Start now →

The Clock We Cannot See Is Already Running

By RabbitsResearch · Published April 3, 2026 · 21 min read · Source: Bitcoin Tag
EthereumBlockchainAI & Crypto
The Clock We Cannot See Is Already Running

The Clock We Cannot See Is Already Running

RabbitsResearchRabbitsResearch16 min read·Just now

--

A close reading of the Google Quantum AI & Ethereum Foundation whitepaper on breaking blockchain cryptography and what it actually means

Press enter or click to view image in full size
Press enter or click to view image in full size

There is a particular kind of dread that comes not from chaos, but from clarity. Not the sudden shock of a crisis already unfolding, but the slow, cold recognition that a crisis has been precisely calculated that someone, in a laboratory, has done the math, and the math is not on your side. That is the texture of what Google Quantum AI and the Ethereum Foundation have now handed the world in a 57-page whitepaper released on the final day of March 2026. It arrived without ceremony. It should not have.

For over a decade, the blockchain industry has leaned on a single load-bearing assumption: that breaking elliptic curve cryptography requires a quantum computer so large, so expensive, and so distant in the future that it belongs in the same category as cold fusion or faster-than-light travel. The whitepaper, authored by a team that includes some of the most credentialed researchers in quantum computing, does not say that assumption is wrong. It says it is roughly twenty times more optimistic than reality warrants.

This is not a paper about the future. It is a paper about how close we already are and what the architecture of that proximity actually looks like. To read it carefully is to understand that the threat to Bitcoin, Ethereum, and the broader digital financial infrastructure is not a theoretical horizon. It is an engineering problem. And engineering problems, historically, get solved.

Press enter or click to view image in full size
Press enter or click to view image in full size

Part I The Numbers

What the Whitepaper Actually Found

Let us start with the technical core, because it is easy to get lost in the narrative weight of this paper and miss the precision of what has actually been calculated. The heart of Bitcoin’s and Ethereum’s security rests on the Elliptic Curve Discrete Logarithm Problem (ECDLP) over the secp256k1 curve specifically the difficulty of deriving a private key from a public key. On a classical computer, this is computationally intractable. On a quantum computer running Shor’s algorithm, it is not.

The question has always been: how large does that quantum computer need to be? Previous estimates from Litinski (2023) put the requirement at roughly 9 million physical qubits using a photonic architecture a number large enough to feel safely distant. The Google Quantum AI team, using new algorithmic optimizations they describe through a zero-knowledge proof without revealing the underlying circuits, has reduced that number to fewer than 500,000 physical qubits on a superconducting architecture. That is a nearly twentyfold reduction from the previous best estimate.

Logical Resources Required to Break 256-bit ECDLP

the scatter plot comparing logical qubit count vs. Toffoli gate count across all prior published estimates (Proos+Zalka’04, Roetteler+’17, Häner+’20, Gouzien+’23, Chevignard+’26, Litinski’23) against the two new circuit variants from this paper.

Press enter or click to view image in full size
Scatter plot: X-axis = Toffoli Gates (10M–1T), Y-axis = Logical Qubits (1000–6000). Shows this paper’s two starred data points (low-gates and low-qubits variants) sitting far lower and to the left of all prior work — visually demonstrating the ~20× improvement in spacetime volume.

Why this graph matters: Each dot represents the best published estimate of its era. The two stars at the bottom-left corner are this paper’s results. The gap between the stars and the nearest prior work is not incremental it is structural. It shows that the ceiling of the threat has been dramatically lowered by pure algorithmic improvement, independent of any hardware advance.
The two circuit variants the team has compiled achieve either 1,200 logical qubits with 90 million Toffoli gates, or 1,450 logical qubits with 70 million Toffoli gates. Using standard assumptions about superconducting hardware a 10-microsecond control reaction time, a 50% overhead per Toffoli gate those 70 million gates resolve in approximately 18 to 23 minutes of wall-clock time. When the quantum computer is “primed” (precomputing the portion of the algorithm that depends only on fixed protocol parameters, not the specific public key), the attack time from key exposure to key derivation halves to approximately 9 to 12 minutes.

