Quantum Computing: The Overlooked Threat to Crypto Some Industry Leaders Are Dismissing Too Soon

Quantum is a real risk for crypto. Willow's progress, NIST timelines, and Bitcoin's exposed keys make the quantum computing threat to crypto a now problem.

Futuristic digital artwork showing a person facing a giant tree made of circuitry with Bitcoin and crypto symbols glowing in the sky above a neon-lit cityscape.

Date

Oct 16, 2025

Author

Quantum Canary Staff

0 min read
0

Complacency is the enemy of security. And when highly influential voices say quantum risks are decades away, investors relax precisely when they should be leaning in.

On that note, at CES 2025, Nvidia's CEO Jensen Huang said that "very useful quantum computers are still a few decades away," and quantum computing stocks promptly swooned as coverage amplified the remark, then later tracked his attempted walkback at a special session. The point is that crypto's core security assumptions will eventually fall through, and no one knows precisely how much sand is left in the hourglass -- not even the tech sector's most-exposed leaders.

Man speaking with text overlay quoting Nvidia CEO Jensen Huang saying very useful quantum computers are still a few decades away, highlighting industry skepticism.

Meanwhile, engineering teams keep moving to bring about the quantum future. Google's Willow chip reports improved error correction and device stability that narrows the gap between lab demos and sustained computation. Even if today's devices cannot yet run Shor's algorithm at scale, investors should price the curve of progress rather than a snapshot in time. 

Bar chart titled 'Quantum Computing Stocks Drop After Nvidia CEO Comments' showing declines in stock performance for companies following remarks about quantum computing timelines.

But why isn't quantum risk exposure treated with the same discipline used for custody policy, smart contract audits, and regulatory risk? After all, the migration effort already appears on official roadmaps and guidance. Let's dive in and unpack these issues in a bit more detail. 

Comforting Narratives Can Be Misleading

It is tempting to wave away the problem of cryptocurrency security relative to quantum computing because a famous executive sounded sanguine.

That's quite risky, considering that policymakers and regulators already behave as if the migration must start now, or else. NIST explains why post-quantum work begins before machines exist and calls "harvest now, decrypt later" a present concern in its PQC migration FAQ. CISA's guidance to operators emphasizes near-term inventory, discovery, and phased transition in its Operational Technology (OT)  considerations. And the U.K.'s cyber agency is pursuing a plan for the whole economy, targeting full protection by a 2035 completion deadline.

The thing that matters for crypto is not the average market participant's opinion, nor even the opinion of someone as illustrious as Jensen Huang, but rather the minimum capability of an adversary who can run the right algorithm once. If that adversary gains the capability in five years, those who chose not to adapt in advance based on the dismissive opinions of others will be deprived of their funds, whereas those who were paranoid will be safe. Preparing early means sleeping soundly when eventually, inevitably, others will be scrambling to protect themselves. 

With that being said, here are a few of the most common dismissals and why they fall short:

  • "It's overhyped, so there's nothing to do now." The mathematics behind Shor's algorithm and attacker incentives do not care about hype cycles.

  • "The risk is at least 10 years out." Security roadmaps from NIST and CISA assume work begins now and flag harvest-now-crack-later as a current risk.

  • "Google's milestones are just PR." Willow's results are precisely the kind of error-correction advances that compound year over year.

  • "Active accounts are safe because public keys are hidden." A large set of coins already exposes keys or reveals them upon spend, as shown by Deloitte's chain analysis and River's estimates.

  • "We'll just upgrade when it is time." Signature-scheme upgrades are complex and slow, which current Bitcoin transition debates make clear.

Those points don't prove that a break is imminent, and there is no evidence to support that idea anyway. What they do show is why the burden of proof sits with complacency. The rational response here is to quantify your exposure and then push migration tracks in parallel with your other workstreams.

What a break would actually look like

Now let's go over a few of the relevant technical details so that you'll have a fuller concept of the risks at hand.

  • In short, modern blockchains rely on asymmetric cryptography, and for Bitcoin and many others that means ECDSA. Shor's algorithm solves the discrete logarithm problem that ECDSA is based on in polynomial time on a sufficiently capable quantum machine, which means an attacker could derive private keys from public keys and forge signatures with dramatically less effort than such a task would take otherwise. That would in turn enable silent thefts.

  • The next detail matters for threat modeling. Many early outputs, notably P2PK addresses, expose public keys on chain, and any address of any era reveals its public key when it is spent, which creates windows of vulnerability. Several estimates suggest that roughly a quarter of Bitcoin resides in P2PK or reused addresses with exposed keys, including dormant wallets that may never move. Those coins could be easily separated from their owners in the near future.

