CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Mar 31, 2026

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Security Week Archived Mar 31, 2026 ✓ Full text saved

Google researchers have shown that breaking the encryption of Bitcoin and Ethereum requires 20x fewer qubits. The post Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption appeared first on SecurityWeek .

Full text archived locally
✦ AI Summary · Claude Sonnet


    Google’s Quantum AI research division has published a whitepaper warning that the cryptographic foundations of most major cryptocurrencies are more vulnerable to quantum attacks than previously believed. The findings suggest that the timeline for when quantum computers could pose a real threat to blockchain security may be shorter than previously assumed. At issue is elliptic curve cryptography (ECC), the mathematical system that secures Bitcoin, Ethereum, and most other blockchains. Quantum computers running Shor’s algorithm can in theory break ECC, but until now the consensus was that doing so would require a very powerful quantum machine. Google’s new estimates significantly lower the threshold. The company’s researchers have designed quantum circuits capable of breaking the 256-bit elliptic curve discrete logarithm problem (ECDLP-256) used by cryptocurrencies. Specifically, they achieved this using fewer than 1,200 logical qubits and around 90 million Toffoli gate operations, which roughly represents a 20-fold reduction in the quantum resources previously thought necessary.  The researchers estimate the attack could be executed in minutes on a machine with fewer than 500,000 physical qubits (down from roughly 10 million). This is still beyond today’s hardware, but the findings significantly shorten the timeline for when quantum computers could break current cryptography.  The news comes just days after Google moved up its timeline for transitioning to post-quantum cryptography, setting a 2029 target after faster-than-expected advances in quantum computing.  The tech giant has urged other major industry players, including the cryptocurrency community, to follow suit.  [ Read: Quantum Decryption of RSA Is Much Closer Than Expected ] Notably, Google chose not to publish the actual quantum circuits behind their newest estimates, instead releasing a zero-knowledge proof: a cryptographic technique that lets independent researchers verify that the claims are mathematically sound without Google having to hand over details that could be used to reproduce the attack.  The approach, developed in coordination with the US government, is being proposed as a model for how the quantum research community should handle sensitive vulnerability disclosures going forward. Related: Dell and HP Roll Out Quantum-Resistant Device Security Related: Cyber Insights 2026: Quantum Computing and the Potential Synergy With Advanced AI Related: Google Working Towards Quantum-Safe Chrome HTTPS Certificates WRITTEN BY Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs European Commission Reports Cyber Intrusion and Data Theft FBI Confirms Kash Patel Email Hack as US Offers $10M Reward for Hackers CISA Flags Critical PTC Vulnerability That Had German Police Mobilized Alleged RedLine Malware Administrator Extradited to US Dell and HP Roll Out Quantum-Resistant Device Security Russian Cybercriminal Gets 2-Year Prison Sentence in US  US Prisons Russian Access Broker for Aiding Ransomware Attacks HackerOne Employee Data Exposed in Massive Navia Breach Latest News Exploitation of Critical Fortinet FortiClient EMS Flaw Begins StrongSwan Flaw Allows Unauthenticated Attackers to Crash VPNs Lloyds Data Security Incident Impacts 450,000 Individuals Critical Vulnerability in OpenAI Codex Allowed GitHub Token Compromise  Healthcare IT Platform CareCloud Probing Potential Data Breach Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control Huskeys Emerges From Stealth With $8 Million in Funding Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit Trending Webinar: Securing Fragile OT In An Exposed World March 10, 2026 Get a candid look at the current OT threat landscape as we move past "doom and gloom" to discuss the mechanics of modern OT exposure. Register Webinar: Why Automated Pentesting Alone Is Not Enough April 7, 2026 Join our live diagnostic session to expose hidden coverage gaps and shift from flawed tool-level evaluations to a comprehensive, program-level validation discipline. Register People on the Move Moderna has promoted Farzan Karimi to Deputy Chief Information Security Officer. Brian Goldfarb has been appointed Chief Marketing Officer at SentinelOne. Token has appointed Katy Nelson as Chief Revenue Officer. More People On The Move Expert Insights Why Agentic AI Systems Need Better Governance – Lessons From OpenClaw Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor) The Human IOC: Why Security Professionals Struggle With Social Vetting Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb) How To 10x Your Vulnerability Management Program In The Agentic Era The evolution of vulnerability management in the agentic era is characterized by continuous telemetry, contextual prioritization and the ultimate goal of agentic remediation. (Nadir Izrael) SIM Swaps Expose A Critical Flaw In Identity Security SIM swap attacks exploit misplaced trust in phone numbers and human processes to bypass authentication controls and seize high-value accounts. (Torsten George) Four Risks Boards Cannot Treat As Background Noise The goal isn’t about preventing every attack but about keeping the business running when attacks succeed. (Steve Durbin) Flipboard Reddit Whatsapp Email
    💬 Team Notes
    Article Info
    Source
    Security Week
    Category
    ◇ Industry News & Leadership
    Published
    Mar 31, 2026
    Archived
    Mar 31, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