Bitcoin’s average block time is 10 minutes. That sentence is no longer a reassurance. It is a race condition.

Press enter or click to view image in full size

Part II — Three Ways to Attack

The Taxonomy of Quantum Attacks

Not all quantum attacks are equal, and the paper introduces a taxonomy that is crucial for understanding what protections remain viable and for how long. The distinction hinges on two variables: how long the attacker needs, and what kind of quantum hardware they have.

On-Spend Attacks

The most dangerous category. When a user broadcasts a transaction to the Bitcoin network, it enters the public mempool a holding area visible to everyone before it is confirmed in a block. At that moment, the public key is exposed. An on-spend attack means deriving the private key during that window, then broadcasting a fraudulent competing transaction with a higher fee to replace the original. For this to work, the attacker’s quantum computer must be fast enough to solve ECDLP within the average block confirmation time.

Bitcoin’s 10-minute average block time makes this the critical threshold. The paper estimates that a superconducting CRQC the type Google, IBM, and others are building could achieve private key derivation in approximately 9 minutes from the primed state. This places Bitcoin’s active transactions within on-spend attack range of first-generation fast-clock CRQCs. Litecoin (2.5-minute blocks) reduces success probability to under 3%. Zcash (75-second blocks) and Dogecoin (1-minute blocks) are currently functionally immune to on-spend attacks.

Race Against the Block: Attack Speed vs. Network Variance

the probability curves showing the likelihood of transaction confirmation (Y-axis, 0–100%) over time since broadcast (X-axis, 0–45 minutes) for Bitcoin, Litecoin, Zcash, and Dogecoin, with the vertical dashed line marking ~9-minute CRQC key derivation time.

Press enter or click to view image in full size
Four S-curves (Bitcoin in gold, Litecoin in teal, Zcash in purple, Dogecoin in pink) and a vertical dashed CRQC line at ~9 minutes. The shaded region shows ~41% risk of theft for Bitcoin where the CRQC line intersects before Bitcoin’s block probability curve reaches saturation. Litecoin, Zcash, and Dogecoin curves are already past ~97% confirmation probability by the 9-minute mark.

Why this graph matters: This is the most viscerally communicative figure in the paper. It shows, visually and precisely, that Bitcoin sits in the danger zone while shorter-block-time cryptocurrencies currently do not. The ~41% figure assumes zero network congestion which the attacker can eliminate by flooding the mempool with high-fee transactions. In the adversarial case, the success rate is higher.

At-Rest Attacks

For public keys that are already exposed on-chain not in transit, but sitting in a locking script or previously revealed in a spending transaction the attacker has days, months, or years to derive the private key. This is the slow-burn threat. Slow-clock quantum computers (neutral atom, ion trap) may not be fast enough for on-spend attacks but are perfectly suited for at-rest attacks. These are also the attacks that threaten dormant wallets addresses holding bitcoin that has not moved in years, whose public keys were exposed the moment they ever spent anything.

On-Setup Attacks

The most insidious category, and the one least discussed in mainstream coverage. Some cryptographic protocols use fixed public parameters derived from secret values “toxic waste” that must be destroyed after a setup ceremony. If a CRQC can recover that secret from the public parameters (a one-time computation), it creates a permanent, reusable classical backdoor into the protocol. No further quantum computation required. Ethereum’s Data Availability Sampling mechanism (using KZG commitments) is specifically vulnerable to this attack mode.

Press enter or click to view image in full size

Part III — The Exposed Ledger

Inside Bitcoin: What Is Actually Vulnerable

Bitcoin’s quantum exposure is not uniform it depends entirely on which script type is locking the coins, and whether a public key has ever been revealed. The paper maps this terrain with unusual precision.

The most vulnerable script type is Pay-to-Public-Key (P2PK), used almost exclusively in the early “Satoshi era” of mining. These scripts record the public key directly in the locking script, meaning any CRQC can read it and begin computing the private key without waiting for any transaction. Approximately 1.7 million BTC including the coins widely attributed to Satoshi Nakamoto are locked this way. They have been sitting exposed since 2009. They are, in the language of the paper, “a fixed target.”

The more recently introduced Pay-to-Taproot (P2TR) script, rolled out in the 2021 Taproot soft fork, introduced a surprising regression: it also stores the public key directly in the locking script. Despite being the “modern” Bitcoin address format, P2TR addresses with the bc1p prefix are as vulnerable to at-rest attacks as the original Satoshi-era P2PK coins. In 2025, P2TR represented 21.68% of all Bitcoin transactions meaning a significant and growing fraction of recent Bitcoin activity has been conducted in a quantum-exposed format.

Evolution of BTC Supply Over Time by Protocol Type

the stacked area chart showing the composition of Bitcoin’s total supply over time from 2010–2026, with quantum-vulnerable balances shown in hatched/shaded regions for each protocol type.

Press enter or click to view image in full size
Stacked area chart from 2010 to 2026. Total supply approaches 21M BTC on Y-axis. The hatched vulnerable portions (P2PK in gold, P2TR in red, reused-key addresses in other colors) accumulate to show ~6.9M BTC currently at risk. The orange P2PK floor from 2009–2010 persists all the way to the right edge, representing the unmoved Satoshi-era coins.

The safest standard script types are P2WPKH and P2WSH (using bc1q addresses), which hide public keys behind cryptographic hashes until the moment of spending. These are immune to at-rest attacks unless the owner has ever spent from the same address before, revealing the public key in the process. This is address reuse, and it is remarkably common. Exchanges, merchants, and users who maintain a stable receiving address have inadvertently converted their "safe" P2WPKH addresses into exposed ones.

Press enter or click to view image in full size

Bitcoin’s Proof-of-Work consensus mechanism the mining puzzle is explicitly and emphatically not vulnerable to quantum attacks. The paper is direct: Grover’s algorithm, which could theoretically speed up hash preimage search quadratically, offers no meaningful advantage here. The quadratic speedup is consumed by quantum error correction overhead, and Grover’s algorithm does not parallelize. A quantum miner, under fantastical assumptions, would achieve hashrates two orders of magnitude below current ASIC miners. This is one of the paper’s important clarifications: the threat is to signatures, not to mining.

Part IV — Ethereum’s Wider Surface

Ethereum: Five Distinct Vulnerabilities, One Systemic Risk

If Bitcoin’s quantum exposure is primarily about dormant coins and mempool timing, Ethereum’s exposure is something categorically more complex. The paper identifies five distinct attack vectors across Ethereum’s architecture, each with different technical roots and different scales of potential damage.

1. Account Vulnerability

Unlike Bitcoin, which tracks unspent transaction outputs, Ethereum uses a persistent account model. Once an Ethereum account initiates any transaction, its public key is permanently exposed on-chain. The paper estimates that the top 1,000 Ethereum accounts by ETH balance holding approximately 20.5 million ETH could be compromised by a fast-clock CRQC in under nine days. A quantum attacker does not need to rush. They can work through the list methodically.

Account Vulnerability: Top 1,000 Ethereum Accounts by ETH Balance

the bar chart showing ETH balance (Y-axis, log scale from 10K to 100M ETH) by rank (X-axis, 0–1000), colored orange for accounts that have initiated a transaction (vulnerable) and grey for accounts that have not.

Press enter or click to view image in full size
Vertical bar chart ranked by ETH balance on a log-scale Y-axis. The vast majority of high-value accounts are colored orange (vulnerable), with only occasional grey bars scattered throughout. The sum of orange bars equals ~20.5 million ETH. The pattern communicates that wealth concentration and quantum vulnerability are correlated the richest accounts are also, predominantly, the most exposed.

Why this graph matters: This is arguably the most immediately alarming figure in the entire paper for Ethereum holders. It shows that being wealthy on Ethereum is, structurally, nearly synonymous with being quantum-vulnerable. The top accounts have been active they have transacted and every transaction permanently reveals the public key.

2. Admin Vulnerability

Smart contracts that hold significant assets frequently reserve admin privileges to a handful of Externally Owned Accounts keys that can upgrade the contract’s logic, pause execution, or drain funds. These admin keys are rarely rotated, and because they have been used in governance votes and contract upgrades, their public keys are exposed on-chain. Among the top 500 Ethereum smart contracts by ETH balance, at least 70 are subject to admin key exposure, holding approximately 2.5 million ETH plus, critically, administrative control over roughly $200 billion in stablecoins and tokenized Real World Assets.

The second-order effects are staggering: oracle compromise could trigger cascading DeFi liquidations; bridge compromise could drain entire cross-chain liquidity pools; stablecoin admin compromise could allow unlimited minting, collapsing the peg. The paper notes that RWAs are projected to exceed $16.1 trillion by 2030, most of it on Ethereum the entire tokenized financial stack rests on admin keys that a CRQC could derive in hours.

3. Code Vulnerability

None of Ethereum’s precompiled smart contracts the low-level cryptographic primitives that developers can call currently implement post-quantum cryptographic schemes. All existing zkSNARK-based L2 rollups (Arbitrum, Base, Optimism, zkSync) depend on elliptic curve pairings that are quantum-vulnerable. The paper estimates total Code Vulnerability exposure at ~15 million ETH in Total Value Secured across major L2 protocols and bridges.

Code Vulnerability Profile of Major L2s & Bridges

the horizontal bar chart showing Total Value Secured (millions of ETH) for major L2 protocols and bridges, color-coded by architecture type: Optimistic Rollups (red), Sidechain/Bridge (orange), ZK-SNARK (yellow), ZK-STARK (green).

Press enter or click to view image in full size
Horizontal bars for: Arbitrum One (~6M ETH, red), Base (~5M ETH, red), Hyperliquid, Polygon POS, OP Mainnet (orange/red), Lighter.xyz (yellow/ZK-SNARK), StarkWare STWO, Starknet (green/ZK-STARK), Linea, zkSync Era. Only the green (STARK-based) bars are currently quantum-resistant. The chart makes the quantum risk concentration in the Optimistic Rollup and SNARK-based protocols immediately visible.

Why this graph matters: It distinguishes, at a glance, which L2 protocols are already quantum-resistant (STARKs, which use hash-based proofs) from those that are not (Optimistic Rollups and pairing-based SNARKs). Starknet and StarkWare’s STWO appear in green functionally immune. Arbitrum and Base, which together secure the vast majority of L2 TVS, appear in red. The chart is a risk map for anyone operating in the Ethereum ecosystem.

4. Consensus Vulnerability

Ethereum’s Proof-of-Stake consensus aggregates validator signatures using BLS signatures on the BLS12–381 curve a pairing-friendly curve that requires somewhat more quantum resources to break than secp256k1, but not dramatically more. The paper estimates the additional cost is modest, placing BLS12–381 within reach of the same first-generation CRQCs that threaten standard accounts.

As of February 2026, approximately 37 million ETH is staked. A quantum attacker who compromises more than one-third of validators can halt finality; more than two-thirds grants complete chain control the ability to rewrite transaction history and censor arbitrary transactions. The paper notes that Lido alone represents approximately 20% of staked ETH, and its admin infrastructure has its own key exposure. Concentrated staking means the threshold attacks are closer than uniformly distributed validator counts would suggest.

5. Data Availability Vulnerability

Perhaps the most technically subtle threat. Ethereum’s Data Availability Sampling (DAS) mechanism introduced to allow validators to verify L2 blob data without downloading all of it uses KZG polynomial commitments with a “trusted setup.” The secret generated during that setup (the “toxic waste”) can be recovered from the public Structured Reference String by a CRQC running Shor’s algorithm once. That single computation creates a permanent, reusable classical exploit a backdoor that can then be used repeatedly by anyone, with no further quantum hardware required. This is an on-setup attack, and it converts a one-time quantum capability into an indefinite classical threat.

