CryptoMediaClub
Friday, December 19, 2025
  • All news
  • Bitcoin
  • Ethereum
  • Altcoins
  • NFT
  • Blockchain
  • Analysis
  • en English
    • ar العربية
    • zh-CN 简体中文
    • cs Čeština‎
    • nl Nederlands
    • en English
    • et Eesti
    • fr Français
    • de Deutsch
    • iw עִבְרִית
    • it Italiano
    • ja 日本語
    • ko 한국어
    • lv Latviešu valoda
    • pl Polski
    • pt Português
    • ru Русский
    • sk Slovenčina
    • es Español
    • sv Svenska
    • uk Українська
No Result
View All Result
  • All news
  • Bitcoin
  • Ethereum
  • Altcoins
  • NFT
  • Blockchain
  • Analysis
  • en English
    • ar العربية
    • zh-CN 简体中文
    • cs Čeština‎
    • nl Nederlands
    • en English
    • et Eesti
    • fr Français
    • de Deutsch
    • iw עִבְרִית
    • it Italiano
    • ja 日本語
    • ko 한국어
    • lv Latviešu valoda
    • pl Polski
    • pt Português
    • ru Русский
    • sk Slovenčina
    • es Español
    • sv Svenska
    • uk Українська
No Result
View All Result
CryptoMediaClub
No Result
View All Result
Home Analysis

Bitcoin encryption isn’t at risk from quantum computers for one simple reason: it doesn’t actually exist

19.12.2025
A A
0
118
VIEWS
ShareShare

Contrary to popular belief, quantum computers will not “crack” Bitcoin encryption; instead, any realistic threat would focus on exploiting digital signatures tied to exposed public keys.

Quantum computers cannot decrypt Bitcoin because it stores no encrypted secrets on-chain.

Ownership is enforced by digital signatures and hash-based commitments, not ciphertext.

The quantum risk that matters is the risk of authorization forgery.

If a cryptographically relevant quantum computer can run Shor’s algorithm against Bitcoin’s elliptic-curve cryptography, it could derive a private key from an on-chain public key and then produce a valid signature for a competing spend.

Much of the “quantum breaks Bitcoin encryption” framing is a terminology error. Adam Back, longtime Bitcoin developer and Hashcash inventor, summed it up on X:

“pro-tip for quantum FUD promoters. bitcoin does not use encryption. get your basics right or it's a tell.”

A separate post made the same distinction more explicitly, noting that a quantum attacker would not “decrypt” anything, but would instead use Shor’s algorithm to derive a private key from an exposed public key:

“Encryption refers to the act of hiding information so only those with a key can read it. Bitcoin doesn't do this. The blockchain is a public ledger; so anyone can see every transaction, every amount, and every address. Nothing is encrypted.”

Why public-key exposure, not encryption, is Bitcoin’s real security bottleneck

Bitcoin’s signature systems, ECDSA and Schnorr, are used to prove control over a keypair.

In that model, coins are taken by producing a signature that the network will accept.

That is why public-key exposure is the pivot.

Whether an output is exposed depends on what appears on-chain.

Many address formats commit to a hash of a public key, so the raw public key is not revealed until the transaction is spent.

That narrows the window for an attacker to compute a private key and publish a conflicting transaction.

Other script types expose a public key earlier, and address reuse can turn a one-time reveal into a persistent target.

Project Eleven’s open-source “Bitcoin Risq List” query defines exposure at the script and reuse level.

It maps where a public key is already available to a would-be Shor attacker.

Why quantum risk is measurable today, even if it isn’t imminent

Taproot changes the exposure pattern in a way that matters only if large fault-tolerant machines arrive.

Taproot outputs (P2TR) include a 32-byte tweaked public key in the output program, rather than a pubkey hash, as described in BIP 341.

Project Eleven’s query documentation includes P2TR alongside pay-to-pubkey and some multisig forms as categories where public keys are visible in outputs.

That does not create a new vulnerability today.

However, it changes what becomes exposed by default if key recovery becomes feasible.

Because exposure is measurable, the vulnerable pool can be tracked today without pinning down a quantum timeline.

Project Eleven says it runs an automated weekly scan and publishes a “Bitcoin Risq List” concept intended to cover every quantum-vulnerable address and its balance, detailed in its methodology post.

Its public tracker shows a headline figure of about 6.7 million BTC that meet its exposure criteria.

