Contents

Opinion

3 min reading

Share

Quantum Computing Won’t Kill Crypto, But It Will Expose Who Was Never Ready

Quantum computing will test crypto institutions long before it breaks cryptography.

The Threat Is Real, the Timeline Is Knowable, and Markets Punish Complacency Before Physics Does

Quantum computing will not kill cryptocurrency. But it will conduct a brutal audit of institutional competence, one that many asset managers, exchanges and protocol teams are unprepared to pass.

The most dangerous assumption in digital asset markets today is not that quantum computers will arrive tomorrow. It is the comfortable fiction that the problem can be deferred until later. That mindset is about to become expensive.

When Google unveiled its Willow quantum chip in December 2024, a 101-qubit processor that crossed a critical error-correction threshold, BlackRock’s Bitcoin ETF suffered its largest single-day decline in four months, falling 5.3 percent. Bitcoin itself dropped more than 4 percent within hours. The physics had not changed. Perceptions of preparedness had.

Markets do not wait for proof-of-concept exploits. They reprice risk the moment credibility wavers.

Bits and Bobs at Risk

The numbers deserve sober attention. Research from Coinbase suggests that roughly 32.7 percent of Bitcoin’s total supply, around 6.51 million BTC, sits in addresses whose public keys are already exposed on the blockchain. These are not theoretical vulnerabilities. They are coordinates on a map, waiting for a sufficiently capable adversary.

The most politically sensitive subset belongs to Satoshi Nakamoto. An estimated 1.1 million BTC remains in early pay-to-public-key addresses from 2009 and 2010. Unlike modern address formats, these expose the full public key immediately upon receipt, not only when funds are spent. A cryptographically relevant quantum computer running Shor’s algorithm could, in principle, derive the corresponding private keys.

Whether those coins would move to an attacker or remain frozen by community consensus is a governance question Bitcoin has not yet answered. Developers have already floated proposals to freeze vulnerable addresses entirely, including Nakamoto’s.

First eureka: the quantum threat to Bitcoin is not about breaking the network. It is about breaking the social contract around property rights. Whose coins are whose, and who gets to decide.

The End of “Eventually”

For years, quantum computing occupied the same hazy future as nuclear fusion. Always decades away, never quite arriving. That ambiguity has evaporated.

Expert consensus now converges around the early 2030s as the credible arrival window for machines capable of breaking elliptic curve cryptography. Executives at leading quantum firms openly estimate that Bitcoin-level security could be compromised a few years after 2030. Google’s own researchers place the horizon at roughly a decade.

Two implications follow. First, a decade is not long when measured against the pace of institutional cryptographic transitions. Second, and more troubling, adversaries do not need to wait.

The doctrine of “harvest now, decrypt later” means encrypted data intercepted today can be stored indefinitely and decrypted once quantum machines mature. The Bank for International Settlements has explicitly warned that financial data captured in 2025 may be decrypted retroactively in 2035.

The threat model is not a future attack. It is an attack already in progress, awaiting only the final computational key.

Quantum risk is not a cliff. It is a ramp that began years ago.

Standards and Understanding

In August 2024, the United States National Institute of Standards and Technology finalised three post-quantum cryptography standards after an eight-year evaluation process. These standards cover key encapsulation, digital signatures and hash-based alternatives. They are production-grade tools designed precisely for the transition now facing digital asset markets.

NIST’s guidance is unambiguous. Organisations should begin migrating now.

The contrast with industry response is striking. Most exchanges have not published quantum transition roadmaps. Most protocols have not begun systematic signature scheme research. Most asset managers cannot answer basic questions about their custodians’ post-quantum preparedness.

The tools exist. The urgency does not. This is rather like being handed a fire extinguisher and choosing to admire its colour scheme.

In Cryptography We Trust

The debate is often framed in simplistic terms. Quantum computers could break Bitcoin. This framing is convenient and misleading.

Digital asset markets are built on cryptographic trust. Trust does not erode gradually. It holds until it does not.

When quantum risk becomes credible, custody assurances based on mathematical security will demand explanation. Cold storage guarantees will face scrutiny over key exposure. Long dormant treasuries will be revalued based on migration readiness. Settlement finality will be questioned for transactions involving vulnerable addresses.

For institutional allocators, this is not a technology discussion. It is a fiduciary one.

BlackRock’s iShares Bitcoin Trust prospectus now explicitly lists quantum computing as a risk factor. The largest asset manager in the world has noticed. Many others have not.

Second eureka: once quantum risk enters mainstream consciousness, every unmoved coin becomes a signal. Did the holder not migrate because they could not, or because they chose not to. Markets will assume the worst.

Qubits of Bother for Asset Managers

Asset managers do not need quantum computers to exist for the risk to matter. They only need a credible belief that they soon might.

At that point, the questions become unavoidable. How long are client assets exposed in addresses whose public keys are already revealed. What happens to long dormant wallets that cannot migrate quickly. How do you explain cryptographic transition risk to clients who were told their assets were mathematically secure.