Part V — Dormant Assets and the Hardest Question

The Problem That Cannot Be Updated

Software can be patched. Protocols can be upgraded. But there is a class of assets that cannot be migrated by any software update, no matter how well-designed: coins whose private keys no longer exist. The approximately 1.7 million BTC in P2PK scripts including what is widely believed to be Satoshi Nakamoto’s own holdings are sitting on-chain with their public keys permanently exposed, controlled by keys that may be lost forever.

The paper estimates roughly 2.3 million BTC across all vulnerable dormant addresses (those inactive for five or more years) when all script types with exposed or reused keys are counted. This is the population that cannot protect itself. Whatever the protocol decides to do with them nothing, burn them, rate-limit their spending the decision will set a precedent for digital property rights that no legal or philosophical tradition has previously encountered.

Cumulative Amount Harvested in a Quantum Salvage Operation

the log-log curve showing cumulative BTC recovered (Y-axis, 10K–1M+ BTC) against time spent on key derivation in days (X-axis, 10⁻² to 1⁰⁷ days), with separate curves for fast-clock (9 min/key) and slow-clock (14h–12d/key) CRQCs, and further split by P2PK-only vs. all addresses.

Press enter or click to view image in full size
Log-log plot showing S-curves for three address pools (All Addresses, All Except P2PK, P2PK Only) each with fast-clock and slow-clock variants. The fast-clock curve rises steeply early, the biggest wallets (2000+ BTC each) are cracked first, then the curve flattens as smaller wallets are processed. Total converges toward ~2.3M BTC. The slow-clock curve is shifted far to the right but ultimately reaches the same total.

Why this graph matters: This figure reframes dormant coins not as lost property but as a time-indexed resource extraction problem. A fast-clock CRQC working through P2PK addresses in order of value would collect approximately 100,000 BTC within the first 10 days. The slow-clock version takes years but eventually reaches the same destination. Either way, the endpoint is the same: someone else’s coins become available to whoever first builds a sufficiently capable machine.

The Bitcoin community is currently debating three broad approaches. Do Nothing accepts that quantum attackers will eventually acquire the coins, betting on market absorption. Burn proposes a soft fork that renders P2PK coins unspendable after a certain date effectively confiscating any bitcoin whose owner has not migrated. Hourglass rate-limits the spending of dormant coins to one per block, slowing the potential supply shock while still allowing eventual recovery. An informal poll at the 2025 Presidio Bitcoin Quantum Summit found roughly equal support for all three.

The paper introduces a fourth option: a “bad sidechain” a purpose-built recovery chain where CRQC operators could deposit recovered dormant coins for ownership adjudication, using offchain proofs like mnemonic codes to identify original owners. The analogy is to maritime salvage law, adapted for digital property.

Part VI — The Path Forward

Post-Quantum Cryptography: What Exists, What Works, and What It Costs

Post-quantum cryptography is not speculative. It is standardized. The U.S. National Institute of Standards and Technology (NIST) finalized its first PQC standards in 2024, including ML-DSA (formerly CRYSTALS-Dilithium, lattice-based) and SLH-DSA (formerly SPHINCS+, hash-based). Falcon, another lattice-based scheme, is already being deployed in production on Algorand with the first PQC-secured transaction executed there in 2025. The XRP Ledger has deployed ML-DSA on its AlphaNet. QRL, Mochimo, and Abelian have used PQC exclusively since launch.

The obstacle is not cryptographic it is economic and social. Post-quantum signatures are large. A Falcon signature is approximately 1,280 bytes; a standard ECDSA signature in Bitcoin is 64–73 bytes. That is a roughly 20× increase in signature size. On Bitcoin, where block size debates have already caused a hard fork (Bitcoin Cash, 2017), introducing a protocol change that expands signature sizes by that factor will require a level of community consensus that has historically been nearly impossible to achieve. The paper notes that even migrating Bitcoin’s current transaction rate to PQC would take several months of network bandwidth dedicated exclusively to address migration and that assumes the migration starts before the first CRQC arrives.

Ethereum’s path looks somewhat more navigable. The Ethereum Foundation functions as an organized, non-profit entity with demonstrated capacity to coordinate major protocol changes as shown by the 2016 DAO hack reversal and the 2022 Proof-of-Stake transition (the Merge). EIP-7932, which proposes precompiles for post-quantum signature verification, is already under discussion. The Foundation has funded research into hash-based multi-signatures to replace BLS12–381 in the consensus layer.

