Back to News
Market Impact: 0.6

Here's what 'cracking' bitcoin in 9 minutes by quantum computers actually means

GOOGLGOOGHSDT
Crypto & Digital AssetsTechnology & InnovationCybersecurity & Data PrivacyInvestor Sentiment & Positioning
Here's what 'cracking' bitcoin in 9 minutes by quantum computers actually means

Google Quantum AI research suggests a future quantum computer could derive a Bitcoin private key from a public key in roughly nine minutes after pre-computation, yielding an estimated ~41% chance to hijack a transaction in the mempool given Bitcoin's ~10-minute average confirmation. Approximately 6.9 million BTC (~one-third of supply) have public keys exposed on-chain and could be stolen at leisure by a sufficiently powerful machine (paper estimates <500,000 physical qubits required vs ~1,000 today). Bitcoin mining (SHA-256) would continue, but ownership guarantees would break without migration to post-quantum cryptography; Ethereum is preparing for migration while Bitcoin has not, and Solana's early tests show quantum-safe signatures are ~40x larger and can slow the network ~90%.

Analysis

This development is less a sudden tech shock and more a deterministic timeline that reallocates optionality across infrastructure providers, custodians, and blockchains. Cloud incumbents that control the software update path for key management and provide HSM/QKD-like services gain a multi-year annuity opportunity: large exchanges and institutional custodians will pay for migration orchestration, auditing, and runbooks that reduce legal and operational risk. Expect contract durations of 2–5 years and TCVs that look more like compliance projects than pure R&D—sticky, high-margin, and defensible once embedded. The second‑order on‑chain economics matter: PQC signatures are materially larger and slower, so incumbents that rely on frequent on‑chain settlement (high‑throughput L1s or exchange internalization) face either higher variable fees or throughput degradation. That pushes demand onto off‑chain settlement, batching/rollup services, and mission‑specific L2s able to amortize larger signature sizes; these layers become natural winners in a PQC transition. Conversely, custodial businesses holding long‑tail legacy keys are exposed to idiosyncratic, event‑driven outflows that are difficult to hedge centrally. From a risk-timing perspective, the market should treat this as a multi-year secular reallocation with clustered catalysts: demonstrable advances in error-corrected qubits, a high‑profile theft or regulatory mandate, and standards/accreditation from NIST‑like bodies. Any one of these could compress migration timelines from years to quarters and create sharp repricing in both crypto markets and vendor stocks. The clearest behavioural hedge is to own vendors that both (a) sell migration projects and (b) operate the infrastructure that cannot be trivially forked away from them—this is where revenue durability and multiple expansion will concentrate.