Back to News
quantum-computing

Google Suggests Quantum Attacks on Cryptocurrency Encryption May Require Fewer Resources

Quantum Daily
Loading...
5 min read
0 likes
⚡ Quantum Brief
Google researchers warn that breaking elliptic curve cryptography—foundational to blockchain security—may require fewer than 1,200 logical qubits, a tenfold reduction from prior estimates, accelerating threats to cryptocurrencies and digital signatures. Optimized Shor’s algorithm implementations could execute attacks in minutes using ~500,000 physical qubits, enabling "on-spend" (real-time transaction interception) and "at-rest" (dormant wallet) exploits, though no such quantum systems exist yet. The study avoids publishing attack blueprints, using zero-knowledge proofs to verify findings without exposing methods, setting a precedent for responsible disclosure in quantum cryptanalysis research. Post-quantum cryptography (PQC) is urged as the long-term fix, but transitioning blockchains faces hurdles: decentralized coordination, higher costs, and irreversible vulnerabilities in dormant wallets with exposed keys. While no immediate risk exists, researchers stress the shrinking timeline for mitigation, urging proactive upgrades to cryptographic standards before quantum hardware advances outpace defensive measures.
Google Suggests Quantum Attacks on Cryptocurrency Encryption May Require Fewer Resources

Summarize this article with:

Insider BriefGoogle researchers report that breaking the cryptographic systems underpinning most cryptocurrencies could require significantly fewer quantum resources than previously estimated, raising new urgency for a transition to post-quantum security standards.According to the white paper released March 30 by Google Quantum AI, improved methods for compiling quantum algorithms reduce the scale of hardware needed to compromise widely used elliptic curve cryptography, a core component of blockchain security. The findings suggest that the threshold for so-called cryptographically relevant quantum computers may be closer than earlier estimates indicated.In a blog post on the results, the team writes: “We want to raise awareness on this issue and are providing the cryptocurrency community with recommendations to improve security and stability before this is possible, including transitioning blockchains to post-quantum cryptography (PQC), which is resistant to quantum attacks.”The study focuses on the 256-bit elliptic curve discrete logarithm problem, which serves as the backbone for digital signatures used across cryptocurrencies, secure communications and authentication systems.According to the researchers, optimized implementations of Shor’s algorithm could solve this problem using fewer than 1,200 logical qubits and tens of millions of quantum gate operations. In an alternative configuration, the team reports that a similar computation could be achieved with slightly more qubits but fewer gate operations.The researchers reported that these improvements represent roughly an order-of-magnitude reduction in the combined computational resources required compared with prior work. This continues a broader trend in quantum computing, where algorithmic refinements steadily lower the hardware requirements needed to perform useful tasks.The paper further estimates that such computations could run on fewer than 500,000 physical qubits under standard assumptions about error correction and hardware performance. According to the researchers, this could allow the attack to be completed in minutes on a sufficiently advanced quantum system.While such machines do not yet exist, the researchers argue that the shrinking resource estimates reduce the perceived buffer between current quantum capabilities and systems that could threaten existing cryptography.Most blockchain systems rely on elliptic curve cryptography to secure transactions and verify ownership. According to the white paper, this creates a systemic vulnerability once large-scale quantum computers become available.The researchers describe several potential attack models. “On-spend” attacks target transactions in flight, where an attacker derives a private key quickly enough to redirect funds before a transaction is confirmed. “At-rest” attacks, by contrast, target wallets with exposed public keys, particularly those that reuse addresses or remain inactive over long periods.According to the researchers, fast quantum computing architectures — such as superconducting or photonic systems — could enable on-spend attacks within typical blockchain confirmation times. Slower architectures, including ion traps and neutral atom systems, would likely first enable at-rest attacks, where attackers have more time to extract keys.The white paper also outlines broader risks across modern blockchain systems. According to the researchers, features such as smart contracts, proof-of-stake consensus and data availability mechanisms expand the attack surface beyond simple transaction signing.At the same time, the researchers note that some components of blockchain systems remain resistant to quantum attacks. For example, they report that Bitcoin’s proof-of-work mechanism is not directly vulnerable to the same class of quantum algorithms that threaten digital signatures.The study adopts a nontraditional approach to disclosure. Rather than publishing detailed quantum circuits that could serve as a blueprint for attacks, the researchers report that they used a zero-knowledge proof to validate their results.According to the researchers, this allows independent verification of the resource estimates without revealing the specific techniques needed to carry out an attack. The approach reflects what the team describes as a shift toward responsible disclosure in quantum cryptanalysis.The white paper indicates that overstating or understating quantum risks can both create problems. According to the researchers, inflated claims can undermine confidence in digital systems, while overly conservative estimates may delay necessary security upgrades.The researchers present post-quantum cryptography as the primary long-term solution. According to the white paper, these cryptographic systems are designed to resist both classical and quantum attacks and are already being tested in some blockchain and internet applications.However, the transition is expected to be complex with the researchers reporting that moving entire blockchain ecosystems to new cryptographic standards will require coordination across decentralized communities, updates to protocols, and acceptance of higher computational costs.The paper outlines several interim measures. According to the researchers, reducing public key exposure, avoiding address reuse and implementing protective transaction mechanisms could help mitigate risks in the near term.A particularly difficult issue involves dormant digital assets. According to the white paper, wallets with exposed public keys that are no longer actively managed cannot be upgraded to new cryptographic standards. The researchers note that a significant portion of cryptocurrency holdings fall into this category, creating a long-term vulnerability.The study does not provide a definitive timeline for when quantum computers will reach the required scale. Instead, the researchers emphasize that both hardware advances and algorithmic improvements are steadily reducing the gap.According to the white paper, the combination of improved algorithms, more efficient error correction and ongoing hardware development suggests that preparations for a post-quantum transition should begin immediately.The broader implication is not that current systems are imminently at risk, but that the window for proactive mitigation may be shorter than previously assumed. According to the researchers, aligning technical, policy, and industry responses will be critical to maintaining trust in digital infrastructure as quantum computing progresses.The researchers write: “With this work, our goal is to support the long-term health of the cryptocurrency ecosystem and blockchain technologies, which are an increasingly significant part of the digital economy. Moving forward, we hope our approach to responsible disclosure can spur an important conversation among quantum computing researchers and the broader public, and offer a model on which to build for the quantum cryptanalysis research field.”Share this article:Keep track of everything going on in the Quantum Technology Market.In one place.

Read Original

Tags

quantum-machine-learning
quantum-algorithms
quantum-cryptography
google

Source Information

Source: Quantum Daily