Quantity Order of magnitude Source
BTC in “quantum-vulnerable” addresses (public key exposed) ~6.7M BTC Project Eleven
Logical qubits for 256-bit prime-field ECC discrete log (upper bound) ~2,330 logical qubits Roetteler et al.
Physical-qubit scale example tied to a 10-minute key-recovery setup ~6.9M physical qubits Litinski
Physical-qubit scale reference tied to a 1-day key-recovery setup ~13M physical qubits Schneier on Security

On the computational side, the key distinction is between logical qubits and physical qubits.

In the paper “Quantum resource estimates for computing elliptic curve discrete logarithms,” Roetteler and co-authors give an upper bound of at most 9n + 2⌈log2(n)⌉ + 10 logical qubits to compute an elliptic-curve discrete logarithm over an n-bit prime field.

For n = 256, that works out to about 2,330 logical qubits.

Converting that into an error-corrected machine that can run a deep circuit at low failure rates is where physical-qubit overhead and timing dominate.

Architecture choices then set a wide range of runtimes

Litinski’s 2023 estimate puts a 256-bit elliptic-curve private-key computation at about 50 million Toffoli gates.

Under its assumptions, a modular approach could compute one key in about 10 minutes using about 6.9 million physical qubits.

In a Schneier on Security summary of related work, estimates cluster around 13 million physical qubits to break within one day.

The same line of estimates also cites about 317 million physical qubits to target a one-hour window, depending on timing and error-rate assumptions.

For Bitcoin operations, the nearer levers are behavioral and protocol-level.

Address reuse raises exposure, and wallet design can reduce it.

Project Eleven’s wallet analysis notes that once a public key is on-chain, future receipts back to that same address remain exposed.

If key recovery ever fit inside a block interval, an attacker would be racing spends from exposed outputs, not rewriting consensus history.

Hashing is often bundled into the narrative, but the quantum lever there is Grover’s algorithm.

Grover provides a square-root speedup for brute-force search rather than the discrete-log break Shor provides.

NIST research on the practical cost of Grover-style attacks stresses that overhead and error correction shape system-level cost.

In the idealized model, for SHA-256 preimages, the target remains on the order of 2^128 work after Grover.

That is not comparable to an ECC discrete-log break.

That leaves signature migration, where the constraints are bandwidth, storage, fees, and coordination.

Post-quantum signatures are often kilobytes rather than the tens of bytes users are accustomed to.

That changes transaction weight economics and wallet UX.

Why quantum risk is a migration challenge, not an immediate threat

Outside Bitcoin, NIST has standardized post-quantum primitives such as ML-KEM (FIPS 203) as part of broader migration planning.

Inside Bitcoin, BIP 360 proposes a “Pay to Quantum Resistant Hash” output type.

Meanwhile, qbip.org argues for a legacy-signature sunset to force migration incentives and reduce the long tail of exposed keys.

Recent corporate roadmaps add context for why the topic is framed as infrastructure rather than an emergency.

In a recent Reuters report, IBM discussed progress on error-correction components and reiterated a path toward a fault-tolerant system around 2029.

Reuters also covered IBM’s claim that a key quantum error-correction algorithm can run on conventional AMD chips, in a separate report.

In that framing, “quantum breaks Bitcoin encryption” fails on terminology and on mechanics.

The measurable items are how much of the UTXO set has exposed public keys, how wallet behavior changes in response to that exposure, and how quickly the network can adopt quantum-resistant spending paths while keeping validation and fee-market constraints intact.

The post Bitcoin encryption isn’t at risk from quantum computers for one simple reason: it doesn’t actually exist appeared first on CryptoSlate.

Share9Tweet6ShareSharePin2

Related Posts

Cardano’s new roadmap assumes a 500% price explosion to mask an alarming gap in real protocol revenue
Analysis

Cardano’s new roadmap assumes a 500% price explosion to mask an alarming gap in real protocol revenue

19.12.2025
0

Cardano is signaling a fundamental shift from the network's roots in academic research toward a commercially driven “operating system” model....

