Abstract
secp256k1 curve used
by Bitcoin and Ethereum. The claimed figures — roughly 1,200–1,450 logical qubits and
70–90 million Toffoli gates — represent approximately a
10× spacetime-cost reduction over prior best single-instance estimates, and could place the
physical-qubit requirement below 500,000 under standard superconducting-hardware assumptions.
This analysis examines the paper's technical claims, evaluates its zero-knowledge verification mechanism,
dissects its three-part attack taxonomy, and draws practical conclusions for organisations navigating the
post-quantum transition — while distinguishing between what the paper directly establishes and what these results more broadly suggest for PQC planning.
See also our publication series.
Key Points at a Glance
- ~10× spacetime-cost reduction: The paper's compiled circuits for the 256-bit ECDLP require roughly 1,200 logical qubits with 90M Toffoli gates, or 1,450 logical qubits with 70M Toffoli gates — an order-of-magnitude improvement over previous single-instance estimates.
- <500K physical qubits: Under standard superconducting-hardware assumptions (10−3 physical error rate, planar connectivity), the attack may be feasible with fewer than half a million physical qubits — far below widely cited "millions of qubits" figures.
- Zero-knowledge verification: The authors do not publish the attack circuits. Instead, they provide a ZK proof — via the SP1 virtual machine and Fiat–Shamir construction — supporting their claim that they possess size-bounded circuits for the key
secp256k1point-addition subroutine underlying their resource estimates. - Three attack classes: The paper introduces a taxonomy of on-spend (mempool race), at-rest (dormant key recovery), and on-setup (one-time quantum → reusable classical exploit) attacks — each with distinct feasibility thresholds.
- On-spend attacks are plausible on fast-clock architectures: Precomputation reduces the relevant attack time to 9–12 minutes, overlapping with Bitcoin's 10-minute block interval.
- Ethereum's attack surface extends far beyond accounts: Admin keys, smart-contract logic, validator keys, and ZK-proof trusted setups create five distinct vulnerability categories.
- Dormant assets (~2.3M BTC) are a hard legacy problem: Successful forward migration does not protect coins whose owners are absent or whose keys are already lost, which is why the paper turns to governance and policy responses as well as technical ones.
1. The Headline Numbers — A 10× Cost Reduction
The central quantitative result concerns the circuit resources needed to run Shor's algorithm against the
256-bit ECDLP on secp256k1. The authors present two primary circuit variants, differing in their
space–time trade-off:
| Parameter | Variant A (space-optimised) | Variant B (depth-optimised) |
|---|---|---|
| Logical Qubits | ~1,200 | ~1,450 |
| Toffoli Gate Count | ~90 million | ~70 million |
| Physical Qubits (superconducting) | < 500,000 | |
| Estimated Runtime | ~23 minutes | ~18 minutes |
| Precomputed Response Time | ~12 minutes | ~9 minutes |
These figures assume a superconducting architecture with physical error rates of 10−3, planar qubit connectivity, and a control-system reaction time of approximately 10 μs. The authors claim roughly a 10× improvement in overall spacetime cost compared to the best prior single-instance estimates for this problem.
To contextualise this: earlier widely-cited resource estimates for breaking ECC often quoted millions of physical qubits. The sub-500K figure significantly compresses the timeline implied by hardware roadmaps from IBM, Google, and other quantum computing companies. As we noted in our analysis of the harvest-now, decrypt-later (HNDL) threat, a 20× resource reduction for RSA-2048 was already demonstrated in early 2025. This paper extends the same downward pressure to ECC in the cryptocurrency setting. More broadly, it adds to the case that other security-critical systems built on ECDLP-based cryptography — including the X25519 key exchange widely used in TLS 1.3 — should not assume older resource estimates remain the right planning benchmark.
