Disclaimer: SpendNode is for informational purposes only and is not a financial advisor. Some links on this site are affiliate links - we may earn a commission at no extra cost to you. This does not affect our data or rankings. Affiliate DisclosureView Policy
Crypto News

Google Says Quantum Could Break Bitcoin With Fewer Qubits Than Expected, and Taproot Is Part of the Problem

Published: Mar 31, 2026By SpendNode Editorial

Key Analysis

New Google research finds fewer than 500,000 qubits could compromise Bitcoin. Taproot's exposed public keys widen the attack surface to 6.9 million BTC.

Google Says Quantum Could Break Bitcoin With Fewer Qubits Than Expected, and Taproot Is Part of the Problem

Google just published research suggesting that breaking Bitcoin's cryptography may require far fewer quantum computing resources than the industry assumed, and that Bitcoin's own 2021 Taproot upgrade inadvertently widened the attack surface.

The findings land at a moment when BTC trades at $67,482 as of March 31, 2026, with the Fear & Greed index sitting at 28 (Fear). Markets are already nervous. A credible downgrade to quantum timelines does not help.

Fewer Qubits, Shorter Timeline

Previous estimates placed the qubit threshold for cracking Bitcoin's elliptic curve digital signature algorithm (ECDSA) in the millions. Google's new research pulls that number below 500,000 physical qubits, with as few as 1,200 to 1,450 high-quality logical qubits needed for a practical attack.

The distinction between physical and logical qubits matters. Physical qubits are the raw hardware units. Logical qubits are error-corrected abstractions that do the actual computational work. Reducing the logical qubit requirement to roughly 1,200 means the engineering challenge, while still enormous, is closer to the horizon than "decades away."

Google itself flagged 2029 as a potential milestone for useful quantum systems in earlier research. This latest paper tightens that timeline further by showing the resource requirements were overestimated.

The 9-Minute Attack Window

The research models a real-time quantum attack that could compromise a Bitcoin transaction in approximately 9 minutes, with a 41% success rate against Bitcoin's standard 10-minute block confirmation window.

That overlap is the uncomfortable part. Bitcoin's security model assumes that the time between broadcasting a transaction and its confirmation in a block is too short for an attacker to derive a private key from a public key. If quantum hardware can close that gap, the 10-minute block time becomes a vulnerability rather than a feature.

The 41% success rate is not a guarantee. But in cryptography, a 41% chance of breaking a signature scheme is not a rounding error. It is a broken scheme.

How Taproot Made Things Worse

Bitcoin's Taproot upgrade, activated in November 2021, was designed to improve privacy and smart contract flexibility. It uses Schnorr signatures, which are more efficient than the legacy ECDSA scheme, but they come with a tradeoff: Taproot addresses expose public keys directly on the blockchain by default.

Under the older Pay-to-Public-Key-Hash (P2PKH) format, public keys were hidden behind a hash. An attacker would need to crack both the hash and the elliptic curve. Taproot removed that first layer of protection.

The result: approximately 6.9 million BTC, roughly one-third of all bitcoin in circulation, now sits in wallets where public keys are visible on-chain. That includes about 1.7 million BTC from early network years (including Satoshi-era coins) and funds in addresses that have been reused.

For context, CoinShares previously estimated that only around 10,200 BTC faced significant quantum risk. Google's figure is 680 times larger.

Zero-Knowledge Disclosure

Google's team used zero-knowledge proofs to demonstrate their findings without revealing actual attack methods. This is responsible disclosure in practice: proving the vulnerability exists without handing adversaries a blueprint.

The approach suggests Google takes the threat seriously enough to invest in a secure disclosure framework rather than simply publishing a paper with theoretical calculations.

What Defenses Exist

Bitcoin is not defenseless, but the defenses require action.

Post-quantum signature schemes like SPHINCS+ and CRYSTALS-Dilithium are already standardized by NIST. Integrating them into Bitcoin would require a soft fork or hard fork, neither of which happens quickly in Bitcoin's conservative governance culture.

Address hygiene offers partial protection today. Users who never reuse addresses and move funds to fresh P2PKH addresses (where public keys remain hidden until spending) reduce their exposure. But this is a behavioral fix, not a protocol fix, and it does nothing for the 6.9 million BTC already exposed.

Quantum-resistant wallets are a concept, not a product. No major self-custody wallet currently implements post-quantum signatures for Bitcoin.

The clock is not at zero. Google's own researchers describe the threat as "not yet imminent." But the gap between "not yet imminent" and "too late to migrate" is where the risk lives.

What This Means for Bitcoin Holders

The immediate practical impact is zero. No quantum computer today can execute this attack. But the research changes the planning horizon.

Bitcoin developers have discussed post-quantum migration paths for years. The challenge is coordination: moving billions of dollars in value from legacy address formats to quantum-resistant ones requires network-wide consensus, wallet upgrades, and a migration timeline that does not leave slower movers exposed.

For users holding BTC in crypto card wallets or exchange accounts, the custodian's key management practices become relevant. Custodial providers that stake reputation on security will need to articulate their post-quantum roadmap. Self-custody users should, at minimum, avoid address reuse and consider consolidating funds into non-Taproot addresses until the picture clarifies.

Overview

Google's latest quantum computing research reduces the estimated qubit threshold for breaking Bitcoin's ECDSA from millions to under 500,000 physical qubits, with a practical attack requiring approximately 1,200 logical qubits. The 2021 Taproot upgrade compounds the issue by exposing public keys on-chain by default, widening the vulnerable pool to roughly 6.9 million BTC. The research models a 9-minute attack with a 41% success rate against Bitcoin's 10-minute confirmation window. No quantum computer can execute this today, but the timeline just compressed.

Recommended Reading

DisclaimerThis article is provided for informational purposes only and does not constitute financial advice. All fee, limit, and reward data is based on issuer-published documentation as of the date of verification.

Have a question or update?

Discuss this analysis with the community on X.

Discuss on X

Comments

Comments are moderated and may take a moment to appear.