Read moreDetails
Bitcoin’s viral $5 billion whale buy signal was actually a dangerous trap set by institutional accounting

Bitcoin’s viral $5 billion whale buy signal was actually a dangerous trap set by institutional accounting

18.12.2025
New SEC rules lets Morgan Stanley, Goldman Sach legally “control” your private keys without the safety net you assume exists

New SEC rules lets Morgan Stanley, Goldman Sach legally “control” your private keys without the safety net you assume exists

18.12.2025
Bitcoin is facing a hidden “supply wall” at $93,000 that creates a ceiling no rally can break right now

Bitcoin is facing a hidden “supply wall” at $93,000 that creates a ceiling no rally can break right now

18.12.2025
Bitcoin just flashed a rare capitulation signal that historically triggers a violent rally

Bitcoin just flashed a rare capitulation signal that historically triggers a violent rally

18.12.2025
Load More
0 0 votes
Рейтинг статьи
Subscribe
Notify of
guest
guest
0 комментариев
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recommended

XRP Tests $0.5 Critical Resistance But Will the Rally Continue? (Ripple Price Analysis)

3 years ago
MetaMask Integrates Crypto Tax Calculator to Supply Constructed-In Tax Administration Instrument

MetaMask Integrates Crypto Tax Calculator to Supply Constructed-In Tax Administration Instrument

10 months ago
Crypto Investor Makes $1M in 4 Days with PEPE Tokens

Crypto Investor Makes $1M in 4 Days with PEPE Tokens

3 years ago
Altcoin season is cancelled this year: Alts fail to match last cycle $1.6 trillion ceiling

Altcoin season is cancelled this year: Alts fail to match last cycle $1.6 trillion ceiling

2 months ago

Categories

  • All news
  • Altcoins
  • Analysis
  • Bitcoin
  • Blockchain
  • Ethereum
  • NFT
No Result
View All Result

Highlights

Terraform Liquidators Allege Jump Trading Helped Fuel Crypto’s Biggest Crash: Report

Asia Market Open: Bitcoin Slides As Asian Markets Take Cues From Tech Recovery

‘Severe Mistake’: Lawmakers May Limit De Minimis Tax Exemption to Stablecoins Only

Cardano’s new roadmap assumes a 500% price explosion to mask an alarming gap in real protocol revenue

Best Crypto To Buy Now 18 December – SHIB, XRP, ADA

Binance Plans US Comeback: CZ May Cut Stake, Eyes Trump and BlackRock Deals: Report

Trending

Senate Confirms Pro-Crypto Mike Selig as CFTC Chair — What To Expect
All news

Senate Confirms Pro-Crypto Mike Selig as CFTC Chair — What To Expect

19.12.2025
0

The U.S. Senate has confirmed crypto-friendly lawyer Mike Selig as the next chair of the Commodity Futures...

Aptos Proposes Quantum-Resistant Signatures to Future-Proof Blockchain Security

Aptos Proposes Quantum-Resistant Signatures to Future-Proof Blockchain Security

19.12.2025
IcomTech Promoter Sentenced to Nearly Six Years in Prison Over Crypto Ponzi Scheme

IcomTech Promoter Sentenced to Nearly Six Years in Prison Over Crypto Ponzi Scheme

19.12.2025
Terraform Liquidators Allege Jump Trading Helped Fuel Crypto’s Biggest Crash: Report

Terraform Liquidators Allege Jump Trading Helped Fuel Crypto’s Biggest Crash: Report

19.12.2025
Asia Market Open: Bitcoin Slides As Asian Markets Take Cues From Tech Recovery

Asia Market Open: Bitcoin Slides As Asian Markets Take Cues From Tech Recovery

19.12.2025
  • All news
  • Altcoins
  • Bitcoin
  • Blockchain
  • Ethereum
  • NFT
  • Analysis
Editor: cryptomediaclub.com@gmail.com
Advertising: digestmediaholding@gmail.com

Disclaimer: Information found on CryptoMediaClub is those of writers quoted. It does not represent the opinions of CryptoMediaClub on whether to sell, buy or hold any investments. You are advised to conduct your own research before making any investment decisions. Use provided information at your own risk.
CryptoMediaClub covers fintech, blockchain and Bitcoin bringing you the latest crypto news and analyses on the future of money.

© 2023 Crypto News. All Rights Reserved

No Result
View All Result
  • All news
  • Bitcoin
  • Ethereum
  • Altcoins
  • NFT
  • Blockchain
  • Analysis

Disclaimer: Information found on CryptoMediaClub is those of writers quoted. It does not represent the opinions of CryptoMediaClub on whether to sell, buy or hold any investments. You are advised to conduct your own research before making any investment decisions. Use provided information at your own risk.
CryptoMediaClub covers fintech, blockchain and Bitcoin bringing you the latest crypto news and analyses on the future of money.

© 2023 Crypto News. All Rights Reserved

wpDiscuz