Quantum Countdown: How Shor’s Algorithm Could Decimate Crypto Security by 2035

Quantum Countdown looms: Shor’s algorithm could gut crypto by 2035. Experts clash on timelines, state actors eye the prize. Are we ready?

Shor’s Algorithm diagramed - sourced from Wikimedia commons

Date

May 22, 2025

Author

Quantum Canary Staff

0 min read
0

Imagine a world when Bitcoin was just a gleam in a coder’s eye, back when security meant a padlock on a seed phrase and a hope exchanges would not collapse. Fast-forward to 2025, and a new beast is looming: quantum computing. Experts are sounding the alarm that Shor’s algorithm could shred RSA and ECC encryption, the backbone of blockchain security if cryptographically relevant quantum computers (CRQCs) go live in the next 5-10 years. 

That is 2030–2035, a heartbeat in crypto time. The stakes are high — billions in assets and even the ethos of decentralization are all hanging on this quantum countdown. The sky isn’t falling just yet, but now is the time to arm yourself with accurate information to navigate this new era. 

How Much Time Do We Really Have?

Picture a debate over coffee: one side says quantum doom is imminent. NIST warns that CRQCs could break ECC by 2035 if quantum progress keeps accelerating. Shor’s algorithm, dreamed up by Peter Shor in 1994, is the villain here; it dismantles the math keeping keys safe. 

But is this urgent? The other side scoffs. Quantum tech is a mess, they argue, with IBM’s 1,000+ qubit goal for 2026 still noisy and Google’s Willow more hype than horsepower. Others, like Scott Aaronson, say 5-10 years is plausible if error correction clicks.

Timeline of attack on crypto custodians 2020-2025

The split is real. Today’s rigs, 433 qubits at Google, fall short of the 2,500+ needed to crack ECC. A developer at Consensus might chuckle, “Ten years? More like twenty.” Yet NIST’s Matt Scholl insists breakthroughs could snowball. 

The timeline is a coin toss: 2035 could be a bullet train barreling down, or a phantom we are fretting over for nothing. 

Shor’s Wrecking Ball: Bitcoin and Ethereum in the Crosshairs

So how does Shor’s algorithm hit hard? Bitcoin and Ethereum rely on ECDSA for keys and signatures. A private key signs transactions, a public key proves it is legit. ECC’s strength is that cracking the private key from the public one takes centuries on classical machines. 

Shor’s algorithm flips that in minutes on a CRQC. Roughly 1.72M Bitcoins—approximately $118B USD and ~8% of the total supply—sit in addresses with exposed public keys, ripe for the taking. Ethereum’s smart contracts are just as vulnerable, ECDSA underpins them too.

Picture a state actor like Lazarus Group, fresh off Bybit’s $1.5 billion heist, wielding a quantum rig. They could forge signatures, drain wallets, spoof staking, $2 trillion in crypto up for grabs. Dan Kaminsky said in 2013 the blockchain is solid, but keys are where it bleeds. 

Quantum Countdown, Are We Ready? The Crypto Community’s Stumble

Is the crypto crowd of developers, hodlers, and dreamers geared up? The answer is a shaky maybe.

  • Quantum-resistant upgrades exist

  • QRL is pioneering XMSS, hash-based tech that leaves nothing for Shor to exploit

  • Ethereum has mulled post-quantum signatures since 2017 

  • Bitcoin tosses around hard fork ideas 

But adoption is sluggish. A Bitcoin Core coder might shrug, “Too early, too messy.” Consensus is tough, and upgrades drag.

NIST is pushing standards—Kyber, Dilithium—due by late 2024, but crypto is lagging. Complexity is a hurdle and lattice math is heavier than ECC. Tools are clunky, while confidence runs high, maybe too high. “Quantum is a decade off,” some say. If they are wrong, 2030 will hits like a freight train while defenses scramble. 

The Race for Quantum Shields, and the Doubts

The race to standardize quantum-resistant algorithms is on. NIST has been working on this since 2016, sifting candidates like a tech talent show. Lattice-based winners are tough, but skeptics pipe up. Some are concerned that lattice is secure until it is not or that new attacks emerge. SHA-1’s fall proves it; bulletproof until it was not. Rushed rollouts carry risks too, sloppy code could open fresh holes. The urgency is real, but so is the caution, nobody wants a cure worse than the disease.

The line between cybercrime and statecraft blurs, while confidence in crypto's freedom ethos wobbles.

State Actors and the Privacy Abyss

Now picture state actors, say, North Korea or Russia, with quantum decryption. Privacy could be toast. They could crack keys, break ECDSA with discrete logarithms, and gut blockchain’s pseudonymity. Lazarus already nabbed $6 billion, a CRQC in their hands is a nuke. The line between cybercrime and statecraft blurs, while confidence in crypto’s freedom ethos wobbles.

The Global Divide: Resilience or Ruin?

Some nations are sprinting, China is pumping $15 billion into quantum, per Xinhua, the U.S. has NIST and DARPA. Others lag, think emerging markets leaning on crypto but short on tech cash. By 2035, quantum security could be economic coercion: “Adopt our standards or lose your chain.” The gap is stark, resilient nations might shield their $2 trillion slice while laggards bleed. The quantum countdown as we understand it could fracture blockchain’s global promise into haves and have-nots. 

To keep up with the latest in blockchain technology and quantum computing, join us on X and .

Christopher Smith's close up photo
Editor-in-Chief
Christopher Smith

Serial Entrepreneur, Hacker, Engineer, Musician.
With a rich career in AI leadership, blockchain innovation, and quantum technology, Chris brings a unique blend of technical mastery and philosophical insight. He continues to push the boundaries of what's possible, driven by a belief that technology, wielded thoughtfully, can redefine humanity's future for the better.

Related Insights

quantum canary's logo

Sponsored by:

quantus network's logo