Key Points
- Google Quantum AI team released research showing Bitcoin vulnerability may require fewer qubits than previously calculated.
- Study indicates under 500,000 physical qubits could compromise Bitcoin and Ethereum cryptographic security.
- Researchers identified two attack vectors requiring approximately 1,200 to 1,450 premium-quality qubits.
- Quantum computing systems could execute real-time transaction attacks within approximately nine minutes, according to Google.
- Analysis suggests 41% probability of successful transaction interception before network confirmation.
Google’s Quantum AI division released research indicating quantum computing systems could compromise Bitcoin security using fewer qubits than previous projections suggested. The research team made their conclusions public through a detailed blog entry and technical whitepaper released Monday. Scientists connected portions of this vulnerability to modifications introduced during Bitcoin’s 2021 Taproot protocol enhancement.
Quantum Computing Requirements Lower Than Previous Estimates
Research scientists at Google determined that malicious actors could compromise Bitcoin and Ethereum cryptographic protections using under 500,000 physical qubits. This finding contradicts earlier assessments suggesting millions of qubits would be necessary. The research team emphasized that decreased hardware requirements could accelerate the timeline between experimental quantum systems and viable attack scenarios.
The technical whitepaper outlined two distinct attack methodologies requiring approximately 1,200 to 1,450 premium-grade qubits. Scientists explained they could perform preliminary algorithm calculations before executing live transaction interception. They noted quantum computing platforms could finalize the attack sequence within roughly nine minutes.
Bitcoin network transactions typically reach confirmation status after approximately 10 minutes. Based on this timing, scientists calculated a 41% probability of successfully intercepting and redirecting cryptocurrency before network validation completes. Research indicates Ethereum might experience reduced vulnerability due to its faster transaction confirmation speed.
Scientists described how attackers could systematically observe network activity to detect new Bitcoin transfers. During transaction broadcasting, users temporarily expose their public cryptographic keys. Advanced quantum computing hardware could calculate the corresponding private key and reroute the cryptocurrency assets.
Google confirmed it employed zero-knowledge proof methodologies to validate research findings. The team deliberately withheld detailed attack procedures from public documentation. Scientists stated this strategy enables independent verification while protecting against immediate exploitation.
Taproot Protocol Enhancement Creates Additional Attack Surface
Google’s analysis also investigated how Taproot modifications altered Bitcoin’s address architecture. Taproot delivered enhanced transaction efficiency and privacy features following its 2021 implementation. The upgrade introduced default public key visibility on the blockchain ledger.
Previous Bitcoin address formats kept public keys hidden until wallet holders executed spending transactions. Taproot eliminated this protective measure by displaying keys during regular transaction processing. Scientists concluded this architectural decision potentially expands the range of susceptible cryptocurrency wallets.
Research calculations estimate approximately 6.9 million Bitcoin currently reside in wallets with publicly visible keys. This amount represents roughly one-third of total Bitcoin supply. The figure encompasses about 1.7 million Bitcoin generated during the network’s initial operational period.
Analysis also incorporated cryptocurrency affected by repeated address utilization patterns. Meanwhile, CoinShares recently calculated only approximately 10,200 Bitcoin exists in heavily concentrated wallet addresses. Google’s assessment therefore significantly surpasses previous publicly available estimates.
Google has historically referenced 2029 as a potential timeframe for practical quantum computing applications. Current research suggests necessary computational capabilities may arrive sooner than earlier projections indicated. The organization released both the technical whitepaper and explanatory blog post on Monday.





