The post Bitcoin bulls face Q‑Day threat if key exposure isn’t patched by 2028 appeared on BitcoinEthereumNews.com. Quantum computers can’t decrypt Bitcoin but The post Bitcoin bulls face Q‑Day threat if key exposure isn’t patched by 2028 appeared on BitcoinEthereumNews.com. Quantum computers can’t decrypt Bitcoin but

Bitcoin bulls face Q‑Day threat if key exposure isn’t patched by 2028

Quantum computers can’t decrypt Bitcoin but could forge signatures from exposed public keys, putting ~6.7m BTC at risk unless wallets migrate to post‑quantum paths before large fault‑tolerant machines arrive.

Summary

  • Bitcoin stores no encrypted secrets on‑chain; the critical quantum threat is Shor‑enabled key recovery from exposed public keys, allowing authorization forgery on vulnerable UTXOs.​
  • Project Eleven’s Bitcoin Risq List estimates about 6.7m BTC in addresses meeting its public‑key exposure criteria, with Taproot changing but not eliminating the risk if quantum machines scale.​
  • Current estimates suggest ~2,330 logical qubits and millions of physical qubits are needed to break 256‑bit ECC, giving time for BIP‑level post‑quantum outputs (e.g., P2QRH) and NIST‑standard schemes to be integrated despite larger, fee‑heavier signatures.

Quantum computers pose a threat to Bitcoin (BTC) through potential exploitation of digital signatures rather than decryption of encrypted data, according to cryptocurrency security researchers and developers.

Quantum and Bitcoin, technology proof?

Bitcoin stores no encrypted secrets on its blockchain, making the widespread narrative of “quantum computers cracking Bitcoin encryption” technically inaccurate, according to Adam Back, a longtime Bitcoin developer and inventor of Hashcash. The cryptocurrency’s security relies on digital signatures and hash-based commitments rather than ciphertext.

“Bitcoin does not use encryption,” Back stated on social media platform X, adding that the terminology error serves as an indicator of misunderstanding the technology’s fundamentals.

The actual quantum risk involves authorization forgery, where a sufficiently powerful quantum computer running Shor’s algorithm could derive a private key from an on-chain public key and produce a valid signature for a competing transaction spend, according to technical documentation.

Bitcoin’s signature systems, ECDSA and Schnorr, prove control over a keypair. Public-key exposure represents the primary security concern, with vulnerability depending on what information appears on-chain. Many address formats commit to a hash of a public key, keeping the raw public key hidden until a transaction is spent.

Project Eleven, a cryptocurrency security research organization, maintains an open-source “Bitcoin Risq List” that tracks public key exposure at the script and address reuse level. The organization’s public tracker shows approximately 6.7 million BTC meeting its exposure criteria, according to its published methodology.

Taproot outputs, known as P2TR, include a 32-byte tweaked public key in the output program rather than a pubkey hash, as outlined in Bitcoin Improvement Proposal 341. This changes the exposure pattern in ways that would only matter if large fault-tolerant quantum machines become operational, according to Project Eleven’s documentation.

Research published in “Quantum resource estimates for computing elliptic curve discrete logarithms” by Roetteler and co-authors establishes an upper bound of at most 9n + 2⌈log2(n)⌉ + 10 logical qubits needed to compute an elliptic-curve discrete logarithm over an n-bit prime field. For n = 256, this equates to approximately 2,330 logical qubits.

A 2023 estimate by Litinski places a 256-bit elliptic-curve private-key computation at approximately 50 million Toffoli gates. Under those assumptions, a modular approach could compute one key in roughly 10 minutes using about 6.9 million physical qubits. A summary on Schneier on Security cited estimates clustering around 13 million physical qubits to break encryption within one day, with approximately 317 million physical qubits needed to target a one-hour window.

Grover’s algorithm, which provides a square-root speedup for brute-force search, represents the quantum threat to hashing functions. NIST research indicates that for SHA-256 preimages, the target remains on the order of 2^128 work after applying Grover’s algorithm, which does not compare to an elliptic-curve cryptography discrete-log break.

Post-quantum signatures typically measure in kilobytes rather than tens of bytes, affecting transaction weight economics and wallet user experience, according to technical specifications.

NIST has standardized post-quantum primitives including ML-KEM (FIPS 203) as part of broader migration planning. Within the Bitcoin ecosystem, BIP 360 proposes a “Pay to Quantum Resistant Hash” output type, while qbip.org advocates for a legacy-signature sunset to force migration incentives.

IBM discussed progress on error-correction components in a recent statement to Reuters, reiterating a development path toward a fault-tolerant quantum system around 2029. The company also reported that a key quantum error-correction algorithm can run on conventional AMD chips, according to a separate Reuters report.

The measurable factors include the proportion of the UTXO set with exposed public keys, changes in wallet behavior responding to that exposure, and the network’s adoption speed for quantum-resistant spending paths while maintaining validation and fee-market constraints, according to Project Eleven’s analysis.

