Google's Quantum AI team has revealed that a sufficiently advanced quantum computer could derive a Bitcoin private key from a public key in approximately nine minutes. This revelation has sparked alarm in the cryptocurrency market, with investors and developers scrutinizing the implications for Bitcoin's security framework. The process involves a quantum computer using Shor's algorithm to solve the elliptic curve discrete logarithm problem, which currently safeguards Bitcoin transactions. However, the practical application of this threat is contingent on the development of a quantum computer with at least 500,000 physical qubits, a milestone far beyond today's capabilities, as current quantum processors max out at around 1,000 qubits. The nine-minute timeframe is critical because it aligns closely with Bitcoin's average 10-minute block confirmation time. This creates a narrow window where an attacker could potentially intercept a transaction in the mempool, derive the private key, and redirect funds before the original transaction is confirmed. The scenario is akin to a pre-built universal safe-cracking machine requiring only minor adjustments to exploit a newly exposed target. While this 'mempool attack' is theoretically possible, it remains speculative due to the absence of the necessary quantum hardware. A more immediate concern lies in the 6.9 million Bitcoin—roughly one-third of the total supply—that already have their public keys permanently exposed. These include early addresses using the pay-to-public-key format and wallets that have reused addresses, inadvertently revealing their public keys. The 2021 Taproot upgrade further exacerbated this issue by defaulting to on-chain public key visibility, expanding the pool of vulnerable wallets. Unlike the mempool attack, these exposed keys do not require a time-sensitive window for exploitation, making them prime targets for a future quantum attack. Despite these vulnerabilities, the Bitcoin network's core functions, such as mining and block production, remain secure. Mining relies on SHA-256, an algorithm not vulnerable to quantum speedups with current methods. However, the integrity of ownership guarantees, a cornerstone of Bitcoin's value proposition, could be compromised if private keys are derived from public keys. This would undermine institutional trust in the network's security model, potentially triggering a market downturn. The solution lies in post-quantum cryptography, which replaces the vulnerable elliptic curve math with quantum-resistant algorithms. While Ethereum has been working on this transition for years, Bitcoin has yet to initiate any such efforts. The urgency for action is clear, as the growing adoption of blockchain technology increases the metadata available for exploitation, further highlighting the need for robust privacy and security measures.
Sign up free to read the full analysis
Create a free account to unlock full AI-curated market articles, personalized alerts, and more.