Essay · apr 05 2026 · ~6 min

Your Bitcoin Is on Borrowed Time

An interactive deep-dive into post-quantum cryptography for blockchain — run real Dilithium, FALCON, and SPHINCS+ in your browser and see why the clock is ticking.

Two research papers landed in early 2025 and the crypto world hasn’t been the same since.

The first, from Google Quantum AI, took Shor’s famous algorithm — the one that theoretically breaks all public key cryptography — and tailored it specifically to crack Bitcoin and Ethereum signatures. Their result: a quantum computer running on just ~1,200 logical qubits can recover your private key from your public key. The quantum circuit is shockingly shallow — only ~100 million Toffoli gates. On a fast superconducting machine, each gate takes ~10 microseconds. Total runtime: under 17 minutes.

Not years. Not days. Minutes.

The second paper, from a Pasadena startup called Oratomic, took Google’s optimized circuit and asked: how many physical qubits does this actually need? Previous estimates said millions. Oratomic, using exotic error-correcting codes called qLDPC on neutral atom hardware, brought that number down to 26,000 physical qubits. That’s a 40x improvement over the previous state-of-the-art. The tradeoff: neutral atoms are slower (~100 Hz vs superconducting’s ~100 kHz), so a single crack takes ~10 days instead of minutes. But the hardware is dramatically simpler to build.

Here’s what makes this terrifying: 25% of all Bitcoin and 65% of all Ether sit in addresses where the public key is already exposed on-chain. Those funds can’t hide. The moment a sufficiently powerful quantum computer exists, they’re gone.

This post is an interactive companion to a research paper I co-authored comparing post-quantum signature schemes for blockchain. Instead of reading tables, you’ll run real cryptography in your browser — sign messages, race algorithms, and see exactly why the clock is ticking.


1. The quantum clock

There are two families of quantum computers racing toward this threshold — and they attack the problem differently.

Fast-clock machines (superconducting, photonic) run at ~100 kHz. Google, IBM, and others are building these. They’d crack a key in minutes, but need ~500,000 physical qubits using conservative surface code error correction (a 400:1 physical-to-logical ratio, already demonstrated by Google on real hardware last year).

Slow-clock machines (trapped ion, neutral atom) run ~1,000x slower at ~100 Hz. Oratomic is building these. A single crack takes ~10 days — but they need only 26,000 physical qubits thanks to more efficient error-correcting codes that bring the physical-to-logical ratio closer to 10:1.

Either way, the destination is the same. Watch the qubit count climb:

the quantum timeline
~1,200
logical qubits
to break secp256k1 ECDSA
Google Quantum AI
~500K
physical qubits
superconducting (400:1 ratio)
surface code — fast, ~minutes
26K
physical qubits
neutral atom (qLDPC, ~10:1 ratio)
Oratomic — slow, ~10 days
Q-Day windowECDSA01.2k5k10k20k35k20182020202220242026202820302032actualprojectedbreak threshold
threshold: 1,200 logical qubitsneutral atom: 26,000 physicalcrack time: ~minutes
Q-Day risk

Once a fault-tolerant quantum computer crosses 1,200 logical qubits, Shor's algorithm can factor the elliptic-curve discrete log underlying ECDSA in ~minutes. At current trajectory, this window opens around 2030–2032 — Q-Day.

25%
of Bitcoin exposed
(P2PK outputs)
65%
of Ether exposed
(reused addresses)
~2030
earliest Q-Day
estimate

The confidence in Q-Day by 2032 — the day a quantum computer recovers a real private key — has shot up significantly. There may be at least a 10% chance it happens. And here’s the thing about low-hanging fruit: the Google optimizations came from surprisingly simple observations. Craig Gidney, the lead author and arguably the world’s top quantum circuit optimizer, squeezed a 10x improvement out of Shor’s algorithm for RSA just last year. This was his team’s first time attacking elliptic curves. AI hasn’t even been tasked to find optimizations yet. The logical qubit count could plausibly go under 1,000 soon.

One more thing that should keep you up at night: Google published their result using a zero-knowledge proof — they proved the algorithm works without revealing the actual optimizations. The message is clear: from now on, assume the best quantum attacks are being self-censored for commercial or national security reasons. A sudden blackout in academic publications would be the tell-tale sign.


2. What’s actually at risk

Let’s be precise about what breaks and what doesn’t.

Bitcoin mining (proof-of-work) is safe. Grover’s algorithm gives quantum computers a quadratic speedup on brute-force search — cutting SHA-256 mining from 2^256 to 2^128 operations. That sounds dramatic, but it’s still astronomically expensive. Commercially viable quantum mining is decades, possibly centuries away.

