Key Takeaways
- Google’s Quantum AI division has determined that compromising Bitcoin requires significantly fewer qubits than earlier projections indicated.
- According to the research, under 500,000 physical qubits might be sufficient to compromise Bitcoin and Ethereum encryption systems.
- Two distinct attack approaches were identified, each requiring approximately 1,200 to 1,450 superior-quality qubits.
- A quantum computing system could execute a real-time transaction hijack in roughly nine minutes, according to Google’s analysis.
- There exists an estimated 41% probability of successfully intercepting a Bitcoin transfer prior to network confirmation.
In a significant disclosure, Google’s Quantum AI division has announced that quantum computing systems might compromise Bitcoin using substantially fewer qubits than previously thought. The research team released their conclusions through both a blog entry and comprehensive whitepaper on Monday. A portion of the vulnerability stems from Bitcoin’s Taproot modification implemented in 2021.
Quantum Computing Requirements for Bitcoin Attacks Now Lower
According to Google’s research team, malicious actors could potentially breach Bitcoin and Ethereum encryption mechanisms with under 500,000 physical qubits. This finding contradicts earlier assertions suggesting such operations would demand millions of qubits. The researchers emphasized that lower hardware requirements could shorten the timeline between experimental quantum systems and weaponized attacks.
The whitepaper outlined two distinct attack strategies requiring somewhere between 1,200 and 1,450 high-performance qubits. The research indicates that portions of the cryptographic algorithm could be computed in advance before executing a live attack. The final computational phase could be completed in approximately nine minutes using quantum hardware.
Given that Bitcoin network confirmations typically require around 10 minutes, researchers calculated a 41% success probability for fund redirection before transaction finalization. Ethereum networks may exhibit reduced vulnerability due to faster confirmation times, the study suggests.
The attack methodology involves continuous network monitoring for fresh Bitcoin transactions. During fund transfers, public keys become temporarily exposed. A sufficiently powerful quantum computer could extract the corresponding private key and reroute the cryptocurrency.
Google disclosed that zero-knowledge proof techniques were employed to validate their findings. The research team deliberately withheld detailed attack procedures from public documentation. This strategy enables independent verification while preventing the dissemination of exploit methodologies.
Bitcoin’s Taproot Enhancement Creates New Vulnerability Surface
Google’s analysis also investigated how Taproot altered Bitcoin’s fundamental address architecture. The Taproot upgrade delivered enhanced efficiency and transaction privacy upon its 2021 deployment. Yet it simultaneously introduced default public key visibility on the blockchain ledger.
Previous-generation Bitcoin address formats kept public keys hidden until wallet owners initiated spending transactions. Taproot eliminated this protective layer by revealing keys during routine operations. This architectural modification potentially expands the number of wallets susceptible to quantum attacks.
The research estimates approximately 6.9 million Bitcoin currently reside in wallets with publicly visible keys. This represents roughly one-third of Bitcoin’s entire circulating supply. The total includes approximately 1.7 million Bitcoin generated during the network’s initial mining period.
The analysis incorporated funds impacted by common address reuse behaviors. By comparison, CoinShares recently calculated that merely 10,200 Bitcoin exist in heavily concentrated wallet addresses. Google’s vulnerability assessment therefore substantially exceeds previous public calculations.
Google has historically projected 2029 as a potential timeframe for practical quantum computing systems. The latest research suggests necessary computational capabilities may materialize sooner than earlier forecasts predicted. Both the whitepaper and accompanying blog post were released on Monday.
