real-is-the-quantum-threat\/","title":{"rendered":"9 Minutes to Crack a Bitcoin Wallet: How Real Is the Quantum Threat?"},"content":{"rendered":"<p>Bitcoins <\/p>\n<div>\n<p><span>On March 30, 2026, Google Quantum AI published a <\/span><a href=\"https:\/\/quantumai.google\/static\/site-assets\/downloads\/cryptocurrency-whitepaper.pdf\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\"><span>new whitepaper<\/span><\/a><span> revealing that a theoretical quantum computer could derive a private key from a public key on the <a href=\"https:\/\/nftevening.com\/bitcoin-miners-19k-loss-btc-exchange-inflows-ai-pivot\/\" data-wpel-link=\"internal\">Bitcoin<\/a> network in just a few minutes. This timeframe closely aligns with Bitcoin\u2019s 10-minute mining cycle, raising the scenario of an \u201cOn-Spend Attack\u201d where a transaction pending confirmation could be intercepted and replaced.<\/span><\/p>\n<p><span>Additionally, Google experts recommended that blockchain projects complete their migration to Post-Quantum Cryptography (PQC) before 2029 to safeguard digital signatures and transactions against sufficiently powerful future quantum computers.<\/span><\/p>\n<h2>Bitcoins <span id=\"Understanding_the_Quantum_Threat\"><\/span><b>Understanding the Quantum Threat<\/b><span>\u00a0<\/span><span><\/span><\/h2>\n<p><span>The research illustrates a scenario in which quantum computers could compromise the core security mechanisms of Bitcoin and Ethereum. Instead of a direct attack on the wallet, this method targets the public key\u2014which becomes visible on the blockchain during a transaction\u2014to derive the private key, the ultimate factor controlling the assets.<\/span><\/p>\n<p><span>Current security relies on cryptographic problems considered nearly impossible for classical computers to solve, but which could be significantly accelerated by quantum systems. According to Google\u2019s estimates, a theoretical quantum system could perform this calculation using approximately <\/span><b>1,200\u20131,450 logical qubits<\/b><span> and <\/span><b>70\u201390 million Toffoli<\/b><span> gates, with a total physical qubit count under <\/span><b>500,000 physical<\/b><span>\u2014substantially lower than previous projections. These estimates were validated using the Zero-Knowledge Proof (ZKP) method.<\/span><\/p>\n<p><span>In architectures utilizing superconducting systems, execution time could be reduced to mere minutes. This is particularly critical because public keys are typically exposed only during the transaction process, creating a narrow window of vulnerability where assets could be exploited if the private key is derived rapidly enough.<\/span><\/p>\n<p><span>However, the research emphasizes that quantum computers with sufficient power to execute this scenario do not yet exist, and current estimates reflect capabilities under theoretical conditions.<\/span><\/p>\n<h2>Bitcoins <span id=\"Inside_Bitcoins_10-Minute_Window\"><\/span><b>Inside Bitcoin\u2019s 10-Minute Window<\/b><span>\u00a0<\/span><span><\/span><\/h2>\n<p><span>A primary scenario highlighted in the report is the \u201c<\/span><b>On-Spend Attack<\/b><span>,\u201d targeting transactions pending in the network\u2019s mempool. Once a public key is broadcast after a transaction is initiated, a theoretical quantum system could attempt to derive the private key before the next block is confirmed.<\/span><\/p>\n<p><span>With the Bitcoin network\u2019s average confirmation time of 10 minutes, a \u201cwaiting window\u201d is created, allowing an attacker to compete directly with the original transaction. If the calculation is completed in time, they could broadcast a replacement transaction with a higher fee to ensure priority inclusion in the block.<\/span><\/p>\n<div id=\"attachment_161765\">\n<p><img title=\"bitcoins\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-161765\" src=\"https:\/\/nftevening.com\/wp-content\/uploads\/2026\/04\/Race-Against-the-Block-Attack-Speed-vs.-Network-Variance.png\" alt=\"bitcoins Race Against the Block: Attack Speed vs. Network Variance\" width=\"1452\" height=\"700\"><\/p>\n<p id=\"caption-attachment-161765\">Race Against the Block: Attack Speed vs. Network Variance. Source: Google<\/p>\n<\/div>\n<p><span>Consequently, the success of such an intervention is strictly tied to the duration of this window. Blockchains with shorter block times, such as Litecoin (approx. 2.5 minutes), Zcash (75 seconds), or Dogecoin (1 minute), significantly narrow the operational timeframe for an attacker.<\/span><\/p>\n<p><span>However, these estimates assume a non-congested network. In practice, an attacker could intentionally spike fees or flood the mempool to increase the probability of their fraudulent transaction being prioritized for confirmation.<\/span><\/p>\n<h2>Bitcoins <span id=\"The_Hardware_Gap_%E2%80%94_and_the_Race_to_PQC\"><\/span><b>The Hardware Gap \u2014 and the Race to PQC<\/b><span>\u00a0<\/span><span><\/span><\/h2>\n<p><span>While estimates show a significant reduction in attack execution time, a cryptanalytically relevant quantum computer (CRQC) does not yet exist. Only specific quantum architectures, such as superconducting systems, can potentially reach the speeds required for fast-attack scenarios, while other systems remain limited by processing constraints.