Like most truly significant findings, the study was secretly published in March 2026. Not on a press trip. No blog post from an executive. This preprint, which was published on arXiv by Google Quantum AI and a few academic collaborators, has a dry technical title that indicates the writers are serious individuals writing for other serious people.
Three days later, when cryptocurrency Twitter finally caught up, the implication had already taken root in the rooms that mattered: Bitcoin’s quantum problem, which had long been dismissed as a cozy abstraction existing somewhere beyond 2040, had come closer. Much closer. When the old timings were no longer supported by the math, the protocol’s maintainers began acting with a level of urgency they hadn’t displayed in years.
| Quantum Threat to Bitcoin — Key Information | Details |
|---|---|
| Source of New Research | Google Quantum AI and collaborators |
| Publication Period | March–April 2026 |
| Previous Qubit Estimate | Millions of physical qubits |
| Revised Estimate | Fewer than 500,000 physical qubits |
| Resource Reduction Factor | Roughly 20x |
| Cryptography at Risk | Elliptic Curve Digital Signature Algorithm (ECDSA) |
| Bitcoin Network Reference | bitcoin.org |
| Vulnerable BTC Estimate | About 6.5–6.9 million BTC (~30% of supply) |
| Most Advanced Google Chip | “Willow” (105 qubits) |
| Cryptographically Relevant Quantum Timeline | Possibly 2029–2032 |
| Critical Attack Window | Roughly 9-minute transaction broadcast window |
| Industry Response | Post-Quantum Cryptography (PQC) adoption efforts |
| Bitcoin Improvement Proposal | BIP-360 (under active development) |
| Standards Body Reference | NIST Post-Quantum Cryptography |
| “Store Now, Decrypt Later” Risk | Adversaries archiving encrypted blockchain data |
When you sit with the headline figure, it’s powerful. According to earlier estimates, millions of physical qubits would be needed to crack Bitcoin’s elliptic curve cryptography. This kind of quantum hardware is so far off that most cryptographers considered it a challenge for future generations of academics. According to Google’s updated analysis, that number is less than 500,000. a decrease of about 20 times.
It does not imply that the machines are real. They don’t. Willow, Google’s most sophisticated chip, is just 105 qubits—many orders of magnitude less than what would be required. However, the course has changed. Depending on how quickly the research advances error correction over the coming years, what was formerly thought to be “decades away” is now perhaps within a 2029–2032 window for a cryptographically meaningful quantum computer.
The tone of the debate has shifted if you walk through any of the major Slack groups for Bitcoin developers right now. Until recently, the atmosphere was one of cautious patience. Between address format enhancements and Lightning Network optimizations, post-quantum cryptography was on the agenda. The edge is crisper now.
Active attention is being given to proposals like BIP-360, which had been silently moving through the review process. Migration routes are being sketched by wallet developers. Internal exercises are being conducted by custody businesses to simulate what a network-wide coordinated cryptography upgrade would look like. The society seems to have moved from theoretical curiosity to practical preparation.
Not all Bitcoin holdings are equally vulnerable. Between 6.5 and 6.9 million coins, or about 30% of all Bitcoin, are stored in addresses with public keys that are visible due to either past spending or the usage of outdated address formats that reveal the public key on-chain. In a future with quantum capabilities, those are the coins that are actually in danger.
Any list of vulnerable assets would start with the early Satoshi-era wallets because of their characteristic long-dormant holdings. The network’s anonymous founder is credited with about a million BTC, give or take. Those coins may be depleted in a matter of minutes if a sufficiently potent quantum computer ever came into being. The history of the most well-known Bitcoin holding takes on a new form.

Additionally, Google’s research revealed a roughly nine-minute assault window during a transaction broadcast, which the general public hasn’t completely comprehended. Before a Bitcoin transaction is fully verified, the public key is momentarily exposed on the network when it is signed and broadcast.
In theory, a sufficiently powerful quantum computer might obtain the private key at that time and use its own malicious version to front-run the transaction. It’s not a hypothetical exposure of nine minutes. It is a structural aspect of the spread of Bitcoin transactions. Changes in architecture, not only in cryptography, are necessary to solve that issue.
Then there’s the “store now, decrypt later” risk, which is the aspect that actually worries those who work in the field of adversarial scenarios. It’s possible that hostile actors, such as state spy agencies and highly skilled criminal organizations, are already storing encrypted blockchain data with the goal of decrypting it years from now when quantum hardware catches up to theory.
Data that has already been broadcast cannot be protected retrospectively. Moving susceptible holdings to quantum-resistant addresses prior to the capability’s arrival is the sole safeguard. The kind of governance difficulty that Bitcoin has never really been tested on is that migration across an asset class with millions of holders and no central coordinator.
The irony of the situation is difficult to ignore. For years, cryptocurrency detractors used quantum computing as a weapon without much technical foundation, and Bitcoin supporters typically responded by gently pointing out that the threat was real but far off. The fundamental truth that there is currently no quantum computer capable of breaking Bitcoin has not been altered by the Google study.
The timetable and the level of assurance surrounding it have altered. The need for the network to switch to post-quantum cryptography is no longer a question. Whether the shift occurs quickly enough and whether the early-era coins that contributed to the mythology of Bitcoin turn out to be its most costly vulnerability are the questions at hand.