ECDSA signatures are not safe. Every Bitcoin transaction is signed with ECDSA on the secp256k1 curve. Every time you spend from an address, your public key goes on-chain. From that moment, a quantum computer with ~1,200 logical qubits can derive your private key and drain your wallet.

The worst part: harvest now, decrypt later. Adversaries can record today’s transactions and crack them years from now when quantum hardware matures. Your transaction from 2024 is a ticking time bomb.

Here’s the curve that secures trillions of dollars. Click on it to explore, or switch to signing mode to create a real ECDSA signature:

ecdsa — elliptic curve signatures

click near the curve to snap to a point and see its reflection

xyy² = x³ + 7 (secp256k1 over ℝ)

no point selected — click the curve

The security of ECDSA relies on one assumption: given a public key (a point on the curve), you cannot work backwards to find the private key. This is the elliptic curve discrete logarithm problem. Classical computers can’t solve it. Quantum computers can.


3. How it breaks: Shor’s algorithm

A classical computer trying to crack ECDSA would need to try every possible private key one at a time. For a 256-bit key, that’s 2^256 attempts — more than atoms in the observable universe. At a trillion guesses per second, it would take longer than the age of the universe. ECDSA is provably safe against classical attack.

Shor’s algorithm doesn’t guess. It cheats.

A quantum computer creates a superposition of all possible private keys — testing every single one simultaneously. Then it uses quantum interference to cancel out wrong answers and amplify the right one. One measurement, and the private key falls out.

The circuit is breathtakingly efficient: ~100 million Toffoli gates. Two clever optimizations bring the crack time to single-digit minutes. The first parallelizes computation across multiple quantum devices. The second feeds the public key to the quantum computer mid-flight, after a generic setup phase — meaning the expensive “boot up” only happens once, then you can crack key after key.

Watch it happen. The keys below are real — generated just now in your browser using the same secp256k1 curve that secures Bitcoin:

shor's algorithm — breaking ecdsa
target wallet
pub: ...

Ready. Press run to simulate Shor's algorithm.

This visualization is a simulation — running actual Shor’s requires a quantum computer. But the public key shown is genuine ECDSA, generated with @noble/curves in your browser. A quantum computer wouldn’t need to know the private key to find it. It would derive it from the public key alone.


4. The fix: post-quantum signatures

NIST has standardized three post-quantum signature schemes. Each relies on a different hard problem that quantum computers can’t solve. Let’s meet them.

Contender 1: CRYSTALS-Dilithium (lattice-based)

Dilithium’s security comes from the shortest vector problem in high-dimensional lattices. Try finding the shortest vector in 2D — then imagine doing it in 500 dimensions:

the shortest vector problem

Click the lattice point closest to the origin (the yellow dot). In 2D, this is easy. In 500+ dimensions, it's believed to be impossible — even for quantum computers.

b₁b₂origin
b₁=(3,1) b₂=(1,3)

In 2D, your eyes do the work. In 500+ dimensions, this problem is believed to be NP-hard — no known algorithm, classical or quantum, can solve it efficiently. This is what makes Dilithium quantum-safe.

Now run real Dilithium signing in your browser:

dilithium (ml-dsa) — live in your browser

Contender 2: FALCON (NTRU lattice-based)

FALCON uses a different lattice construction — NTRU — combined with Fast Fourier sampling over a tree structure. It produces the most compact signatures among lattice schemes:

falcon — compact lattice signatures

Contender 3: SPHINCS+ (hash-based)

SPHINCS+ takes a completely different approach — its security relies only on hash functions. No lattices, no number theory. If SHA-256 is secure, SPHINCS+ is secure. It uses a “hypertree” of Merkle trees:

sphincs+ — a forest of hash trees
rootH1.0H1.1H2.0H2.1H2.2H2.3H3.0H3.1H3.2H3.3H3.4H3.5H3.6H3.7L0L15
WOTS+ (one-time signature)

Each leaf is backed by a WOTS+ key — a chain of hash function applications. To sign, you reveal a portion of the chain; to forge, an attacker would need to invert a hash. WOTS+ is used only once, preventing signature reuse attacks.

signing: 864 mssignature: 29.1 KBpub key: 64 B
hash-function security

SPHINCS+ relies exclusively on the collision and preimage resistance of SHA-2 or SHAKE — no lattices, no number theory, no elliptic curves. The tradeoff: signatures are ~29 KB vs. ~3 KB for Dilithium, and signing takes ~860 ms vs. ~0.3 ms. But the security assumption is the most conservative of any NIST PQC standard.