<\/span><\/p>\n<p><span>In a March 25, 2026 <\/span><a href=\"https:\/\/blog.google\/innovation-and-ai\/technology\/safety-security\/cryptography-migration-timeline\/\" data-wpel-link=\"external\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\"><span>announcement<\/span><\/a><span>, Heather Adkins, VP of Security Engineering at Google, and Sophie Schmieg, Senior Staff Cryptography Engineer, stated that the company aims to complete its transition to <\/span><b>Post-Quantum Cryptography (PQC)<\/b><span> by 2029. This move is designed to protect encryption and digital signatures from future quantum-enabled adversaries.<\/span><\/p>\n<p><span>This transition is vital for authentication systems and digital signatures\u2014the backbone of blockchain transactions. During this period, short-term mitigations include restricting address reuse and minimizing public key exposure.<\/span><\/p>\n<h2>Bitcoins <span id=\"Not_All_Risks_Are_Equal\"><\/span><b>Not All Risks Are Equal<\/b><span><\/span><\/h2>\n<h3><span id=\"Wallet_Exposure\"><\/span><b>Wallet Exposure<\/b><span>\u00a0<\/span><span><\/span><\/h3>\n<p><span>The actual impact of the quantum threat varies across different wallet types, depending on whether the public key has been previously exposed on the blockchain.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Vulnerable Wallets:<\/b><span> These include legacy P2PK (Pay-to-Public-Key) addresses or wallets practicing address reuse, where the public key is already publicly available.<\/span><\/li>\n<li aria-level=\"1\"><b>Lower-Risk Wallets:<\/b><span> Modern formats such as P2PKH (Pay-to-Public-Key-Hash) or Taproot offer better protection, as the public key is hashed and only revealed at the moment of spending.<\/span><\/li>\n<\/ul>\n<h3><span id=\"System-Level_Risks\"><\/span><b>System-Level Risks<\/b><span>\u00a0<\/span><span><\/span><\/h3>\n<p><span>For Bitcoin, the risk is concentrated in \u201cdormant\u201d addresses with exposed public keys that are no longer active. An estimated <\/span><b>1.7\u20132.3 million BTC<\/b><span> fall into this category. If exploited, this massive volume of assets could re-enter the market, creating significant pressure on the circulating supply.<\/span><\/p>\n<p><span>On Ethereum, the impact is broader due to the ecosystem\u2019s reliance on smart contracts and administrative keys. Approximately <\/span><b>20.5 million ETH <\/b><span>in large wallets have exposed public keys, while admin keys for stablecoins, bridges, and oracles could represent critical points of failure if compromised.<\/span><\/p>\n<p><span>Under Ethereum\u2019s <\/span><b>Proof-of-Stake<\/b><span><strong> (PoS)<\/strong> mechanism, controlling more than one-third of the staked ETH could disrupt finalization, while a two-thirds threshold allows for control of the consensus mechanism. If validator private keys are compromised, these thresholds become targets, elevating the risk from individual wallets to the entire network infrastructure.<\/span><\/p>\n<h2>Bitcoins <span id=\"Conclusion\"><\/span><b>Conclusion<\/b><span>\u00a0<\/span><span><\/span><\/h2>\n<p><span>The Bitcoin network is not currently under direct attack, as sufficiently powerful quantum hardware remains a future development. However, new estimates show that the gap between attack capability and transaction processing time is closing, gradually eroding the system\u2019s safety margins.<\/span><\/p>\n<p><span>Similar risks extend to Ethereum and other blockchain platforms, where the attack surface is larger due to complex smart contract infrastructures. In this landscape, transitioning to Post-Quantum Cryptography (PQC) has become an essential step in securing digital signatures and blockchain integrity for the long term.<\/span><\/p>\n<\/div>\n<p> Tyisha Mongold <a href=\"https:\/\/nftevening.com\/9-minutes-crack-bitcoin-wallet-how-real-quantum-threat\/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=9-minutes-crack-bitcoin-wallet-how-real-quantum-threat\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On March 30, 2026, Google Quantum AI published a new whitepaper revealing that a theoretical quantum computer could derive a private key from a public key on the Bitcoin network in just a few minutes. This timeframe closely aligns with Bitcoin\u2019s 10-minute mining cycle, raising the scenario of an \u201cOn-Spend Attack\u201d where a transaction pending<\/p>\n","protected":false},"author":1,"featured_media":907397,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27444,1276],"tags":[11476],"class_list":{"0":"post-907396","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-crack","8":"category-minutes","9":"tag-bitcoins"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/907396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=907396"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/907396\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/907397"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=907396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=907396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=907396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}