Google paper sharply lowers hardware estimate for quantum attacks on elliptic-curve crypto
Googleâs quantum computing team has sharply lowered the bar for breaking one of the internetâs most widely used forms of encryption â and the warning shot is already echoing through cybersecurity circles and crypto markets.
In a new white paper posted March 30 to the online preprint server arXiv, Google Quantum AI researchers estimate that a future quantum computer could crack 256-bit elliptic-curve cryptography â the digital signature system that secures many blockchains and much of the web â using fewer than half a million physical qubits and finishing the job in minutes.
That is ânearly a 20 fold reduction over prior estimatesâ of the quantum hardware needed for such an attack, the paper states.
Elliptic-curve schemes, including secp256k1, Ed25519 and P-256, underpin the signatures that prove you own a cryptocurrency wallet and authenticate many secure internet connections. They are considered safe against todayâs classical supercomputers, but vulnerable in principle to Shorâs algorithm, a quantum method that can unwind the math behind public-key cryptography on a powerful enough machine.
Until now, most public estimates suggested that a quantum computer capable of breaking 256-bit elliptic curves would require millions of physical qubits and daunting amounts of computation. Googleâs team says it can do better.
In the paper, titled âSecuring Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations,â the authors write that âwe publish a ZK proof that we have compiled two quantum circuits for solving the 256-bit ECDLP: one with 1200 logical qubits and 90 million Toffoli gates and one with 1450 logical qubits and 70 million Toffoli gates.â
Logical qubits are error-corrected qubits built from many underlying physical qubits. Translating those circuits into a âstandard superconducting architectureâ protected by a surface code â a leading method for error correction â and assuming a physical error rate of about 1 in 1,000 operations, the team estimates that âthese computations could be realized with fewer than half a million physical qubits.â
In a companion Google Research blog post, lead author Ryan Babbush and Hartmut Neven write that âwe show that future quantum computers may break the elliptic curve cryptography that protects cryptocurrency and other systems with fewer qubits and gates than previously realized.â
Because fully specified attack circuits could be misused, the researchers do not reveal all the technical details. Instead, they use a cryptographic zero-knowledge proof so others can verify their resource estimates without learning how to reconstruct the attack. Google presents this as a form of âresponsible disclosureâ for a potential vulnerability in widely deployed cryptography.
The threat model is concrete. The paper analyzes âon-spendâ attacks in which a quantum computer, once a user broadcasts a blockchain transaction, tries to derive that userâs private key and steal funds before the transaction is permanently recorded. The authors note that fast quantum architectures, such as superconducting or photonic systems, could in principle carry out such an attack within typical block times.
The resource reductions arrive alongside physical progress. In late 2024, Google reported in Nature that its Willow processor had achieved âbelow-thresholdâ error correction for logical qubits using the surface code â a step toward the kind of large, fault-tolerant machines the new paper assumes. Todayâs publicly known devices have on the order of 1,000 noisy physical qubits, far short of the hundreds of thousands envisioned, but the new work narrows the gap on paper.
To many in the security community, that is enough to shift the conversation from whether to migrate away from vulnerable cryptography to how quickly.
âThe upshot of this paper is that it shows that a quantum computer would be able to break some of the cryptography that is most widely used, especially in blockchains and cryptocurrencies, with much, much fewer resources than had previously been established,â said Chris Peikert, chief scientific officer at the Algorand Foundation and a professor of computer science and engineering at the University of Michigan, in an interview with IEEE Spectrum.
âItâs a kind of a win-win situation from the quantum computing perspective, but a lose-lose situation for cryptography,â he said.
Peikert emphasized that the sky is not falling in the immediate term. He told IEEE Spectrum that âthe chance of a cryptographic attack by quantum computers being successful in the next three years is extremely low, maybe less than a percent.â But he added that over â5, 6, or 10 years, one has to seriously consider a probability, maybe 5% or 10% or more.â
âI think what this paper did was really the loudest alarm yet that these kinds of quantum attacks might not be as far off as some have suspected, or hoped, in recent years,â he said.
Governments have already started planning for this shift. A 2022 directive from the White House, National Security Memorandum 10, set around 2035 as the target for migrating U.S. national security systems to quantum-resistant cryptography. The National Institute of Standards and Technology finalized its first such standards in August 2024, including ML-KEM for key establishment and ML-DSA and SLH-DSA for digital signatures.
âThe US government has put 2035 as its target for migrating all of the national security systems to post quantum cryptography,â Peikert said. âThat seems like a prudent date, given the timelines that it takes to upgrade cryptography.â
Those timelines are long because cryptographic transitions are rare and fraught.
âCryptography is very hard to change,â Peikert said. âWeâve only had one or maybe two major transitions in cryptography since the early 1980s or late 1970s when the field first was invented.â
Post-quantum algorithms, many of them based on mathematical structures called lattices, typically have larger keys, ciphertexts and signatures even if the underlying computations can be fast. That is especially challenging for blockchains, where on-chain data is limited and expensive. U.S. cybersecurity agencies have also warned about âharvest now, decrypt laterâ threats, in which adversaries store encrypted traffic today to unlock once quantum computers mature â another reason to move early.
The new Google paper shows how quickly that technical work can move markets. In a short section on âPost-Quantum Blockchains,â the authors single out Algorand, a proof-of-stake blockchain, as a project that has already deployed post-quantum tools. They note that Algorand has added Falcon, a post-quantum signature scheme, and recorded its first post-quantum-secured transaction in 2025. They also highlight Algorandâs âstate proofs,â which Peikert described in IEEE Spectrum as âa mixture of ordinary post-quantum cryptography and also some more fancy cryptographyâ to protect the integrity of the chainâs history.
Peikert said Algorand has addressed some major issues but does not yet claim to be âfully post-quantum secure.â
Still, being named in Googleâs warning paper coincided with a sudden repricing of Algorandâs own token. In the days after Google released its white paper and blog post, the price of the ALGO token jumped roughly 40% to 50%, with several crypto-market outlets describing the gain as about 44% and linking the rally in part to Googleâs explicit mention of Algorandâs post-quantum work.
For Peikert, the message is less about any single blockchain and more about the global infrastructure that still runs on quantum-vulnerable cryptography.
âI tend to be an optimist about these things,â he said, but âwe canât be complacent about it, and we canât kick the can down the road much longer.â