Quantum Computing Poses Manageable Risk to Bitcoin Security: CoinShares

iconCryptofrontnews
Share
Share IconShare IconShare IconShare IconShare IconShare IconCopy
AI summary iconSummary

expand icon
Bitcoin breaking news: A new CoinShares report says quantum computing poses a manageable risk to Bitcoin security. Only 8% of Bitcoin is in legacy addresses vulnerable to quantum attacks. Experts say users can move funds to secure addresses without major protocol changes. Breaking Bitcoin’s encryption would require millions of qubits—far beyond current tech. Bitcoin news shows the threat is not imminent.
  • Only 8% of Bitcoin sits in legacy addresses that could be threatened by quantum tech decades from now.
  • Breaking Bitcoin’s encryption needs millions of qubits—current tech is far from capable.
  • Users can safely move coins to secure addresses; aggressive protocol changes aren’t needed yet.

Bitcoin’s cryptographic security faces growing speculation around quantum computing, but experts stress the threat is manageable, not imminent. CoinShares highlights that while Shor’s algorithm could theoretically expose ECDSA and Schnorr signatures, practical risks remain decades away.

Approximately 1.6 million BTC, or 8% of total supply, reside in legacy P2PK addresses with visible public keys. However, only about 10,200 BTC sit in UTXOs large enough to disrupt the market if stolen. The rest remain in smaller amounts, making targeted attacks prohibitively expensive.

The conversation revolves around differentiating hype and evidence-based analysis. Bitcoin uses elliptic curve digital signatures for transaction authorization and SHA-256 hashes for protecting addresses. Quantum computers cannot modify or eliminate the supply limit of 21 million or validation directness.

Besides, modern addresses such as P2PKH and P2SH encrypt the public keys until the funds are spent. As such, the purported 25% of the Bitcoins that can be compromised in the long term are overstated, as best practices for behavioral responses can overcome temporary challenges.

Timeline and Technical Feasibility

Experts agree that breaking secp256k1 within a practical timeframe requires millions of logical qubits. “To break current asymmetric cryptography, one would need something in the order of millions of qubits. Willow, Google’s current computer, is 105 qubits,” said Ledger CTO Charles Guillemet.

Achieving this scale remains at least a decade away. Long-term attacks on dormant P2PK coins could take years, whereas short-term mempool attacks would require impossible <10-minute computations. Additionally, even under optimistic projections, stealing coins from 32,607 individual ~50 BTC UTXOs would take millennia.

Caution Over Aggressive Interventions

Proposals for soft forks or burning vulnerable coins carry risks. Prematurely introducing quantum-resistant addresses could create bugs, undermine decentralization, or waste developer resources.

Dr. Adam Back emphasized, “Bitcoin can adopt post-quantum signatures. Schnorr signatures paved the way for more upgrades, and Bitcoin can continue evolving defensively.” Users can voluntarily migrate funds as quantum technology progresses, making drastic interventions unnecessary.

Disclaimer: The information on this page may have been obtained from third parties and does not necessarily reflect the views or opinions of KuCoin. This content is provided for general informational purposes only, without any representation or warranty of any kind, nor shall it be construed as financial or investment advice. KuCoin shall not be liable for any errors or omissions, or for any outcomes resulting from the use of this information. Investments in digital assets can be risky. Please carefully evaluate the risks of a product and your risk tolerance based on your own financial circumstances. For more information, please refer to our Terms of Use and Risk Disclosure.