⚠️ Why This Matters Beyond Blockchain
While the paper focuses on secp256k1, the underlying techniques — modular arithmetic
optimisations, improved point-addition circuits, better Toffoli-gate compilation — are relevant beyond one
blockchain curve. The X25519 (Curve25519) key exchange that dominates
TLS 1.3 traffic relies on the same ECDLP hardness assumption.
The paper does not directly provide X25519-specific resource estimates, but it strengthens the broader case
that elliptic-curve systems of comparable scale should be reviewed against more aggressive quantum-cost assumptions.
2. Verify Without Revealing — The Zero-Knowledge Approach
Perhaps the most methodologically unusual aspect of the paper is what it does not publish. The authors
argue that the field has reached a maturity where publishing better cryptanalytic circuits creates tangible
misuse risk. A complete circuit specification for the ECDLP on secp256k1 is, in effect, a
blueprint for stealing cryptocurrency. They therefore withhold the circuits themselves.
This creates an obvious problem: how can the community evaluate claims it cannot inspect? The paper's answer is a zero-knowledge proof (ZKP) that supports the resource estimates without revealing the underlying circuits, though the proof is narrower than a full disclosure of an end-to-end attack implementation. The construction works as follows:
🔐 The ZK Verification Mechanism
1. Claim: The authors assert they possess quantum circuits of the claimed size for the elliptic-curve point-addition work that dominates the attack cost, rather than publishing the full attack circuits themselves.
2. Test generation: Using a Fiat–Shamir-style construction, a set of random test cases tied to the hidden circuit is generated so the prover cannot simply choose favourable inputs.
3. Execution: Those tests are checked inside the SP1 zero-knowledge virtual machine (a RISC-V-based zkVM), which verifies the relevant point-addition behaviour and the claimed size bounds without exposing the circuit description.
4. Proof: The verifier receives evidence supporting the resource claim without receiving the attack blueprint itself.
This construction does not constitute a full mathematical proof that the authors have published a complete end-to-end ECDLP attack circuit. Instead, it provides narrower evidence about the correctness of the point-addition subroutine on sampled inputs — a meaningful credibility boost, though not the same as full public circuit disclosure. However, it raises the credibility threshold substantially above a bare assertion. The approach is also significant as a precedent: it establishes a model for responsible disclosure in quantum cryptanalysis, analogous to coordinated vulnerability disclosure in software security.
For practitioners, the key takeaway is pragmatic: treat these estimates as credible lower bounds. Even if the exact circuits require further refinement, the direction of travel is unambiguous — the cost of attacking ECC is falling, and it is falling faster than many public roadmaps assumed.
3. Three Kinds of Quantum Attack on Blockchains
One of the paper's most useful contributions is a structured taxonomy of quantum attacks against blockchain systems. Rather than treating "quantum breaks crypto" as a monolithic event, the authors identify three operationally distinct attack classes, each with different timing requirements, capability thresholds, and mitigation profiles:
On-Spend Attack
The attacker monitors the mempool for unconfirmed transactions, extracts the public key from the transaction's signature data, derives the corresponding private key via ECDLP, and broadcasts a competing fraudulent transaction before the original is confirmed.
Constraint: Must complete within the block interval (~10 min for Bitcoin).
Window: 9–12 min (precomputed)At-Rest Attack
Targets public keys already exposed on-chain — either through legacy P2PK outputs, address reuse, or transaction history. The attacker can operate offline over days or weeks with no time pressure.
Constraint: Only requires a large enough quantum computer; no speed requirement.
Window: days to weeksOn-Setup Attack
A quantum computer recovers secret parameters from a cryptographic setup ceremony (e.g., trusted setup "toxic waste" in ZK-SNARK systems). This one-time quantum effort produces reusable classical exploits — no further quantum access needed.
Constraint: One-time quantum computation; unlimited classical exploitation thereafter.