Source: https://crypto.news/bitcoin-bulls-face-quantum-signature%E2%80%91theft-risk-on-6-7m-exposed-btc/

Market Opportunity
BULLS Logo
BULLS Price(BULLS)
$309.35
$309.35$309.35
+0.50%
USD
BULLS (BULLS) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Whales keep selling XRP despite ETF success — Data signals deeper weakness

Whales keep selling XRP despite ETF success — Data signals deeper weakness

The post Whales keep selling XRP despite ETF success — Data signals deeper weakness appeared on BitcoinEthereumNews.com. XRP ETFs have crossed $1 billion in assets
Share
BitcoinEthereumNews2025/12/20 02:55
Foreigner’s Lou Gramm Revisits The Band’s Classic ‘4’ Album, Now Reissued

Foreigner’s Lou Gramm Revisits The Band’s Classic ‘4’ Album, Now Reissued

The post Foreigner’s Lou Gramm Revisits The Band’s Classic ‘4’ Album, Now Reissued appeared on BitcoinEthereumNews.com. American-based rock band Foreigner performs onstage at the Rosemont Horizon, Rosemont, Illinois, November 8, 1981. Pictured are, from left, Mick Jones, on guitar, and vocalist Lou Gramm. (Photo by Paul Natkin/Getty Images) Getty Images Singer Lou Gramm has a vivid memory of recording the ballad “Waiting for a Girl Like You” at New York City’s Electric Lady Studio for his band Foreigner more than 40 years ago. Gramm was adding his vocals for the track in the control room on the other side of the glass when he noticed a beautiful woman walking through the door. “She sits on the sofa in front of the board,” he says. “She looked at me while I was singing. And every now and then, she had a little smile on her face. I’m not sure what that was, but it was driving me crazy. “And at the end of the song, when I’m singing the ad-libs and stuff like that, she gets up,” he continues. “She gives me a little smile and walks out of the room. And when the song ended, I would look up every now and then to see where Mick [Jones] and Mutt [Lange] were, and they were pushing buttons and turning knobs. They were not aware that she was even in the room. So when the song ended, I said, ‘Guys, who was that woman who walked in? She was beautiful.’ And they looked at each other, and they went, ‘What are you talking about? We didn’t see anything.’ But you know what? I think they put her up to it. Doesn’t that sound more like them?” “Waiting for a Girl Like You” became a massive hit in 1981 for Foreigner off their album 4, which peaked at number one on the Billboard chart for 10 weeks and…
Share
BitcoinEthereumNews2025/09/18 01:26
New York Regulators Push Banks to Adopt Blockchain Analytics

New York Regulators Push Banks to Adopt Blockchain Analytics

New York’s top financial regulator urged banks to adopt blockchain analytics, signaling tighter oversight of crypto-linked risks. The move reflects regulators’ concern that traditional institutions face rising exposure to digital assets. While crypto-native firms already rely on monitoring tools, the Department of Financial Services now expects banks to use them to detect illicit activity. NYDFS Outlines Compliance Expectations The notice, issued on Wednesday by Superintendent Adrienne Harris, applies to all state-chartered banks and foreign branches. In its industry letter, the New York State Department of Financial Services (NYDFS) emphasized that blockchain analytics should be integrated into compliance programs according to each bank’s size, operations, and risk appetite. The regulator cautioned that crypto markets evolve quickly, requiring institutions to update frameworks regularly. “Emerging technologies introduce evolving threats that require enhanced monitoring tools,” the notice stated. It stressed the need for banks to prevent money laundering, sanctions violations, and other illicit finance linked to virtual currency transactions. To that end, the Department listed specific areas where blockchain analytics can be applied: Screening customer wallets with crypto exposure to assess risks. Verifying the origin of funds from virtual asset service providers (VASPs). Monitoring the ecosystem holistically to detect money laundering or sanctions exposure. Identifying and assessing counterparties, such as third-party VASPs. Evaluating expected versus actual transaction activity, including dollar thresholds. Weighing risks tied to new digital asset products before rollout. These examples highlight how institutions can tailor monitoring tools to strengthen their risk management frameworks. The guidance expands on NYDFS’s Virtual Currency-Related Activities (VCRA) framework, which has governed crypto oversight in the state since 2022. Regulators Signal Broader Impact Market observers say the notice is less about new rules and more about clarifying expectations. By formalizing the role of blockchain analytics in traditional finance, New York is reinforcing the idea that banks cannot treat crypto exposure as a niche concern. Analysts also believe the approach could ripple beyond New York. Federal agencies and regulators in other states may view the guidance as a blueprint for aligning banking oversight with the realities of digital asset adoption. For institutions, failure to adopt blockchain intelligence tools may invite regulatory scrutiny and undermine their ability to safeguard customer trust. With crypto now firmly embedded in global finance, New York’s stance suggests that blockchain analytics are no longer optional for banks — they are essential to protecting the financial system’s integrity.
Share
Coinstats2025/09/18 08:49