Close Menu
  • Coins
    • Bitcoin
    • Ethereum
    • Altcoins
    • NFT
  • Blockchain
  • DeFi
  • Metaverse
  • Regulation
  • Other
    • Exchanges
    • ICO
    • GameFi
    • Mining
    • Legal
  • MarketCap
What's Hot

EACC head promotes AI, blockchain tech to African anti-corruption commissions

08/02/2026

Multiliquid, Metalayer launch instant redemption backstop for RWAs on Solana

08/02/2026

Ether’s recent crash below $2,000 leaves $686 million gaping hole in trading firm’s book

08/02/2026
Facebook X (Twitter) Instagram
  • Back to NBTC homepage
  • Privacy Policy
  • Contact
X (Twitter) Telegram Facebook LinkedIn RSS
NBTC News
  • Coins
    1. Bitcoin
    2. Ethereum
    3. Altcoins
    4. NFT
    5. View All

    Price Breaks All-Time High Record Again – Here’s What We Know

    04/08/2025

    Bitcoin Switzerland? El Salvador to Host First Fully Native Bitcoin Capital Markets

    04/08/2025

    Bitcoin Breaks $119K, but XLM and HBAR Aren’t Impressed by Its Meager Percentage Gain

    04/08/2025

    High-Stakes Consolidation Could Define Q3 Trend

    04/08/2025

    Ether’s recent crash below $2,000 leaves $686 million gaping hole in trading firm’s book

    08/02/2026

    Ethereum Derivatives Data Shows Heavy Positioning Near $2,000

    07/02/2026

    Onchain Data Links Two Major ETH Whales via Binance Address

    07/02/2026

    Ethereum Just Broke $2,100! Is This the Start of the REAL Altseason Explosion

    07/02/2026

    The Sui Ecosystem’s Top 3 Altcoin Performers

    29/07/2025

    Floki Launches $69000 Guerrilla Marketing Challenge With FlokiUltras3

    28/07/2025

    Crypto Beast denies role in Altcoin (ALT) crash rug pull, blames snipers

    28/07/2025

    $1.6 Billion XRP Surge: Here’s What’s Unfolding

    28/07/2025

    Justin Bieber Paid $1.3 Million for a Bored Ape NFT. It’s Now Worth $12K

    07/02/2026

    NFT market cap slides back to 2021 pre-hype levels, near $1.5B

    06/02/2026

    Gemini cuts 25% of staff and exits UK and EU markets amid ongoing crypto downturn

    05/02/2026

    Ink-based Perp DEX Nado Airdrops Official NFT Collection

    31/01/2026

    EACC head promotes AI, blockchain tech to African anti-corruption commissions

    08/02/2026

    Multiliquid, Metalayer launch instant redemption backstop for RWAs on Solana

    08/02/2026

    Ether’s recent crash below $2,000 leaves $686 million gaping hole in trading firm’s book

    08/02/2026

    S&P 500 Pullback Extends as Market Momentum Slows

    08/02/2026
  • Blockchain

    Multiliquid, Metalayer launch instant redemption backstop for RWAs on Solana

    08/02/2026

    Animoca Brands Launches Animoca Minds to Open Access to AI Agents

    08/02/2026

    Solana’s Lily Liu Calls for Finance-Focused Blockchain Reset

    07/02/2026

    Fhenix Breaks Blockchain Privacy Barrier With Decomposed BFV Encryption Breakthrough

    07/02/2026

    Solana Partners with Everclear to Optimize Cross-Chain Liquidity and Asset Flows into Web3 Ecosystems

    07/02/2026
  • DeFi

    Coinbase’s Crypto-Backed Loans Notch Record Liquidations Amid Bitcoin, Ethereum Plunge

    07/02/2026

    HPX Taps Phoenix Finance to Integrate RWA-Backed $PUSD Stablecoin

    07/02/2026

    UnifAI Taps HyperGPT to Power AI-Driven DeFi Automation

    07/02/2026

    Lombard Finance Adopts Chainlink Proof of Reserve to Verify LBTC and BTC.b Collateral

    07/02/2026

    Pieverse and TermMax Partner to Launch AI-Driven Fixed-Rate Yields for Agentic DeFi

    07/02/2026
  • Metaverse

    Corning shares surge over 16% after Meta signs $6B data center deal

    27/01/2026

    Mark Zuckerberg’s Meta signs $6B fiber deal with Corning to expand US data centers