  • Crypto is also exposed to time-shifted risk. Adversaries already practice harvest now, crack later, which involves recording encrypted data and waiting for stronger tools to arrive in the future. That tactic applies to networks and archives today, and it should inform crypto governance -- but on average, it doesn't get discussed.

If a break becomes feasible, an attacker does not need to announce it. They can quietly drain long-dormant UTXOs, sweep aged multisig that reused keys elsewhere, and cause turbulence before anyone agrees on a response.

None of this implies that proof of work breaks first. Hash functions like SHA-256 are affected primarily by Grover's algorithm, which offers a quadratic speedup rather than a collapse, while signatures fall to Shor's structure-breaking. The path of least resistance is signatures, which is why responsible forecasts focus on signature migration rather than mining in peer-reviewed work.

Here's a quick map of the main risk vectors and the associated mitigations:

Risk vector

Example or exposure

Mitigation path

Adoption status

P2PK and reused P2PKH with exposed public keys

Early rewards and reused addresses that reveal the key on spend

Move to new outputs and prefer PQ-ready formats once available

Bitcoin contributors discuss freezing vulnerable outputs while migration proceeds

Signature schemes based on ECDSA or EdDSA

Signatures across BTC and ETH share discrete log assumptions

Adopt lattice signatures such as ML-DSA or hash-based schemes where appropriate

NIST finalized FIPS 203 and FIPS 204 to guide migration

Harvest now, crack later exposure

Attackers stockpile encrypted data today

Rotate secrets early and deprecate vulnerable key material

Government guidance urges early action to reduce latent risk

There are ample security measures to be taken today to guard yourself against tomorrow's threats. The main issue is that investors and users are mostly (though not totally) reliant on others to implement many of the mitigations. 

The migration path we already have

The engineering path towards actually implementing mitigations is visible, although it is not fully fleshed out in all cases.

NIST finalized the first post-quantum standards in 2024, including ML-KEM for key establishment and ML-DSA for signatures, and continues to publish migration updates and outreach that help teams plan staged cutovers. Security agencies built parallel roadmaps so organizations can inventory cryptography, prioritize high-value systems, and sequence changes over several budget cycles.

Infographic explaining Bitcoin’s quantum migration path with sections on ECDSA signatures, NIST 2024 standards, Bitcoin protocol changes, and hybrid post-quantum signature approaches.

Crypto does not need to reinvent the wheel to become secure, but it does need to map contingencies and new security requirements onto protocol realities. Bitcoin researchers have explored transition mechanics, including proposals to sunset or quarantine quantum-vulnerable outputs and to introduce new output types for post-quantum spending. Academic teams have evaluated hybrid schemes that pair existing signatures with lattice signatures to smooth the cutover at the cost of larger transactions. Those are solvable trade-offs if the community starts early.

It is also useful to separate what breaks from what bends. Grover's algorithm halves effective hash strength, which makes mining slightly easier for a quantum miner but does not grant a magic wand. Signature breaks do grant a magic wand, which is why signature migration comes first.

What investors should do next

Investors cannot push code to Bitcoin Core, but they can control portfolio exposure and governance.

The immediate task is to reward projects and service providers that take this seriously, and to insist on credible migration plans from those that do not. Favor custodians and wallets that can rotate keys and support PQC on upgrade day, backed by a roadmap aligned to FIPS 203 and FIPS 204. Watch for chains that socialize proposals to quarantine vulnerable outputs and introduce post-quantum scripts, then track whether those proposals reach testnet. And treat vendor talk of quantum as pure hype as a red flag unless they can point to NIST, CISA, or NCSC aligned plans for inventory and discovery.

Finally, investors, users, and developers alike should also keep expectations disciplined. The first iterations of quantum-safe signatures will be bulkier, and UX will lag, as even supportive industry commentary acknowledge. Expect larger transactions and higher fees during a transition to PQC security; size your investments accordingly, and avoid single-key treasuries.

Still, don't ever lose sight of the fact that the cost of migration is the premium you pay to keep the option of a decentralized future.

To keep up with the latest in blockchain technology and quantum computing, join us on X and .

Sources:

Christopher Smith's close up photo
Editor-in-Chief
Christopher Smith

Serial Entrepreneur, Hacker, Engineer, Musician.
With a rich career in AI leadership, blockchain innovation, and quantum technology, Chris brings a unique blend of technical mastery and philosophical insight. He continues to push the boundaries of what's possible, driven by a belief that technology, wielded thoughtfully, can redefine humanity's future for the better.

Related Insights

quantum canary's logo

Sponsored by: