The Quantum Threat to Cryptocurrency is Closer Than You Think

Google has proven — via a zero-knowledge proof — that it possesses quantum circuits capable of breaking the cryptography protecting Bitcoin, Ethereum, and most major blockchains. Here's how it works.

The Scale of the Quantum Threat

Google Quantum AI's new resource estimates represent an order-of-magnitude improvement over the best prior work, bringing cryptographically relevant quantum computers (CRQCs) dramatically closer.

<500K
Physical Qubits Required
~9 min
Primed Attack Time
6.9M BTC
Currently Vulnerable
~41%
On-Spend Attack Success (BTC)

These figures assume superconducting hardware with 10-3 physical error rates and planar degree-4 connectivity — consistent with a scaled-up version of Google's experimentally demonstrated quantum processors.

Three Ways Quantum Computers Attack Blockchains

The paper classifies quantum attacks by execution speed and whether access to a CRQC is needed once or repeatedly.

Intercept Live Transactions

When a user broadcasts a transaction, their public key becomes visible in the mempool. A quantum attacker must derive the private key before the transaction is confirmed on-chain.

Time window: ~10 minutes (Bitcoin), ~12 seconds (Ethereum), ~400ms (Solana)

With a ~9 minute primed attack, Bitcoin transactions face a ~41% interception risk. The attacker can then forge a competing transaction with a higher fee.

VULNERABILITY BY BLOCK TIME

Bitcoin (10m)~41%
Litecoin (2.5m)~3%
Zcash (75s)<0.1%
Dogecoin (60s)<0.01%

Target Exposed Dormant Keys

Public keys recorded directly on the blockchain (e.g., P2PK, P2TR scripts) are permanently visible. The attacker has unlimited time to derive the private key.

Vulnerable: Over 1.7 million BTC locked by P2PK scripts (Satoshi-era coins). Total quantum-vulnerable BTC across all script types: ~6.9 million.

Keys hidden behind hash functions (P2PKH, P2WPKH) are immune to at-rest attacks as long as they haven't been reused for spending.

FAST-CLOCK vs SLOW-CLOCK

Fast-clock architectures (superconducting, photonic, silicon spin) have fast gates and short error correction cycles. At-rest and on-spend attacks become viable at roughly the same time.

Slow-clock architectures (neutral atom, ion trap) have 100-1000x slower operations. At-rest attacks become viable well before on-spend attacks.

Backdoor Protocol Parameters

Some protocols rely on "trusted setup" ceremonies that generate public parameters while discarding secret "toxic waste." A CRQC can recover this toxic waste, creating a reusable classical backdoor.

This is the most insidious attack: the quantum computation is done once, offline, and subsequent exploits use only classical computers.

Vulnerable: Ethereum's Data Availability Sampling, Tornado Cash, certain zk-rollups. Immune: Bitcoin (no trusted setup).

WHY ON-SETUP IS UNIQUELY DANGEROUS

1. One-time quantum cost — Break the trusted setup once

2. Reusable exploit — Classical backdoor works forever

3. Undetectable — Exploits look like valid transactions

4. Forge validity proofs — Create money, drain pools, bypass checks

Two Circuit Variants, One Devastating Result

The paper presents two optimized quantum circuits trading off qubit count against gate count. Toggle between them to explore the tradeoffs.

Low-Qubit
Low-Gate
1,200
Logical Qubits
90M
Toffoli Gates
~23 min
Full Solve Time
~12 min
Primed Attack

How Point Addition Scales to Full ECDLP

The Math: From Subroutine to Full Algorithm

The ZK proof attests to the cost of elliptic curve point addition — the core bottleneck. The full ECDLP algorithm cost follows from:

ECDLPToff = (PAToff + 3 × 2w) × (2n/w − 4)

ECDLPQubits = PAQubits + w

With optimal window size w=16 and n=256 bits, the algorithm performs 28 windowed point additions (2×256/16 − 4 = 28). This means:

Low-Qubit: (2,700,000 + 196,608) × 28 ≈ 81M Toffoli gates on 1,175+16 = 1,191 qubits

Low-Gate: (2,100,000 + 196,608) × 28 ≈ 64M Toffoli gates on 1,425+16 = 1,441 qubits

What Are Kickmix Circuits?

Kickmix circuits are a specific subclass of quantum circuits composed entirely of classical reversible logic gates, measurement-based uncomputation (MBUC) via Pauli-X basis measurements, and diagonal phasing gates. By restricting to this gate set, the circuits never generate intractable quantum entanglement and can be efficiently simulated classically.

This is crucial: it means the ZK proof verifier can simulate the circuit inside a classical virtual machine (the SP1 zkVM) without needing a quantum computer.

MBUC replaces the traditional approach of running the inverse circuit U† to clean up ancilla qubits (which would double gate costs). Instead, measuring in the X basis either cleanly disentangles the qubit (50% chance) or introduces a correctable phase kickback.

Physical Qubit Overhead

Logical qubits must be encoded in many physical qubits using quantum error correction (the surface code). The paper assumes:

  • Planar degree-4 connectivity (standard superconducting chip layout)
  • 10-3 physical error rates (demonstrated by Google experimentally)
  • Dense "yoke"-based qubit storage for efficient logical qubit packing
  • Reaction-limited execution at 10μs control system reaction time

Result: fewer than 500,000 physical qubits — a ~20x reduction over the best prior estimate of ~9 million (Litinski, 2023).