Most managers cannot answer these questions today. Cryptographic inventory, a basic accounting of which keys rely on which algorithms, barely exists as a discipline in digital assets.

The US Treasury and the G7 have both warned that financial institutions must begin this inventory work immediately given the length of transition timelines involved. The digital asset industry, supposedly more agile than traditional finance, has largely ignored the directive.

These are not edge cases. They are governance failures. Ignoring them does not make them disappear. It ensures they will be addressed under pressure, in public, with clients watching.

Hot Wallets, Cold Comfort

If quantum risk becomes material, exchanges will feel it first.

They concentrate hot wallets, high transaction velocity, reused addresses and operational urgency into a single attack surface. The threat is not the Hollywood scenario of a sudden, catastrophic drain of funds. It is something more destabilising.

A handful of unexplained signature anomalies. A disputed withdrawal. A precautionary trading pause. Enough to trigger risk committee reviews, halt institutional flows and force the market to differentiate between venues.

At that moment, the question becomes brutally simple. Which exchanges can credibly demonstrate a cryptographic transition path, and which cannot.

The December 2024 reaction to Willow offered a preview. Prices moved on perception, not physics. The next such moment may not be so forgiving.

Smart Contracts and Dim Prospects

Protocol teams often assume quantum risk is Bitcoin’s problem. That assumption is costly.

Ethereum faces a more complex challenge. It relies on elliptic curve signatures for user accounts and BLS cryptography for validators, both vulnerable to Shor’s algorithm. Unlike Bitcoin, Ethereum’s account model keeps addresses active for years, exposing public keys with every signature. Validator keys are permanently published in consensus state. Smart contract verification logic would require replacement.

The research community has begun serious work on this transition. New signature schemes, expanded address formats and modified opcodes are under discussion. Deployment remains years away.

Meanwhile, smart contracts hard-code cryptographic assumptions that governance cannot easily modify. Treasuries sit untouched for years, accumulating value in addresses that may become liabilities.

Third eureka: the existential risk for protocols is not sudden cryptographic failure. It is being perceived as unprepared. Reputation will travel faster than physics.

Fork Handles

This is where alarmist narratives fail. Cryptocurrency is not cryptographically frozen.

Bitcoin has upgraded its security model repeatedly through SegWit, Taproot and soft forks that preserved continuity while strengthening resilience. Proposals such as BIP-360 introduce quantum-resistant address formats without requiring hard forks.

Quantum computing does not require reinventing crypto. It requires doing what crypto was designed to do. Upgrade in public, under adversarial scrutiny, with incentives aligned.

Forks are not a flaw. They are the escape hatch. New address formats, long transition windows, gradual deprecation and hybrid signature models can all be deployed without rewriting history or halting markets.

Crucially, this transition will be visible years in advance. Quantum risk does not arrive as a surprise. It arrives as a known horizon.

Fourth eureka: quantum computing will not destroy crypto. It will stratify it.

Legacy Systems, Legacy Problems

There is an irony traditional finance prefers to ignore. Legacy financial infrastructure is arguably more exposed to quantum disruption than cryptocurrency.

Banking systems rely on vulnerable cryptography for TLS communications, SWIFT messaging and interbank settlement. Experiments such as the BIS Project Leap have demonstrated that quantum-resistant protocols can work, but also revealed immense operational complexity.

Regulators have already set timelines. Define goals by 2028. Complete priority migrations by 2031. Achieve full quantum-safe deployment by 2035. These timelines assume smooth execution. In a sector defined by legacy systems and opaque dependencies, nothing is smooth.

Crypto, by contrast, is transparent, adversarial by design and continuously stress-tested. The code is public. The upgrade mechanisms exist. The debate happens in the open.

The Reckoning

Quantum computing will not kill Bitcoin. It will force a migration.

That migration will separate prepared institutions from unprepared ones long before any cryptographic break occurs. Markets will not wait for certainty. They will reward credibility.

The December 2024 reaction to Willow showed how quickly sentiment can shift on quantum headlines alone. The next milestone will arrive faster than governance committees can convene.

For asset managers, exchanges and protocol teams, the question is no longer whether quantum computing matters. It is whether, when the moment arrives, you can credibly say we anticipated this and we were ready.

Quantum computing will not wait for consensus. Neither should preparation.

If this resonates, contact our team.

Share

Others articles

See all
Promotional image featuring Dilan Bastin, Head of Compliance at Portofino, alongside the text: 'In Conversation with Dilan Bastin – What does the FCA’s discussion paper 25/1 mean for the crypto regulation in the UK?

Opinion

In Conversation With Dilan Bastin about the FCA 25/1 DP

Key takeaways from FCA’s DP25/1 and why now is the time for the industry to shape the future

Read more
Illustration showing the Digital Euro and MiCA-regulated stablecoins converging into a single liquidity bridge, symbolizing Europe’s digital sovereignty.

Opinion

A Gambit for the Ages: MiCA, the Digital Euro, and Europe’s Bid for Monetary Sovereignty

Europe’s digital money experiment reshapes finance, sovereignty, and monetary power.

Read more