trade crypt

Quantum attack on Bitcoin private keys: Nine-minute window explained

HomeTechnologyQuantum attack on Bitcoin private keys: Nine-minute window explained

-

Google’s paper found that a quantum computer could derive a Bitcoin private key from a public key in roughly nine minutes. That nine-minute window compares with Bitcoin’s average confirmation time of about 10 minutes, and the attack targets transactions while the public key is exposed in the mempool. Google estimates such a machine would require fewer than 500,000 physical qubits, compared with roughly 1,000 qubits in current processors.

Bitcoin transactions use a private key to sign a transaction, and that signature reveals the corresponding public key when the transaction is broadcast to the mempool. While the transaction awaits confirmation, the public key is exposed in the mempool. That exposure creates an opportunity for an adversary to attempt to derive the private key before the transaction confirms. Bitcoin’s average confirmation time is about 10 minutes, which defines the window for such a race.

Google’s paper found that a quantum computer could derive a private key from a public key in roughly nine minutes, targeting that mempool window. The attack relies on the elliptic curve discrete logarithm problem, which a sufficiently powerful quantum computer could solve using Shor’s algorithm. The nine-minute figure refers to the time the machine would need after the public key enters the mempool to derive the private key. This description focuses on the computation performed while the public key is exposed.

The proposed attack separates computation into parts that can be pre-computed independently of any specific public key, and a short final phase that depends on the revealed key. Pre-computing reduces the time needed after a public key appears, limiting the live computation to a final set of adjustments. That final step is what takes roughly nine minutes in the paper’s estimate. Google estimates a machine built to perform this attack would require fewer than 500,000 physical qubits. That qubit count is far larger than the roughly 1,000 qubits in today’s processors.

The explanation above outlines the mempool attack, the role of pre-computation, and the specific computational requirement described in the paper. The attack’s practical effect depends on a machine that can perform the described computations within the mempool window.

About 6.9 million bitcoin sit in wallets where the public key has been permanently exposed, representing roughly one-third of the total supply. The public-key exposure in those wallets is permanent under current address conditions. Those exposed funds differ from addresses that keep the public key hidden until a new transaction is signed.

Exposed wallets include early addresses using the pay-to-public-key format and wallets that have reused an address, because spending from an address reveals the public key for remaining funds. Google’s paper identifies these categories of exposure. Because the public key is already revealed, these exposed coins do not require the nine-minute mempool race associated with freshly broadcast transactions. Instead, they could be targeted and cracked over time, one by one.

This summary quantifies the scale and causes of permanent public-key exposure in Bitcoin wallets. The data highlights a material subset of bitcoin that the paper identifies as vulnerable without a time-sensitive mempool window.

Google’s paper estimates a quantum machine built to perform this attack would require fewer than 500,000 physical qubits. Source

That estimate is far larger than the roughly 1,000 qubits available in today’s processors. Source

The proposed machine is described as generic in its ability to work for any public key after pre-computed work, requiring only a short set of final, key-dependent adjustments. Source

Those final adjustments are estimated to take about nine minutes after a public key appears in the mempool. Source

Google’s paper found that a quantum computer could derive a Bitcoin private key from a public key in roughly nine minutes.

About 6.9 million bitcoin — roughly one-third of the total supply — sit in wallets where the public key has been permanently exposed.

Google estimates a machine that could perform this attack would require fewer than 500,000 physical qubits.

This website and its articles do not provide any investment advisory services within the meaning of applicable regulations. The information published may be incomplete, outdated, or contain errors. The author makes no representation or warranty regarding the accuracy, completeness, or timeliness of the information presented. Use of this information is entirely at the reader’s own risk. Under no circumstances shall the author be held liable for financial decisions made on the basis of the content published on this website.
Crypto Fan
Crypto Fanhttps://calipsu.com
Calipsu.com is dedicated to providing clear, reliable, and accessible information about cryptocurrencies, blockchain technology, and decentralized finance (DeFi). Its mission is to help readers better understand a rapidly evolving ecosystem that is often complex, technical, and misunderstood. The platform covers a wide range of topics, from major blockchain networks and crypto assets to DeFi protocols, Web3 applications, and emerging trends. The website also publishes practical guides and tutorials that explain how decentralized tools function, such as wallets, staking mechanisms, lending protocols, and liquidity pools. These guides aim to describe processes and risks clearly, helping readers understand the mechanics behind DeFi rather than encouraging participation.

LATEST POSTS

XRP price analysis: Price slips to $1.33 on high volume

XRP price analysis reveals a sharp drop from $1.36 to $1.33 on high volume, noting key resistance at $1.35 and a fragile recovery path.

Bitcoin and crypto market flat as U.S.-Iran negotiations begin

Bitcoin and crypto market flat as U.S.-Iran negotiations begin, with markets steady amid geopolitics, weekly shifts, and privacy-model notes.

Hyperliquid HYPE ETF BHYP to List on NYSE Arca

Hyperliquid HYPE ETF aims to track the HYPE token with staking rewards, a 0.67% fee, and Anchorage custody as it targets BHYP on NYSE Arca.

Bhutan’s 70% bitcoin sell-off and uncertain mining status

Bhutan's 70% bitcoin sell-off and uncertain mining status: an analytical look at holdings, transfers, and the case for hydropower over mining.

Follow us

116FansLike
745FollowersFollow
148FollowersFollow
trade crypt