Window: once, then indefiniteThis taxonomy matters because it breaks the simplistic narrative that "quantum will break everything at once." In reality, the three attack classes will become feasible at different points on different hardware platforms. As we explored in our analysis of Bitcoin's quantum vulnerability, the at-rest attack is the most forgiving for the attacker — exposed keys from 2009 P2PK addresses can be targeted without any time pressure. The on-spend attack, by contrast, requires not just a sufficiently large quantum computer but a sufficiently fast one.
The on-setup attack is perhaps the category with the most severe long-term consequences. If a quantum attacker recovers the toxic-waste parameters from a ZK-proof trusted setup, they obtain the ability to forge proofs indefinitely using only classical computation. This converts a single quantum computation into a permanent backdoor — an asymmetry that substantially amplifies the threat.
4. Fast Clock vs. Slow Clock — When Timing Changes Everything
The paper introduces a crucial architectural distinction that determines which attacks become feasible first. Quantum hardware platforms differ dramatically in their native gate speeds and error-correction cycle times:
| Architecture Class | Platforms | Gate Speed | On-Spend Feasible? |
|---|---|---|---|
| Fast-Clock | Superconducting, Photonic, Silicon-Spin | ns – μs range | Yes — 9–12 min with precomputation |
| Slow-Clock | Neutral Atom, Ion-Trap | μs – ms range | At-rest only (initially) |
The distinction is consequential. On a fast-clock superconducting machine, the full ECDLP attack completes in 18–23 minutes. But the authors demonstrate that an attacker can precompute approximately the first half of the attack, since that portion depends only on shared protocol parameters (the curve generator point, field modulus, etc.) rather than the victim's specific public key. Once the target's public key appears in the mempool, the attacker resumes from this primed state, reducing the relevant response time to approximately 9–12 minutes.
🚨 Precomputation Makes On-Spend Attacks Plausible
The overlap between the precomputed response time (9–12 min) and Bitcoin's average block interval (~10 min) is not a comfortable margin — it is an operational threat window. The paper further notes that an attacker running multiple primed machines in parallel could reduce the response time further. Mempool monitoring, transaction replacement (RBF), and network-level delays all favour the attacker in this scenario.
For slow-clock architectures (neutral atoms, ion traps), the ECDLP computation would take substantially longer due to slower error-correction cycles. These platforms would likely enable at-rest attacks first — recovering private keys from long-exposed public keys over a period of days. On-spend mempool races would remain impractical until clock speeds improve or parallelism compensates. This means the order in which attacks become feasible depends on which hardware platform matures first — a variable that is increasingly difficult to predict as multiple architectures advance simultaneously.
The timing analysis also has direct implications for our earlier discussion of TLS 1.3 quantum vulnerabilities. The same precomputation technique applies to any protocol where the victim's ephemeral ECDH public key is transmitted before session establishment completes — making the window for harvest-now, decrypt-later attacks even narrower than a static analysis of qubit counts would suggest.
5. Beyond Bitcoin — Ethereum's Expanded Attack Surface
While Bitcoin's quantum risk centres primarily on signature forgery and exposed keys, Ethereum presents a substantially broader attack surface. The paper organises Ethereum-specific vulnerabilities into five categories, each exploiting different layers of the platform's cryptographic and governance infrastructure:
| Category | Target | Attack Mechanism | Severity |
|---|---|---|---|
| Account | Externally Owned Accounts (EOAs) | Derive private key from exposed public key → seize account | High |
| Admin | Upgrade keys, multisigs, guardians | Compromise admin key → alter contract logic, mint tokens, seize governance | Critical |
| Code | ECC-dependent application logic | Break ECC assumptions in privacy systems, bridges → produce reusable classical exploits | Critical |
| Consensus | Validator / staking keys | Compromise validator keys → disrupt or dominate Proof-of-Stake consensus | High |
| Data Availability | ZK-proof setups, sampling mechanisms | Recover toxic-waste parameters → forge proofs, undermine DA checks (on-setup attack) | Critical |
The admin vulnerability category deserves particular attention. Many high-value Ethereum smart contracts — DeFi protocols, bridges, treasuries, token systems — depend on administrator keys for upgrades and governance. These keys are often standard EOAs. Compromising an admin key does not merely steal one account's funds; it can alter the logic of the entire contract system, potentially affecting millions of users. This is qualitatively different from Bitcoin's key-exposure problem and represents a systemic risk amplifier.