5. The showdown

Now let’s race them. ECDSA, Dilithium, and FALCON sign the same message live in your browser. SPHINCS+ data comes from the research paper (it’s too slow for a comfortable live demo — you’ll see why):

the showdown — benchmark race

Dilithium is the speed king among post-quantum schemes — faster than ECDSA for key generation and verification. FALCON trades slower key generation for more compact signatures. SPHINCS+ is the slowest but has the strongest security assumptions (pure hash functions).


6. The elephant in the block

There’s a problem. Post-quantum signatures are huge. SPHINCS+ signatures are 29KB — compared to ECDSA’s 64 bytes. If every Bitcoin transaction carried a SPHINCS+ signature, a 1MB block would fit almost nothing:

the size problem

every bitcoin transaction must include a public key and a signature so nodes can verify the sender. post-quantum signatures are dramatically larger — which directly limits how many transactions fit in each 1 MB block.

ECDSA64 B sig + 32 B key = 96 B / tx
96 B

~10,416 transactions fit in a 1 MB block

Dilithium3.2 KB sig + 1.9 KB key = 5.1 KB / tx
5.1 KB

~190 transactions fit in a 1 MB block

FALCON666 B sig + 897 B key = 1.5 KB / tx
1.5 KB

~639 transactions fit in a 1 MB block

SPHINCS+ SHA229.1 KB sig + 64 B key = 29.2 KB / tx
29.2 KB

~33 transactions fit in a 1 MB block

SPHINCS+ SHAKE29.1 KB sig + 64 B key = 29.2 KB / tx
29.2 KB

~33 transactions fit in a 1 MB block

Toggle IPFS to see the solution from our paper.


7. The IPFS trick

Instead of storing the full signature and public key on the blockchain, store them on IPFS (InterPlanetary File System) and put only the 32-byte content hash on-chain. Every algorithm’s on-chain footprint becomes identical — 32 bytes:

the ipfs solution
transaction+ full PQ signatureipfsstores full signaturereturns content hashblockchainstores 32-byte hashnot the full sig

press "send a transaction" to begin

This approach reduces FALCON’s mining time by 57% and Dilithium’s by 50%. Block capacity is preserved while gaining quantum resistance.


8. So which one should you pick?

It depends on what you value. Adjust the weights below and see how the ranking shifts:

the verdict — your call

Drag the sliders to set what matters most to you. The ranking updates in real time.

Speed (sign+verify)
50
Key + Sig Size
50
Quantum Safety
80
#1Dilithium
100
0
100
1.30
#2FALCON
99
0
100
1.30
#3SPHINCS+ SHA2
49
0
100
1.05
#4SPHINCS+ SHAKE
0
0
100
0.80
#5ECDSA
100
0
0
0.50

Our paper’s recommendation: Dilithium + IPFS is the sweet spot for most blockchain applications. It has the fastest signing and verification, mature NIST standardization, and the IPFS integration solves its larger key/signature sizes. If you can’t use IPFS, FALCON’s compact signatures make it the better standalone choice.


The clock is ticking

Let’s recap what we know:

  • The algorithm exists. Shor’s algorithm, optimized for secp256k1, needs ~1,200 logical qubits. The circuit is only 100M gates deep.
  • The hardware is closing in. IBM shipped 4,158 qubits in 2025. Google demonstrated error correction on real hardware. Oratomic needs only 26,000 physical qubits.
  • The timeline is real. There’s a meaningful chance of Q-Day by 2032. Not certain — but not negligible.
  • The targets are exposed. 25% of Bitcoin and 65% of Ether have public keys sitting on-chain right now. They can’t be un-exposed.
  • The threat is already active. Harvest-now, decrypt-later means adversaries are recording today’s transactions to crack them tomorrow.

But we also know:

  • The replacements work. You just ran them in your browser. Dilithium signs in under a millisecond. FALCON produces compact signatures. SPHINCS+ relies only on hash functions.
  • The standards are done. NIST finalized ML-DSA, FALCON, and SLH-DSA. The libraries are production-ready.
  • The bloat is solvable. IPFS reduces every signature to 32 bytes on-chain, cutting mining times by 50%+.

The math is settled. The code exists. The only thing missing is the will to migrate.

Every day a blockchain runs on ECDSA alone is another day of accumulated debt to a future that’s arriving faster than anyone expected. The question was never if. It was always when. And “when” just got a lot closer.


Want to try signing your own messages? Head to the playground to run all four algorithms side by side on any text you want.

This post is based on our research paper: A Quantum-Resistant Blockchain System: A Comparative Analysis — Thanalakshmi, Rishikhesh, Marion Marceline, Joshi, Cho (Mathematics, 2023).