Press enter or click to view image in full size

The Responsible Disclosure Problem

One of the paper’s most intellectually honest sections concerns its own existence. The authors acknowledge a genuine tension: publishing detailed resource estimates motivates the cryptocurrency community to act, but publishing specific circuit details would give adversaries a construction blueprint. Their solution ZK proofs of resource bounds without circuit disclosure is an adaptation of the “responsible disclosure” paradigm from software vulnerability research to quantum cryptanalysis.

The paper argues that detailed cryptanalytic publication should stop: “We believe it is now a matter of public responsibility to share refined resource estimates while withholding the precise mechanics of the underlying attacks.” This is a significant departure from the historical norm in quantum computing, where publishing algorithmic improvements is considered scientifically prestigious. The implicit acknowledgment is that the field has entered a different phase one where the gap between theoretical result and operational capability is closing fast enough to warrant treating cryptanalytic improvements as sensitive information.

There is also a harder warning buried in this section: the final stages of the race to build a CRQC may happen in opacity. Nation-states and well-resourced actors may achieve quantum cryptanalytic capability without announcing it. The paper suggests that the first public sign of a working CRQC may not be a press release it may be an unexplained large transfer from a dormant Bitcoin wallet.

Conclusion

What This Moment Actually Asks Of Us

The paper’s closing argument is urgent without being panicked. The authors explicitly state that they believe the time remaining before CRQCs arrive still exceeds the time needed to migrate public blockchains to post-quantum cryptography but that the margin is narrow and narrowing, and that the process must begin immediately to complete in time.

For individual crypto holders, the near-term implications are practical and concrete. If you hold Bitcoin, avoid using P2TR addresses (bc1p) until post-quantum alternatives are available they expose your public key from the moment of receipt. Use P2WPKH (bc1q) addresses and never reuse them. For Ethereum, understand that any account that has ever sent a transaction has an exposed public key. There is no individual mitigation short of protocol-level PQC adoption but following Account Abstraction (ERC-4337) developments that enable key rotation is prudent.

For the ecosystem at large, the paper’s taxonomy of vulnerability by blockchain type is the most practically useful analytical frame: post-quantum blockchains (QRL, Abelian) face no ECDLP threat; UTXO-based chains (Bitcoin, Litecoin, Dogecoin, Cardano) offer individual users the option to avoid at-rest exposure through disciplined key hygiene; account-model chains (Ethereum, Solana, TRON) make long-term public key exposure structurally inevitable. The transition urgency scales accordingly.

What the paper communicates, most fundamentally, is that the assumption of distance the comfortable sense that quantum computing is someone else’s problem in some other decade is no longer empirically defensible. The numbers have been recalculated, verified by cryptographic proof, and published by the same organization that built the most capable superconducting quantum processors on the planet. They are not speculating about what might be possible. They are describing what they have already compiled.

The clock is running. It has been running. The question is no longer whether to prepare it is whether there is still enough time.

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

Source: Babbush, R., Zalcman, A., Gidney, C., Broughton, M., Khattar, T., Neven, H., Bergamaschi, T., Drake, J., & Boneh, D. (2026). Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations. arXiv:2603.28846 [quant-ph]. Dated April 1, 2026.

Note on figures: All figures referenced in the grey boxes above are taken directly from the source whitepaper. Insert the corresponding figure images extracted from the PDF at each marked location. Figure numbers match those in the original paper exactly. Figures 1, 5, 6, 8, 11, and 14 are the most essential for reader comprehension and are recommended for inclusion in the published piece.

This article was originally published on Bitcoin Tag and is republished here under RSS syndication for informational purposes. All rights and intellectual property remain with the original author. If you are the author and wish to have this article removed, please contact us at [email protected].

NexaPay — Accept Card Payments, Receive Crypto

No KYC · Instant Settlement · Visa, Mastercard, Apple Pay, Google Pay

Get Started →