The code vulnerability category connects directly to the paper's on-setup attack class. Protocols that embed ECC-based assumptions in application logic — privacy systems like Tornado Cash, cross-chain bridges, or advanced cryptographic constructions — can be attacked once with a quantum computer to produce classical exploits that remain effective indefinitely. The quantum computer becomes a one-time key that unlocks a permanent backdoor. This is one of the paper's most important observations, and it underscores a point we made in our discussion of key exchange vs. digital signatures: the distinction between ephemeral key agreement and long-lived cryptographic commitments has profound security implications in a post-quantum world.
💡 Taproot: A Quantum Regression?
The paper highlights a counterintuitive finding about Bitcoin's Taproot upgrade. While Taproot improves flexibility, privacy, and transaction efficiency, its Pay-to-Taproot (P2TR) outputs place a tweaked public key directly in the locking script — making these outputs vulnerable to at-rest quantum attacks in the same way as legacy P2PK outputs. From a quantum-security perspective, Taproot represents a regression relative to hash-hidden address formats (P2PKH, P2WPKH), which at least protect the public key until spending time. The authors discuss a draft proposal called Pay-to-Merkle-Root as a potential fix that retains Taproot's benefits while restoring hash-based key hiding.
6. The Dormant Asset Problem That Forward Migration Alone Cannot Fix
Our previous analysis of Bitcoin's quantum vulnerability covered the "Lost Coins Dilemma" — Satoshi's estimated 1.1 million BTC on exposed P2PK addresses. The Google paper extends this analysis and arrives at a starker conclusion: dormant vulnerable assets constitute a fixed future target that protocol-level migration, by itself, cannot address.
The numbers are significant: over 1.7 million BTC are locked in P2PK outputs where the public key is visible on-chain from creation. Including reused addresses and other exposed key types, the total vulnerable dormant pool may reach approximately 2.3 million BTC. Because many of the original owners are absent, deceased, or have lost access, voluntary migration to quantum-safe addresses may be impossible for a large share of this class of assets.
The paper outlines four broad community responses under discussion:
- Do nothing: Accept that these coins will eventually be claimable by whoever achieves quantum capability first.
- Burn: Render vulnerable dormant coins unspendable via a protocol-level change — effectively destroying potentially billions of dollars in value.
- Hourglass recovery: Implement a time-delayed recovery mechanism that allows owners to prove ownership through non-quantum-vulnerable means (e.g., hash-based challenges) before the quantum deadline.
- "Bad sidechain": Route recovered assets through a dedicated sidechain that attempts to identify rightful owners using off-chain proofs — mnemonic phrases, notarized records, identity registries. The "bad sidechain" analogy borrows from the "bad bank" concept used to manage distressed financial assets.
The paper's policy discussion — unusual for a cryptography paper — proposes "digital salvage" as a regulatory framework: the recovery of dormant quantum-vulnerable assets would be treated as a regulated activity, analogous to maritime salvage law. This reflects the authors' recognition that technical fixes cannot address the full scope of the problem; legal and governance frameworks must co-evolve with the cryptographic transition.