Proving the Circuit Exists — Without Revealing It

Publishing attack circuits would be irresponsible. Claiming results without evidence is unscientific. The solution: a cryptographic zero-knowledge proof via the SP1 zkVM and Groth16 SNARK.

What does the proof guarantee?

PROVEN

  • A specific circuit exists (committed via SHA-256)
  • It correctly computes secp256k1 point addition
  • Passes 9,024 random tests (≥99% correct)
  • Fits within claimed qubit and gate bounds

NOT PROVEN

  • That the circuit is optimal
  • That hardware exists to run it today
  • Any internal details of the circuit
Why 9,024 Tests Provide 128-bit Security

Shor's algorithm tolerates a small fraction of incorrect outputs. If ≤1% of inputs produce wrong results, the algorithm succeeds ≥99% of the time.

If the circuit were wrong on >1% of inputs, the probability it passes all 9,024 independent random tests is:

(1 − 0.01)9,024 ≈ 2−130

This is astronomically unlikely — equivalent to 130 bits of cryptographic security, exceeding the standard 128-bit threshold. The test inputs are derived from the circuit itself via the Fiat-Shamir heuristic (SHAKE256 seeded with the circuit bytes), preventing cherry-picking.

The Two Proof Statements

STATEMENT 1 Low-Qubit Variant

Non-Clifford Gates≤ 2,700,000
Logical Qubits≤ 1,175
Total Operations≤ 17,000,000
Tests Passed9,024 / 9,024
SHA-256:
0xcc8f532ffea1583ceed3c9af75de3263
ebaddd5fdf3cddfb3dea848b94d0396a

STATEMENT 2 Low-Gate Variant

Non-Clifford Gates≤ 2,100,000
Logical Qubits≤ 1,425
Total Operations≤ 17,000,000
Tests Passed9,024 / 9,024
SHA-256:
0x24f5758f2216aa87aa2806af32a0db78
8767b873cf6869510cca3d893b3f8a69
Shared Verification Key:
0x00ca4af6cb15dbd83ec3eaab3a0664023828d90a98e650d2d340712f5f3eb0d4

A practical irony: The Groth16 SNARK relies on pairing-friendly elliptic curves, making its soundness inherently vulnerable to the very quantum attacks analyzed in the paper. A sufficiently powerful quantum computer could forge this proof. However, since CRQCs do not yet exist, the proof's soundness remains intact today.

How the Zero-Knowledge Proof is Constructed

A multi-layered pipeline transforms "we have a good circuit" into a publicly verifiable cryptographic artifact — without leaking the circuit.

1

SHA-256 Commitment

The secret circuit is hashed to produce a unique digital fingerprint. This commits the prover to a specific circuit without revealing it.

2

Fiat-Shamir Test Generation

SHAKE256 extendable-output function is seeded with the circuit hash to deterministically generate 9,024 pseudo-random test inputs. The circuit determines its own tests — no cherry-picking possible.

3

Kickmix Simulation & Verification

The classically-simulable kickmix circuit is executed on all 9,024 test inputs. Each output is verified against the expected secp256k1 point addition result. Non-Clifford gates are counted.

4

Resource Bound Assertion

The program asserts that the circuit's qubit count and average Toffoli count satisfy the claimed upper bounds.

5

SP1 zkVM Arithmetization

The entire Rust program runs inside the SP1 RISC-V virtual machine. SP1 records every CPU cycle, divides execution into ~222-instruction shards, and generates a STARK proof per shard with recursive composition.

6

Groth16 SNARK Wrapper

The compressed STARK is wrapped in a Groth16 zk-SNARK, adding the zero-knowledge property (STARKs alone don't hide the witness in SP1) and producing a succinct, publicly verifiable proof.

Attack Success Calculator

Model the probability that a quantum attacker can break a key before a transaction is confirmed. Block mining follows an exponential distribution.

1 min60 min
0.5 min30 min
40.7%
Probability that the block takes longer than the attack
P = e−9/10 = 0.407

The Shrinking Cost of Breaking ECDLP

Resource estimates for quantum attacks on elliptic curve cryptography have dropped dramatically. "Attacks always get better."

2004
Proos & Zalka — ~6,000 logical qubits, trillions of gates
2017
Roetteler et al. — ~2,500 logical qubits, billions of Toffoli gates
2020
Häner et al. — ~2,300 logical qubits, further gate reductions
2023 (a)
Gouzien & Sangouard — ~2,000 logical qubits
2023 (b)
Litinski — ~2,500 qubits, ~200M Toffoli gates. ~9M physical qubits (photonic)
2026
Chevignard et al. — ~1,100 logical qubits but >100 billion Toffoli gates
2026 — This Work
Google Quantum AI — ≤1,200 qubits & 90M gates or ≤1,450 qubits & 70M gates. <500K physical qubits. ~10x improvement in spacetime volume.

Dive Deeper

Walk through the mathematics of the verification step by step in our interactive Jupyter notebook.