

Bitcoin is unlikely to face a meaningful threat from quantum computing for at least two to four decades, according to cypherpunk and Blockstream CEO Adam Back. The longtime cryptographer, who was cited in the original Bitcoin white paper, has addressed growing concerns within the cryptocurrency community regarding the potential impact of quantum computing on Bitcoin's security infrastructure.
Back's assessment came in response to escalating discussions on social media platforms about an imminent "quantum attack" on Bitcoin's cryptographic foundations. He clarified that current fears are overstated and lack technical grounding in the actual state of quantum computing development.
In his recent statement, Back responded to questions about Bitcoin's vulnerability as quantum research accelerates globally. He explained that Bitcoin is "probably not" vulnerable for "20–40 years," emphasizing that the National Institute of Standards and Technology (NIST) has already approved post-quantum encryption standards. These standards provide a clear pathway for Bitcoin to adopt quantum-resistant cryptography long before quantum computers reach the computational power necessary to break SHA-256 encryption.
The cryptographer's perspective is grounded in both the current limitations of quantum hardware and the proactive development of post-quantum cryptographic solutions. This timeline provides the Bitcoin development community with a substantial window to implement necessary security upgrades without compromising the network's integrity or user funds.
Back's measured assessment stands in contrast to more alarming predictions that have gained traction in recent months. A viral video featuring venture capitalist Chamath Palihapitiya suggested that the quantum threat could materialize in as little as two to five years, creating widespread concern among cryptocurrency investors and developers.
Palihapitiya's prediction was based on the calculation that approximately 8,000 qubits would be required to break SHA-256 encryption, the cryptographic hash function that secures Bitcoin transactions. However, Back challenged this timeline by highlighting the significant gap between theoretical qubit counts and practical quantum computing capabilities.
Current quantum computing systems face two fundamental limitations: noise levels and scale. The highest-capacity neutral-atom quantum system, developed at the California Institute of Technology (Caltech), has achieved approximately 6,100 physical qubits. While this represents a significant milestone in quantum computing research, these physical qubits remain far from usable for breaking cryptography due to the substantial error rates inherent in quantum systems.
The challenge lies in the distinction between physical qubits and logical qubits. Physical qubits are highly susceptible to environmental interference and quantum decoherence, requiring extensive error correction mechanisms. Real-world quantum computing applications demand logical qubits—error-corrected quantum bits that can reliably perform computations. Systems with more stable qubit implementations, such as Quantinuum's Helios processor, currently deliver only about 48 logical qubits, a fraction of what would be needed for cryptographic attacks.
Recent advances in gate-based quantum systems have pushed beyond the 1,000 physical qubit threshold, with Atom Computing announcing systems exceeding this milestone. However, this achievement remains orders of magnitude away from the thousands of logical qubits required to execute Shor's algorithm—the quantum algorithm capable of breaking current encryption standards like RSA-2048 or Bitcoin's elliptic curve digital signature algorithm (ECDSA).
While experts across the quantum computing and cryptography communities agree that practical quantum attacks on Bitcoin are not achievable with current technology, the long-term threat trajectory remains a subject of serious consideration. The concept of "harvest now, decrypt later" has emerged as a concern in traditional cybersecurity circles, where adversaries collect encrypted data with the intention of decrypting it once quantum computers become sufficiently powerful. Although this attack vector does not directly threaten Bitcoin's ownership model due to its unique cryptographic architecture, it underscores the broader need for timely security upgrades across digital infrastructure as quantum capabilities continue to evolve.
The debate over quantum preparedness has intensified significantly across the Bitcoin development community throughout the past year. Multiple technical discussions, improvement proposals, and security assessments have emerged as developers and researchers work to ensure Bitcoin's long-term security against quantum threats.
In recent months, on-chain analyst Willy Woo urged Bitcoin users to consider moving coins away from Taproot addresses, arguing that address formats that expose public keys directly could become vulnerable first in a quantum attack scenario. Taproot, Bitcoin's most recent major upgrade, introduced new signature schemes that offer privacy and efficiency benefits but may present different quantum security characteristics compared to legacy address formats.
Former Bitcoin Core developer Jonas Schnelli provided additional context to this discussion, noting that older address formats may offer more short-term protection against quantum threats. However, he emphasized that no user-initiated migration plan can be considered fully safe once quantum machines reach the capability to attack transactions in the mempool—the holding area for unconfirmed Bitcoin transactions. This represents a critical threshold where quantum computers could potentially intercept and compromise transactions before they are confirmed on the blockchain.
The Bitcoin development community is actively examining Bitcoin Improvement Proposal 360 (BIP-360), which introduces quantum-resistant ML-DSA (Module-Lattice-Based Digital Signature Algorithm) signatures. These signatures were selected by NIST in 2024 as part of the agency's post-quantum cryptography standardization project. The proposal, drafted by prominent Bitcoin developer Jameson Lopp, outlines a comprehensive multi-year transition strategy to phase out older signature schemes before quantum computers become a practical threat.