7. What This Means for Your Post-Quantum Roadmap
The practical implications of this paper are most immediate for the blockchain community, but they also matter more broadly for systems that still rely on ECDLP security — including TLS key exchange, code signing, IoT device authentication, and public-key infrastructure (PKI). Here is how the paper's findings, together with the broader conclusions we draw from them, connect to the migration strategies we have covered across our publication series:
Hybrid key exchange is the immediate defence. Strictly speaking, the paper does not directly analyze hybrid deployment in TLS. But its lower attack-cost estimates reinforce the urgency of deploying hybrid X25519 + ML-KEM-768 key exchange in TLS and other protocols. Hybrid mode ensures that even if ECC falls sooner than expected, the lattice-based component maintains confidentiality. BSI and NIST both recommend this approach, as we detailed in our BSI compliance analysis.
Signatures must transition too. That specific recommendation goes beyond the paper's cryptocurrency focus, but it follows naturally from the same pressure on elliptic-curve assumptions. Key exchange protects future confidentiality, but digital signatures protect authenticity and integrity. Code signing, firmware updates, and software supply chains all depend on ECC signatures today. Our analysis of post-quantum code signing outlines the migration path for this critical use case.
Constrained devices cannot wait. This is a broader PQC planning conclusion rather than a direct claim of the paper, but it is a reasonable one: IoT and embedded systems have the longest upgrade cycles and the most restrictive resource constraints. As we explored in our PQC in IoT analysis, devices deployed today with 10–15 year lifespans will operate well into the period where these attacks may become practical. Firmware update mechanisms and crypto-agility must be engineered in now.
SMBs need a structured migration roadmap. Again, this is our broader implementation takeaway rather than the paper's direct recommendation. For small and medium businesses that lack dedicated cryptographic expertise, our PQC SMB roadmap provides a phased approach: inventory → prioritise → pilot → deploy. The compressed timeline implied by this paper means the inventory phase should begin immediately.
PQC is the pragmatic choice; QKD is a complement, not a substitute. The paper itself is about post-quantum migration in cryptocurrencies, not a direct PQC-versus-Quantum Key Distribution (QKD) comparison. But as we argued in our PQC vs. QKD comparison, post-quantum cryptographic algorithms provide software-deployable, internet-scale protection. QKD offers specialised advantages for specific high-value links but cannot replace the need for algorithmic migration.
📋 Five Actionable Recommendations
- Recalibrate your quantum timeline. Treat sub-500K physical qubits as a credible planning threshold under the paper's stated superconducting-hardware assumptions. Do not anchor to older "millions of qubits" estimates.
- Deploy hybrid key exchange now. The paper does not directly prescribe a TLS migration plan, but its lower
secp256k1estimates strengthen the case for enabling X25519 + ML-KEM-768 in TLS, Virtual Private Network (VPN), and messaging systems. The overhead is manageable; the protection against HNDL is immediate. - Audit your ECC surface area. Start with the systems the paper speaks to most directly — cryptocurrency and blockchain exposure — but do not stop there. Inventory every system, protocol, and device that relies on ECDLP security, including code signing, PKI, and embedded firmware.
- Plan for the dormant-asset problem. Blockchain projects should begin governance discussions about legacy vulnerable assets before the quantum deadline, not after. Here the paper's warning is direct, not speculative.
- Do not wait for a public demonstration. The paper explicitly warns that quantum progress may become less transparent near the finish line. A dramatic public proof-of-concept may not precede the first real attack. Migrate proactively.
The paper's closing message aligns with the consistent theme across our real-world PQC deployment analysis: the quantum threat to elliptic-curve cryptography is no longer a theoretical abstraction to be addressed "someday." It is a concrete engineering and governance challenge with quantifiable parameters, hardware-dependent timelines, and asymmetric consequences for those who act late. A prudent assumption is that capability may arrive with less warning and less public visibility than many observers expect. The time to prepare is now.
Further Reading
For a detailed walkthrough of how hybrid post-quantum key exchange works in practice — including the algorithms, the TLS handshake changes, and who is already shipping it — see our technical briefing:
Read: Hybrid TLS Key Exchange →References
- Google Quantum AI. (2026). Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations. https://quantumai.google/static/site-assets/downloads/cryptocurrency-whitepaper.pdf