    27/01/2026

    Meta to cut 10% of metaverse arm this week amid AI push: Report

    13/01/2026

    Yuga Labs Acquires Otherside Creator Platform From Improbable

    27/12/2025

    Meta CEO Mark Zuckerberg Made a Decision That Will Deeply Affect Metaverse Projects! Here Are the Details

    05/12/2025
  • Regulation

    S&P 500 Pullback Extends as Market Momentum Slows

    08/02/2026

    Argentina Pushes Crypto Deeper Into Everyday Finance

    07/02/2026

    BofA CEO warns against interest-bearing stablecoins

    07/02/2026

    Post-quantum crypto startup Project Eleven raises $20 million in funding round

    07/02/2026

    Strategy’s preferred ‘STRC’ drops below par after ex dividend date

    07/02/2026
  • Other
    1. Exchanges
    2. ICO
    3. GameFi
    4. Mining
    5. Legal
    6. View All

    South Korea Sees Trading Volume Surge in 17 Altcoins – Seen After Major Drop, Here’s the List

    07/02/2026

    Prediction market volume hit $12 billion in January, breaking all-time records

    07/02/2026

    JUST IN! Binance Announces Delisting of Six Altcoins! Huge Price Drops Experiencing!

    07/02/2026

    Binance moves 1,315 bitcoin into SAFU fund as it prepares to buy $1 billion BTC

    07/02/2026

    South Korea Poised to Lift Ban on Domestic ICOs After 7 Years

    19/12/2025

    Why 2025’s Token Boom Looks Both Familiar and Dangerous

    31/10/2025

    ICO for bitcoin yield farming chain Corn screams we’re so back

    22/01/2025

    Why 2025 Will See the Comeback of the ICO

    26/12/2024

    PlayZap Games Joins GENCY AI to Revolutionize AI-Led Advertising in GameFi Sector

    06/02/2026

    Enjin Launches Cross-Game Multiverse Campaign

    05/02/2026

    New ‘Axie Infinity’ Ethereum Gaming Token Will Be Airdropped to AXS Stakers

    05/02/2026

    W3GG Taps Lussaio to Revolutionize Web3 Gaming Experience with Earning Rewards

    01/02/2026

    Is Bitcoin mining profitable?

    07/02/2026

    Stunning 11.16% Drop Signals Major Network Shift

    07/02/2026

    Venezuela’s Oil Industry Resurgence May Precede a Flared-Gas Bitcoin Mining Boom

    07/02/2026

    BitRiver Bankruptcy Case Exposes Russia’s Bitcoin mining sector

    07/02/2026

    EACC head promotes AI, blockchain tech to African anti-corruption commissions

    08/02/2026

    The Persecuted Pioneer Entangled in Biden’s War on Crypto

    06/02/2026

    SEC enters limited operations amid partial U.S. government shutdown

    06/02/2026

    India’s Union Budget 2026 maintains existing crypto taxation regime

    06/02/2026

    EACC head promotes AI, blockchain tech to African anti-corruption commissions

    08/02/2026

    Multiliquid, Metalayer launch instant redemption backstop for RWAs on Solana

    08/02/2026

    Ether’s recent crash below $2,000 leaves $686 million gaping hole in trading firm’s book

    08/02/2026

    S&P 500 Pullback Extends as Market Momentum Slows

    08/02/2026
  • MarketCap
NBTC News
Home»Blockchain»Bitcoin can be hacked, quantum’s biggest breakthrough proves it’s not if but when
Blockchain

Bitcoin can be hacked, quantum’s biggest breakthrough proves it’s not if but when

NBTCBy NBTC06/09/2025No Comments8 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email


Bitcoin may look untouchable, but quantum hardware has already shown the beginning of its end. The question is no longer if but when.

Summary

  • A researcher using IBM’s 133-qubit machine cracked a six-bit elliptic curve key, proving Shor’s algorithm works on real hardware beyond theory.
  • History shows cryptographic systems once considered secure, from Enigma to DES to SHA-1, eventually fell as computing methods advanced.
  • Bitcoin relies on 256-bit elliptic curve cryptography, which remains unbreakable today, but quantum computing threatens to reduce that strength to a solvable problem.
  • Experts estimate billions of physical qubits would be needed to break Bitcoin’s keys, yet progress and government reports warn such machines may arrive within decades.
  • Governments, companies, and developers are already preparing post-quantum defenses, but Bitcoin’s upgrade path requires global coordination, making its future security not a question of if but when.

