Google’s Quantum AI team has released a critical report highlighting the increased susceptibility of major cryptocurrencies to quantum attacks. The study indicates that the timeline for quantum computers posing a threat to blockchain security could be shorter than anticipated.
Revisiting Cryptographic Assumptions
The pivotal concern is elliptic curve cryptography (ECC), which secures Bitcoin, Ethereum, and numerous other blockchains. Quantum computers leveraging Shor’s algorithm could theoretically disrupt ECC, although, until now, it was believed that substantial quantum resources would be required.
Google’s latest research challenges this assumption by significantly reducing the projected quantum resources necessary. The study presents newly developed quantum circuits capable of solving the 256-bit elliptic curve discrete logarithm problem (ECDLP-256) with fewer than 1,200 logical qubits and about 90 million Toffoli gate operations, marking a 20-fold reduction in resource needs.
Impact on Blockchain Security
The implications are profound, suggesting that an attack might be feasible in minutes on a quantum computer with under 500,000 physical qubits, a notable decrease from the previously estimated 10 million. Although such hardware is not yet available, this development accelerates the timeline for potential quantum threats to current cryptographic systems.
This revelation aligns with Google’s recent adjustment of its timeline for adopting post-quantum cryptography, now aiming for a 2029 transition, spurred by rapid advancements in quantum computing technology.
Collaborative Efforts and Future Directions
In response, Google is calling on major industry stakeholders, including the cryptocurrency sector, to expedite their transition to post-quantum cryptography. Notably, Google has opted not to disclose the specific quantum circuits used, instead providing a zero-knowledge proof. This method allows independent verification of their claims without releasing sensitive details that could facilitate replication of the attack.
This strategy, developed alongside the US government, serves as a proposed model for the responsible disclosure of vulnerabilities within the quantum research community.
As the landscape of quantum computing evolves, the urgency for industries to adapt and safeguard their cryptographic systems becomes increasingly evident.
