As the potential threat of quantum computers looms over the cryptocurrency landscape, experts are increasingly concerned about Bitcoin’s vulnerability to quantum attacks. David Carvalho, CEO of the post-quantum infrastructure company Naoris Protocol, highlighted the dangers, stating that if a quantum computer capable of breaking current encryption were to operational today, Bitcoin would find itself under siege, with the source of the attack remaining hidden from users.
Carvalho emphasized that legitimate access could mask any malicious actions. “Everything would look like legitimate access,” he noted, explaining how users would be unaware of an existing quantum takeover. This alarm exists against a backdrop where researchers at major tech firms and government labs are working to develop new, more secure encryption standards, driven by the urgency imposed by the U.S. National Institute of Standards and Technology (NIST), which has started approving post-quantum algorithms. By contrast, many public blockchains still operate on encryption models designed decades ago.
Current encryption methods for Bitcoin, particularly the Elliptic Curve Digital Signature Algorithm (ECDSA), stand at risk. Proposed in 1985, the ECDSA allows users to authenticate ownership through private keys while keeping public keys visible on the network. Should quantum computers leverage Shor’s algorithm, they could, in theory, extract private keys from public ones, granting unauthorized access to Bitcoin wallets—especially those that have exposed public keys, as seen in earlier Bitcoin transactions. According to Carvalho, this would create an illusion of legitimate activity, masking the actual theft of funds.
The implications could be dire, particularly for early Bitcoin adopters. Kapil Dhiman, CEO of the layer-1 blockchain startup Quranium, pointed out that the most vulnerable would be older wallets, often associated with early Bitcoin miners, including potentially those belonging to its creator, Satoshi Nakamoto. “If those coins move, confidence in Bitcoin will shatter long before the system itself fails,” he explained.
Despite these threats remaining theoretical for now, the situation could change rapidly. Current cracking attempts through conventional means are constrained, given that Bitcoin employs secure 256-bit keys through ECDSA, which remains out of reach for classical computing efforts. Nonetheless, traditional financial institutions are progressing considerably faster in adopting post-quantum encryption strategies compared to the cryptocurrency sector.
Banks and telecommunications companies are actively testing new encryption norms, while major blockchains like Bitcoin lag behind, reliant on older technologies. “All the blockchains have identified this vulnerability as a root cause,” Dhiman asserted, underscoring the urgency of transitioning to quantum-resistant models. Such a transition would necessitate significant changes to Bitcoin’s consensus rules, requiring collaboration among miners, developers, and users—a challenging task in the decentralized crypto ecosystem.
Early proposals for this transformation include Bitcoin Improvement Proposal 360, outlining pathways for integrating new cryptographic schemes and phasing out legacy systems. While Ethereum developers have explored various quantum-resistant signatures, no definitive implementation has yet been established.
In stark contrast, traditional finance is swiftly adapting. The NIST has verified new algorithms and institutions like JPMorgan have begun testing quantum-safe blockchains. Even organizations like SWIFT are commencing initiatives to train their networks on post-quantum security.
Carvalho noted, “Traditional finance is actually ahead,” attributing this advantage to centralized control and resources that facilitate swift upgrades, a stark difference from the decentralized and consensus-driven nature of cryptocurrency systems.
Emerging blockchain projects are formulating themselves to be quantum-ready from the beginning. Naoris Protocol has engaged with regulatory bodies on post-quantum standards, while Quranium employs an NIST-approved digital signature algorithm. Others, such as Quantum Resistant Ledger, utilize XMSS hash-based signatures, which have recently become standardized.
The potential fallout from Bitcoin failing the quantum test could ripple through financial markets, as a loss of confidence among holders could lead to a sharp decline in value. Carvalho elaborated on the real, albeit currently theoretical, risks: “There is a non-zero probability of it being out now. The consensus in the scientific, research, and military communities is that it is not the case.”
He drew parallels to historical breakthroughs in cryptography, recalling the Enigma cipher’s unbreakable reputation during WWII, only to be compromised by Allied cryptanalysts under secrecy. Carvalho’s cautionary note that “when you think you’re seeing a quantum computer, it’s already been in control for months” serves as a warning.
Despite these concerns, experts maintain optimism regarding the development of quantum-secure blockchain systems, advocating for proactive measures to align with the standards gaining traction in traditional finance. “Quantum-secure systems are possible,” Dhiman stated, emphasizing the need for immediate action in building these safeguards before vulnerabilities turn into realities. For now, the encryption protecting Bitcoin remains intact, even as the specter of quantum computing continues to shadow the crypto world.