Table of Contents

  • A scratch on Bitcoin’s long-standing wall
  • Today’s standard, tomorrow’s flaw
  • Billions of qubits away from a breakthrough
  • Building defenses before the quantum storm

A scratch on Bitcoin’s long-standing wall

On Sep. 2, Steve Tippeconnic, a researcher using IBM’s 133-qubit machine, achieved something that until recently existed only in theory.

https://t.co/mGgItaybRE

— Steve Tippeconnic (@stevetipp) September 2, 2025

A small elliptic curve cryptographic key was broken with the help of quantum interference, proving that Shor’s algorithm could move beyond the chalkboard and survive real hardware.

The key was only six bits long, giving just 64 possible answers. Any phone today could brute-force it instantly. Yet that was never the point.

The breakthrough lay in showing that quantum circuits running hundreds of thousands of layers deep can still carve out patterns strong enough to reveal the right answer.

The recovered key, k = 42, surfaced three times among the top 100 results after more than sixteen thousand runs. That success rate may sound unimpressive at first, just over one percent, but in cryptography, it meant everything.

It confirmed that a quantum machine could reliably amplify the correct solution even when noise, false candidates, and hardware errors flooded the measurement space. The critical shift was that the math worked in practice, not just in simulation.

For Bitcoin (BTC), nothing changed overnight. Six bits are a child’s toy compared with the 256-bit keys protecting its network. The difference between 64 options and 2^256 possibilities is astronomical. What did change is the conversation.

Today’s standard, tomorrow’s flaw

History shows that cryptographic systems once regarded as secure eventually fail as computing methods advance. The German Enigma machine is the most famous example.

Used extensively by Nazi Germany during the Second World War, Enigma encrypted military communications ranging from submarine movements to battlefield orders.

It relied on a rotating set of substitution ciphers that produced more than 150 quintillion possible configurations, convincing German command that their messages were unbreakable.

Allied codebreakers at Bletchley Park, supported by early mechanical devices such as the Bombe and later the Colossus computer, reduced the problem to manageable form.

The breakthrough exposed German communications in real time and shortened the war, showing for the first time that brute human ingenuity combined with new machines could overcome even vast mathematical defenses.

In the 1970s, the U.S. developed the Data Encryption Standard, or DES, to secure government and commercial communications in an era when banking and computing networks were expanding rapidly.

The 56-bit key length was considered strong enough against contemporary hardware and became a federal standard.

By 1998, however, the Electronic Frontier Foundation demonstrated how quickly progress could erode that security. It built a purpose-designed machine called Deep Crack that brute-forced a DES key in 56 hours at a cost of about $250,000.

Shortly after, the volunteer collective Distributed.net combined global computing resources to shrink the attack time to just 22 hours.

These milestones proved DES obsolete. Within a few years, it was formally retired and replaced by the Advanced Encryption Standard, which continues to protect government, corporate, and consumer systems today.

Hash functions followed a similar path. The SHA-1 algorithm, introduced in 1995, became the backbone of digital certificates, software updates, and online signatures, securing much of the early web.

For years, it resisted practical attack and was trusted by browsers, certificate authorities, and governments. That confidence ended in 2017 when researchers from Google and CWI Amsterdam announced SHAttered, the first practical collision attack on SHA-1.

They produced two distinct PDF files with the same hash, proving that the algorithm could be manipulated and was no longer reliable for security.

Within months, major browsers and certificate authorities abandoned SHA-1, forcing the shift to stronger standards such as SHA-256.

These cases reveal a consistent pattern. Systems once thought unassailable eventually became vulnerable, not through design flaws but because computing power and algorithms kept advancing.

Billions of qubits away from a breakthrough

Bitcoin’s elliptic curve cryptography relies on 256-bit keys. That size equates to about 1.16 × 10^77 possible combinations.

According to NIST standards, a 256-bit key provides 128-bit security strength, which is considered computationally infeasible to brute force on classical machines. Independent estimates show such an attack would take longer than the age of the universe.

Quantum computing introduces a different model. Shor’s algorithm reduces the problem of discrete logarithms from exponential to polynomial time, scaling with the cube of the input size rather than with 2^n.