Supporters of BIP-360 argue that it provides essential structure to what would otherwise be a complex and potentially chaotic upgrade process. The proposal establishes clear technical specifications, migration timelines, and backward compatibility considerations. Critics, however, contend that only a comprehensive protocol-level overhaul can provide users with truly reliable protection against quantum attacks, suggesting that incremental improvements may prove insufficient.
Industry perspectives on quantum threat timelines remain notably divided. Some experts, including Solana co-founder Anatoly Yakovenko, warn that a quantum breakthrough within five years cannot be ruled out, particularly as artificial intelligence accelerates quantum research and hardware optimization. This perspective emphasizes the unpredictable nature of technological breakthroughs and the potential for rapid advancement in quantum computing capabilities.
Analysts have estimated that approximately 6 to 7 million BTC currently reside in older address formats that would be first in line for potential quantum attacks. These addresses, primarily P2PK (Pay-to-Public-Key) formats used in Bitcoin's early years, expose public keys on the blockchain, making them theoretically more vulnerable to quantum cryptanalysis compared to newer address types that only reveal public keys during spending transactions.
The practical implications of quantum threats have prompted concrete actions from major Bitcoin holders. El Salvador, which maintains more than 6,000 BTC in its national treasury reserve, recently redistributed its holdings across 14 separate addresses. This strategic move came after security experts criticized the country's previous practice of storing all treasury Bitcoin in a single address, which presented both quantum security concerns and general operational security risks.
Multiple quantum computing researchers have revised their threat timeline projections in recent years, with many now estimating that practical cryptographic attacks could become feasible in the late 2020s or early 2030s. These revised estimates reflect observations that the required quantum machine sizes for breaking cryptography have consistently decreased as hardware efficiency improves and error correction techniques advance.
Some quantum computing startups have made bold claims about specialized quantum architectures with hundreds of thousands of qubits that could potentially threaten 256-bit elliptic curve signatures. While these projections remain speculative and face significant technical hurdles, they contribute to the ongoing urgency around post-quantum security preparations.
Engineers and protocol developers recognize that upgrading decentralized networks like Bitcoin requires substantially more coordination and consensus-building than updating traditional centralized systems. Post-quantum signature schemes typically involve larger cryptographic keys and higher computational overhead, creating challenges for wallet developers, node operators, and miners who must balance security with performance and user experience.
Several Bitcoin-related projects have begun proactively experimenting with post-quantum infrastructure. Rootstock, a Bitcoin sidechain platform, and Naoris Protocol have initiated research into quantum-resistant cryptographic implementations. In the hardware wallet sector, manufacturers like Trezor have responded to quantum concerns by developing devices such as the Safe 7 model, which ships with quantum-secure firmware update mechanisms designed to support future post-quantum cryptographic standards.
The path forward for Bitcoin's quantum security involves balancing immediate practical needs with long-term security considerations. While the 20-40 year timeline suggested by Adam Back provides reassurance that immediate panic is unwarranted, the Bitcoin development community continues to work diligently on implementing robust post-quantum security measures well in advance of any realistic quantum threat. This proactive approach reflects the cryptocurrency ecosystem's commitment to maintaining Bitcoin's security guarantees as computing technology continues to evolve.
Quantum computers could theoretically break Bitcoin's ECDSA encryption used in key generation and transaction signing. However, Bitcoin remains secure for 20-40 years as quantum technology maturation takes time. The network can upgrade its cryptographic algorithms before quantum threats materialize, ensuring long-term security.
Adam Back believes Bitcoin's cryptographic algorithms remain secure against quantum computing for 20-40 years because current quantum technology hasn't advanced sufficiently to threaten existing security protocols. Bitcoin can implement post-quantum cryptography upgrades before quantum computers become a practical threat.
According to cryptographer Adam Back, Bitcoin remains secure from quantum threats for 20-40 years. Current quantum computers lack the capability to break Bitcoin's ECDSA encryption. Significant technological advancement is needed before quantum computing poses a real threat to Bitcoin's security infrastructure.
Bitcoin community is implementing post-quantum cryptography research, developing quantum-resistant algorithms, and planning protocol upgrades. Key initiatives include exploring lattice-based signatures, enhancing wallet security standards, and funding quantum-resistant development. Experts like Adam Back confirm Bitcoin has 20-40 years before quantum computers pose significant threats, allowing time for comprehensive solutions and migration strategies.
Bitcoin would need to transition from ECDSA to quantum-resistant cryptographic algorithms. This could involve implementing post-quantum signature schemes through a soft fork upgrade, allowing users to migrate to quantum-safe address formats while maintaining network security and backward compatibility.
Most Bitcoin holders don't need immediate action. Bitcoin remains secure for 20-40 years against quantum threats. Monitor protocol upgrades and consider moving holdings to quantum-resistant addresses when available. Stay informed about industry developments and official recommendations from the Bitcoin community.











