Sep 16, 2025

Quantum Computing: A True Threat to Bitcoin?

Why did Blackrock recently warn that bitcoin was at risk to quantum computing? Is the asset manager suggesting Bitcoin's blockchain and cryptography are under threat?

Quantum Computing: A True Threat to Bitcoin?

Blackrock recently brought the term ‘Quantum Computing’ to the fore yet again, sparking alarm as to whether it could destroy Bitcoin’s security model. Given the complexities involved, the situation demands a balanced view: quantum computing is a legitimate challenge, but one that’s actively studied and addressable since Bitcoin is software that can be upgraded.

Quantum Computing - The Fundamentals

Imagine Bitcoin’s security as a large, impenetrable vault system in a global bank. Each user’s coins are locked in personal safes. To open the safe and move your bitcoin, you need a unique combination (the private key), which only you know.

When you share instructions to receive coins, you provide a map to the safe’s location (the public key) without revealing the combination. This setup relies on math problems so complex that guessing the combination from the map would take an ordinary computer billions of years, like trying to find a single grain of sand on every beach worldwide by checking one at a time.

The key tools here are:

  1. ECDSA for signatures and; 
  2. SHA-256 for hashing.

ECDSA:

Think of ECDSA as a lock based on curved paths on a map: the public key shows a point on the curve, but reversing it to find the starting point (private key) is like climbing an endless mountain with no shortcuts.

Hashing:

Hashing with SHA-256 is like a one-way blender: it scrambles data into a fixed-size mush (called a ‘hash’) that’s easy to create but impossible to un-blend back into the original ingredients. For most Bitcoin addresses, this hash often hides the public key until coins are spent, adding an extra barrier. These mechanisms make Bitcoin secure against today’s computers, where brute-forcing would outlast stars.

An illustration showing how hashfunction works

Now, enter quantum computing, explained through a fresh analogy: picture problem-solving as exploring a vast library for a hidden book. A classical computer searches sequentially for the book you require, shelf by shelf, which works fine for nearby sections but takes forever for distant, locked rooms.

A quantum computer, however, acts like a team of ghostly clones that can phase through walls and check multiple rooms simultaneously, thanks to ‘qubits’ that hold many states at once (superposition) and link together through entanglement. This doesn't speed up every search, but it does unlock dangerous shortcuts for the specific mathematical puzzles protecting Bitcoin.

Funny meme::  Quatum computers be like, well no but actually yes!

Quantum’s Risk to Bitcoin’s Security Model

Two key algorithms are the primary risks to cracking Bitcoin’s security model:

  1. Grover's algorithm provides a milder quadratic speedup for hashing, like halving the library's size, turning SHA's 256-bit security into roughly 128-bit, which remains formidable (equivalent to cracking top-tier modern encryption).
  2. Shor's algorithm is the star threat - it could navigate those curved-map locks exponentially faster, deriving private keys from public ones and allowing attackers to steal coins with legitimate signatures.

The risk escalates for addresses where public keys are exposed, such as through reuse or outdated formats from Bitcoin's early days. Reusing an address is like leaving your safe's map pinned publicly after one withdrawal; a quantum attacker could reverse engineer your private key from the public key.

For those grappling with these ideas, consider vulnerable addresses as houses with different door types. Some old houses (P2PK addresses) have the lock visible from the street, making them easy targets. Most modern ones (P2PKH) hide the lock behind a frosted window (the hash), so burglars must first smash through the window before they can even attempt to pick the lock, adding an extra layer of protection even against quantum tools.

Tools like the recently launched quantumrekt.com offer a hands-on way to check: enter an address to see if it’s “REKT”, learn about address types, and even set up alerts for monitoring. This site, created by developer Ben Sigman, breaks down complex quantum threats into digestible explanations and interactive quizzes.

Ben Sigman's quantumrekt.com report stating differnt wallet types have lower or higher vulnerabilities to quantum computers
Source: QuantumRekt.com

Shifting to deeper technical ground, Bitcoin lacks native quantum resistance because its cryptography assumes classical threats. Both ECDSA and the newer Schnorr signatures (via Taproot) succumb to Shor’s discrete logarithm attack on elliptic curves.

Grover’s impact on SHA-256 could theoretically aid 51% attacks by speeding mining, but this seems remote; Bitcoin’s ASIC network is a juggernaut, and quantum hardware lags in practical speed. A 2023 report highlighted that quantum miners would underperform classical ones without massive leaps. Attack vectors focus on theft: high-value wallets with reused addresses or exposed keys could be cracked in hours instead of eons.

The Blackrock Quantum Computing “Warning”

Recent disclosures amplify this entire conversation surrounding the true risk of quantum computing on Bitcoin’s security model. In May 2025, BlackRock updated its Bitcoin ETF prospectus to flag quantum risks, stating that advances could undermine wallets and transactions.

BlackRock udates it's Bitcoin ETF disclosure to flag Quantum risks

In reality however, this mirrors standard financial prudence rather than signaling any immediate crisis. They also listed a variety of unlikely scenarios such as asteroid strikes alongside the risk of quantum computing, making it seem like this was more of a disclaimer to protect themselves (Blackrock) than them taking this risk seriously.

Similar warnings also appear in other filings, likely driven by quantum headlines from IBM and Google. Historical context shows awareness of quantum dates all the way back to Bitcoin's inception; Satoshi Nakamoto specifically addressed the possibility of cryptographic upgrades, stating that if SHA-256 became "completely broken," the network could agree on the honest blockchain before the attack and "continue from there with a new hash function".

Quantum hardware evolves rapidly, akin to upgrading from bicycles to jets in computation. Qubits measure scale, but quality, fidelity, and error correction matters more. IBM’s roadmap eyes unlocking “the full power of quantum computing at scale” by 2033, while Google’s 2024 Willow achieved error-reduction milestones. Yet, cracking a 256-bit key still demands millions of reliable physical qubits. When we actually reach this capability remains highly uncertain, making proactive planning important.

Bitcoin proposals like BIP-360 outline new address formats with Post Quantum Computing, incentivized by fee reductions, similar to SegWit’s rollout. Soft forks could deprecate vulnerable signatures, while hybrids like commit-reveal schemes let users prove ownership safely post-quantum. Debates rage on unupgraded coins: burn them to avert theft (reducing supply) or risk attackers claiming them? The game theory will be interesting to watch play out here.

Wrapping It Up

Quantum threats are a lot like Schrödinger’s cat: alive and dead until observed. Right now, the box is closed, and Bitcoin’s purring along. But ignoring it entirely would be foolish. The beauty is, this isn’t only our fight; the whole world’s cryptographically secure tools, from banks to browsers, faces the same future threat.

NIST’s standards will pave the way, and Bitcoin can ride that wave. As upgradable software, the game theory holds: users and developers have every incentive to evolve the Protocol, ensuring consensus-driven changes keep it secure.

Quantum computing presents a theoretical threat to Bitcoin’s current cryptography, but timelines will likely stretch decades, and solutions abound. For everyday users, start with basics: avoid address reuse, monitor your addresses via the tools out there, and continue to educate yourself on the topic. Bitcoin’s history of adaptation suggests it will emerge quantum-ready as the incentive to correctly address this issue is too large to ignore.

About the author.