A 2017 study by Microsoft researcher Martin Roetteler and colleagues estimated that breaking a 256-bit elliptic curve key would take on the order of a few thousand logical qubits, around 2,300 by their calculations

Since today’s qubits are error-prone, those logical qubits would translate into billions of physical qubits once error correction is factored in.

Current hardware is nowhere near that scale. IBM’s largest processor, Condor, unveiled in December 2023, has 1,121 qubits, while Google’s Willow chip reached 105 qubits in 2024. Yet even these leading prototypes still rely on noisy qubits that cannot sustain long or error-corrected algorithms.

According to a 2025 report by the U.S. Government Accountability Office, experts foresee the potential emergence of cryptographically relevant quantum computers capable of breaking widely used public key encryption within about 10 to 20 years.

The Global Risk Institute’s 2024 expert survey echoes the uncertainty, suggesting such systems remain plausibly feasible over the long term, though still decades away.

Building defenses before the quantum storm

Governments and companies have already started planning for a time when today’s encryption no longer holds.

In 2016, the U.S. National Institute of Standards and Technology (NIST) opened a global competition to design quantum-resistant cryptography. From more than 80 submissions, four algorithms were selected in 2022 for standardization.

These include CRYSTALS-Kyber for key exchange and CRYSTALS-Dilithium, Falcon, and SPHINCS+ for digital signatures. NIST has stated that formal standards will be published by 2026, giving governments and industries a clear path toward migration.

National security agencies are tying policy to these technical standards. The U.S. National Security Agency has mandated that all classified and national security systems move to post-quantum algorithms by 2035, and Canada and the European Union have launched similar initiatives.

Cloudflare has moved beyond planning. As of early 2025, more than 38 % of all human HTTPS traffic across its network uses hybrid TLS, a mix of classical and post-quantum key exchange by default. In some European countries, post-quantum encryption already exceeds 50 % adoption.

The company has also built post-quantum protection into its Zero Trust suite, extending coverage to internal corporate traffic via platforms like Gateway, Access, and WARP clients, with full support rolling out by mid-2025.

Central banks and financial regulators have issued guidance warning institutions to prepare for “harvest now, decrypt later” risks, where encrypted records captured today could be exposed once quantum machines reach the required scale.

Bitcoin sits within this larger transition. Its reliance on the elliptic curve secp256k1 makes it directly exposed to quantum advances, yet protocol changes require global coordination.

Academic proposals describe how new signature schemes could be introduced through optional script upgrades, allowing post-quantum addresses to exist alongside classical ones.

Developer discussions show both the urgency and the difficulty of such changes, since even minor upgrades require consensus across miners, exchanges, and users.

The six-bit elliptic curve experiment on IBM’s ibm_torino machine in 2025 proved the concept at a small scale, showing that Shor’s algorithm could run on real hardware rather than only in theory.

Tasks that once seemed impossible often become routine once methods and machines catch up. Factoring large integers, once out of reach, is now trivial for classical algorithms up to many hundreds of digits. Protein folding, long thought unsolvable, is now handled by AI models in minutes.

The same arc applies to cryptography. Bitcoin’s 256-bit wall cannot be breached today, but the mathematics, algorithms, and hardware roadmaps all point to a future where that barrier may no longer hold.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NBTC

Related Posts

Multiliquid, Metalayer launch instant redemption backstop for RWAs on Solana

08/02/2026

Animoca Brands Launches Animoca Minds to Open Access to AI Agents

08/02/2026

Solana’s Lily Liu Calls for Finance-Focused Blockchain Reset

07/02/2026

Fhenix Breaks Blockchain Privacy Barrier With Decomposed BFV Encryption Breakthrough

07/02/2026
Add A Comment

Comments are closed.

Top Posts
Get Informed

Subscribe to Updates

Get the latest news from NBTC regarding crypto, blockchains and web3 related topics.

Your source for the serious news. This website is crafted specifically to for crazy and hot cryptonews. Visit our main page for more tons of news.

We're social. Connect with us:

Facebook X (Twitter) LinkedIn RSS
Top Insights

EACC head promotes AI, blockchain tech to African anti-corruption commissions

08/02/2026

Multiliquid, Metalayer launch instant redemption backstop for RWAs on Solana

08/02/2026

Ether’s recent crash below $2,000 leaves $686 million gaping hole in trading firm’s book

08/02/2026
Get Informed

Subscribe to Updates

Get the latest news from NBTC regarding crypto, blockchains and web3 related topics.

Type above and press Enter to search. Press Esc to cancel.