Lowest hanging fruit for quantum computers

“It turns out that breaking cryptography is one of the easier applications for quantum computing, because it’s very numeric,” he said. “These are the smaller, easier algorithms. The low-hanging fruit.”

That places bitcoin, which relies on elliptic curve cryptography, directly in the line of fire, Martinis suggested, confirming what the Google paper warns.

Unlike traditional financial systems, which can migrate to quantum-resistant encryption standards, bitcoin faces a more complex challenge. Its decentralized structure and historical design make upgrades slower and more contentious, the Nobel Prize winner said.

“You can go to quantum-resistant codes” in banking and other systems, Martinis said. “Bitcoin is a little bit different, which is why people should be thinking about this right now.”

The concern centers on a specific vulnerability window. When a bitcoin transaction is broadcast, its public key becomes visible before it is confirmed onchain, Martinis explained. A powerful quantum computer could, in theory, use that window to derive the corresponding private key and redirect funds before final settlement, he noted.

However, Martinis cautioned against assuming the threat is imminent. Building a quantum computer capable of executing such an attack remains one of the hardest engineering challenges in modern science.

“I think it’s going to be harder to build a quantum computer than people are thinking,” he said, pointing to major hurdles in scaling, reliability and error correction.

No reason for inaction

Estimates for when cryptographically relevant quantum machines could emerge vary widely. Martinis suggested a rough five- to ten-year window, but warned that uncertainty is not a reason for inaction.

“Given the serious consequences, you deal with it. You have time, but you have to work on it,” he said.

The warning highlights a growing shift inside the quantum research community, where scientists are increasingly flagging risks to existing cryptographic systems while withholding sensitive technical details — a strategy borrowed from traditional cybersecurity disclosure practices.

For bitcoin developers and investors alike, the message is becoming harder to ignore.

“The crypto community has to plan for this,” Martinis said. “It’s a serious issue that has to be dealt with.”

Martinis is a 2025 Nobel Prize–winning physicist recognized for his work on macroscopic quantum phenomena and is widely known for leading Google’s quantum hardware program, including the 2019 “quantum supremacy” experiment. He is currently CTO and co-founder of Qolab, a hardware company developing utility-scale superconducting quantum computers.

More For You

Encryption Supremacy - Zcash and Privacy in the Age of Scale

Most crypto privacy models weaken as blockchain data grows. Encryption-based models like Zcash strengthen. CoinDesk Research maps the five privacy approaches and examines the widening gap.

Why it matters:

As blockchain adoption scales, the metadata available to machine learning models scales with it. Obfuscation-based privacy approaches are structurally degrading as a result. This report provides a comprehensive comparison of all five major crypto privacy architectures and a framework for evaluating which models remain durable as AI capabilities improve.

More For You

Glasses in front of monitors with code (Kevin Ku/Unsplash)

Anvita includes tokenization services and a platform for agents to coordinate tasks and settle payments in real time using stablecoins.

What to know:

  • Ant Digital Technologies has launched Anvita, a platform enabling AI agents to hold assets, trade, and make payments with minimal human involvement.
  • Anvita includes tokenization services and a platform for agents to coordinate tasks and settle payments in real time using stablecoins.
  • The launch reflects growing industry interest in AI-driven…

In this article

About the Author

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Stories