Back to Blog

How Long Does a Quantum Computer Need to Break a Bitcoin Wallet? The Real Numbers

Every article about quantum computing and Bitcoin throws around vague timelines. This one gives you the actual mathematics. How long would it take a quantum computer to break a Bitcoin wallet? The answer depends on three variables — qubit count, error rate, and which Bitcoin address format your funds are in. Here is the precise technical breakdown that most crypto writers are afraid to publish because it requires real homework.

The Attack: Shor’s Algorithm Against ECDSA secp256k1

Bitcoin uses Elliptic Curve Digital Signature Algorithm (ECDSA) with the secp256k1 curve — a 256-bit elliptic curve over a prime field. The private key is a 256-bit integer. The public key is a point on the curve derived from the private key. The one-way function is the Elliptic Curve Discrete Logarithm Problem (ECDLP): given the public key point Q and the generator point G, find integer k such that Q = k·G. On classical hardware this requires sub-exponential time — specifically O(√p) operations where p ≈ 2^256, making it computationally infeasible. Shor’s quantum algorithm for the ECDLP solves this in O(n³) time where n is the bit length of the curve — meaning a 256-bit curve requires roughly 256³ ≈ 16.7 million basic quantum operations.

Translating Quantum Operations to Real Hardware Requirements

The 2022 paper by Mark Webber et al. published in AVS Quantum Science gives the most rigorous public estimate. Their analysis found: to break a Bitcoin address in 1 hour requires approximately 317 million physical qubits at current error rates. To break it in 10 minutes (within a single Bitcoin transaction window) requires approximately 1.9 billion physical qubits. To break it in 24 hours requires approximately 13 million physical qubits. The figures assume a physical-to-logical qubit ratio of approximately 1,000:1 at current error correction overhead. IBM’s current best: approximately 5,000 physical qubits with improving error rates. Gap to 13 million qubits: approximately 2,600x. At IBM’s historical doubling rate of roughly every 2 years, that gap closes around 2033-2036.

Which Bitcoin Address Formats Are Most Vulnerable

Address Format Public Key Exposure Quantum Risk Level BTC Estimated
P2PK (Pay-to-Public-Key) Always exposed — public key is the address Critical. No protection whatsoever. ~1.1M BTC (Satoshi-era)
P2PKH (used and spent) Exposed when you send — permanent blockchain record Critical. Every sent transaction exposes it. ~2.9M BTC
P2PKH (never spent) Only hash of public key on chain Medium. Hash must be broken first — adds difficulty. Majority of BTC
P2WPKH / SegWit Exposed on spend Critical after first outgoing transaction Growing share
P2TR / Taproot Key-path spends expose key; script-path less so Moderate — depends on spend type Small but growing

The Harvest-Now-Decrypt-Later Timeline in Practice

The cryptographic attack is a two-phase operation. Phase 1 (now): collect and archive the entire Bitcoin UTXO set — all unspent transaction outputs with exposed public keys. This is public blockchain data, freely downloadable. Phase 2 (2031-2036 estimated): run Shor’s algorithm against high-value targets. The critical point: Phase 1 requires zero quantum capability. Any state actor or well-funded adversary is running Phase 1 today. The NSA formally acknowledged HNDL as an active threat category in the CNSA 2.0 advisory published in 2022.

Why 10 Minutes Matters More Than You Think

Bitcoin transactions remain reversible — from the network’s perspective, unconfirmed — for approximately 10 minutes during block confirmation. If a CRQC can derive a private key within 10 minutes, an attacker can intercept a legitimate transaction in the mempool, derive the private key from the exposed public key in the transaction signature, and broadcast a conflicting transaction with a higher fee sending the funds to their own address. This is not a theoretical attack — it is a mempool replacement attack enabled by quantum private key derivation. It requires 1.9 billion physical qubits at current error rates. That figure is roughly 380,000x beyond current IBM hardware. But the scaling math does not favour complacency.

How BMIC Eliminates This Attack Surface Completely

BMIC’s ERC-4337 Smart Account architecture means public keys never appear on-chain in any transaction. The smart contract validates transactions using CRYSTALS-Dilithium signatures without revealing the underlying key material to the chain. There is no public key to harvest. No Shor’s algorithm run to perform. The attack surface that makes Bitcoin wallets vulnerable to quantum computers simply does not exist in a BMIC wallet. ML-KEM-768 (FIPS 203) handles key encapsulation. ML-DSA-65 (FIPS 204) handles signing. Both are based on Module Learning With Errors — no known quantum speedup exists. Presale $0.049999 at bmic.ai.

Frequently Asked Questions

How many qubits does it take to break Bitcoin?
Based on the Webber et al. (2022) analysis: ~13 million physical qubits to break Bitcoin in 24 hours, ~317 million for a 1-hour attack. IBM’s current systems have ~5,000 physical qubits. The gap is approximately 2,600x at minimum.

When will a quantum computer be able to break Bitcoin?
Expert consensus and hardware roadmaps point to 2031-2036 for a CRQC (Cryptographically Relevant Quantum Computer) with sufficient qubits and error correction. Google Willow’s December 2024 breakthrough on error correction is the most significant recent acceleration of this timeline.

Can a quantum computer break Bitcoin today?
No. Current systems are approximately 2,600-380,000x below the required qubit count depending on time window. But harvest-now-decrypt-later collection of Bitcoin public keys is already happening.

What Bitcoin addresses are safe from quantum computers?
Only addresses that have never sent a transaction have some protection (their public key is hashed, not exposed). P2PK addresses and any address that has sent at least one transaction are directly vulnerable when a CRQC arrives.

How does BMIC protect against quantum computers breaking Bitcoin?
BMIC uses NIST FIPS 203 + FIPS 204 PQC algorithms with ERC-4337 hidden public keys — eliminating the on-chain public key exposure that makes ECDSA wallets quantum-vulnerable. Presale $0.049999 at bmic.ai.

The Numbers Are Public. The Timeline Is Real. BMIC Is the Answer.
Only NIST-approved PQC wallet presale. ERC-4337 hidden keys. Presale $0.049999.
Buy BMIC — Eliminate Your Quantum Exposure Now

BMIC SUPPORT

BMIC SUPPORT

Welcome to BMIC! How can I help you today?