Scan to download
BTC $68,057.89 +0.10%
ETH $1,975.46 +0.45%
BNB $625.57 -0.06%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $564.71 +0.57%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%
BTC $68,057.89 +0.10%
ETH $1,975.46 +0.45%
BNB $625.57 -0.06%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $564.71 +0.57%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%

Tiger Research: Will Bitcoin be broken by quantum computers?

Summary: The global internet infrastructure has begun to transition to new security standards.
Tiger Research
2025-11-19 19:50:17
Collection
The global internet infrastructure has begun to transition to new security standards.

The progress of quantum computing is bringing new security risks to blockchain networks. This report is authored by Tiger Research, aiming to explore technologies designed to counter quantum threats and examine how Bitcoin and Ethereum are preparing for this transition.

Key Points

  • The Q-Day scenario, where quantum computers can break blockchain cryptography, is estimated to arrive in 5 to 7 years. BlackRock has also pointed out this risk in its Bitcoin ETF application documents.
  • Post-quantum cryptography provides protection against quantum attacks at three security levels: communication encryption, transaction signing, and data persistence.
  • Companies like Google and AWS have already begun adopting post-quantum cryptography, but Bitcoin and Ethereum are still in the early discussion stages.

1. A New Technology Raises Unfamiliar Questions

If a quantum computer can crack a Bitcoin wallet in minutes, can the security of the blockchain be maintained?

The core of blockchain security is private key protection. To steal someone's Bitcoin, an attacker must obtain the private key, which is practically impossible with current computing methods. Only the public key is visible on the chain, and even using a supercomputer, deriving the private key from the public key would take hundreds of years.

Quantum computers change this risk landscape. Classical computers process 0s or 1s sequentially, while quantum systems can process both states simultaneously. This capability theoretically makes it possible to derive the private key from the public key.

Experts estimate that quantum computers capable of breaking modern cryptography may appear around 2030. This anticipated moment is referred to as Q-Day, indicating that there are five to seven years left before actual attacks become feasible.

Source: SEC

Regulators and major institutions have recognized this risk. In 2024, the U.S. National Institute of Standards and Technology introduced post-quantum cryptography standards. BlackRock also pointed out in its Bitcoin ETF application

warnning Risk warning
app_icon
ChainCatcher Building the Web3 world with innovations.