AI for Automation
Back to AI News
2026-04-01quantum computingbitcoinbitcoin securitycybersecuritySHA-256 encryptionpost-quantum cryptographyquantum threatGoogle quantum

Quantum Computers Will Break Bitcoin by 2029, Google Warns

Google's research pinpoints 2029 as the year quantum computers crack Bitcoin's SHA-256 encryption. The countdown has started — here's how to prepare.


Google just published research that stamps a specific expiration date on Bitcoin's security: around 2029. That's 3 years away — and the search giant's message was blunt. Quantum attacks aren't decades out. They require preparation now, while there's still time to act.

For anyone holding Bitcoin, using online banking, or relying on standard internet encryption, this isn't abstract. It's a concrete countdown to when the mathematical lock protecting digital assets could be cracked open — and the race to build a replacement is already running dangerously behind.

The 3-Year Quantum Computing Warning No One Wanted to Hear

The research, reported by Tom's Hardware, singles out Bitcoin's SHA-256 protocol as the primary target. SHA-256 (a "hashing algorithm" — a mathematical one-way function that converts data into a unique fixed-length fingerprint) has protected Bitcoin since 2009. For 17 years, it has been considered effectively unbreakable by conventional computers. Google's 2029 estimate changes that assumption fundamentally.

What makes this different from previous quantum threat warnings? Google is one of the few organizations with direct access to cutting-edge quantum hardware, having achieved the first credible quantum milestone with its Sycamore processor in 2019. When Google says 2029, it isn't theoretical speculation — it's extrapolating from real engineering progress data on actual hardware the company is building and running.

The headline takeaway is sharp: the convergence point between current quantum hardware improvement trajectories and the scale needed to attack SHA-256 falls around 2029. That makes it a planning horizon companies, developers, and individual holders must take seriously — right now, not in 2028.

SHA-256 Encryption: The Mathematical Lock Behind Every Bitcoin

To understand why this matters, it helps to understand what SHA-256 actually does. Every Bitcoin transaction runs through this algorithm — converting transaction data into a unique 256-bit output (a string of 256 binary digits, roughly equivalent to a 78-digit number). The security guarantee is that you can't reverse the process: knowing the output tells you nothing useful about the input.

This one-way property is what makes Bitcoin's proof-of-work mining system secure. Miners compete to find an input that produces an output meeting specific criteria — a puzzle requiring enormous trial-and-error on classical computers. Quantum computers, using a technique called Grover's algorithm (a quantum search method that finds a target among N items in roughly √N steps instead of N steps, dramatically faster), could theoretically cut SHA-256's effective security in half — reducing it from 256-bit strength to roughly 128-bit equivalent.

128-bit security remains strong for now. The more acute danger is to the other cryptographic layer: ECDSA (Elliptic Curve Digital Signature Algorithm — the method that lets you prove ownership of a Bitcoin wallet without revealing your private key, similar to a digital lock-and-key pair). Unlike SHA-256, ECDSA is completely broken by Shor's algorithm (a quantum technique for factoring large numbers at exponential speed), which quantum computers can execute orders of magnitude faster than any classical computer.

The "Harvest Now, Decrypt Later" Quantum Threat Already Underway

Here's the uncomfortable truth: sophisticated attackers don't need to wait until 2029. A strategy already in use by state-level actors is "harvest now, decrypt later" — collecting encrypted financial transactions and Bitcoin wallet data today, planning to decrypt them retroactively once quantum hardware reaches sufficient capability.

This means the threat isn't only about future transactions. Any Bitcoin wallet that has ever sent Bitcoin from an address has exposed its public key (the visible part of the digital lock), which is derived from the private key through a mathematical one-way function. Classical computers need billions of years to reverse that function. A sufficiently large quantum computer using Shor's algorithm could do it in hours. Security researchers estimate a significant share of all Bitcoin in circulation sits in addresses that have already exposed their public keys — logged on the blockchain permanently and publicly for anyone to harvest today.

IBM Q System One quantum computer illustrating the quantum computing threat to Bitcoin SHA-256 encryption

What Google's Quantum Research Actually Found

The 2029 projection comes from extrapolating two variables simultaneously:

  • Qubit quality improvements: Today's quantum computers use "physical qubits" — individual quantum units that are fragile and error-prone. For a practical cryptographic attack, these must be combined into "logical qubits" (error-corrected qubits that behave reliably, assembled from hundreds of physical qubits). Experts estimate cracking Bitcoin-grade ECDSA encryption requires on the order of 4,000 logical qubits functioning at high fidelity.
  • Error correction breakthroughs: Google's Willow processor, announced in December 2024, demonstrated that error rates decrease as more qubits are added — the opposite of what was observed in earlier machines. This achievement was the key missing piece that made near-term cryptographic attacks plausible rather than theoretical.
  • Convergent roadmaps: Google, IBM, and Microsoft have each published hardware roadmaps showing logical qubit milestones expected between 2026–2030. These roadmaps converge uncomfortably close to the attack threshold — and they are funded, staffed, and actively progressing.

The 2029 date isn't a certainty. It represents the earliest credible intersection on a probability distribution. The actual date could fall in 2030, 2032, or later if scaling hits unexpected obstacles. But security professionals operate on worst-case assumptions precisely because the cost of being wrong is catastrophic and irreversible.

Post-Quantum Cryptography: How the Industry Is Responding

The good news: quantum-resistant cryptography is ready and standardized. In August 2024, NIST (the U.S. National Institute of Standards and Technology — the federal agency that sets national technology and security standards) published three finalized post-quantum cryptography standards after an 8-year standardization process evaluating 82 candidate algorithms from researchers in 25 countries. The new standards include:

  • CRYSTALS-Dilithium — NIST's primary post-quantum digital signature standard, based on lattice problems (complex geometric math that quantum computers can't efficiently solve)
  • SPHINCS+ — a hash-based signature scheme considered highly conservative and quantum-safe
  • CRYSTALS-Kyber — a key encapsulation mechanism for encrypting data in transit

The bad news: adoption is slow almost everywhere, and Bitcoin's governance structure makes it particularly resistant to rapid change. Updating Bitcoin's cryptography requires a BIP (Bitcoin Improvement Proposal — the formal community process for suggesting protocol changes) with broad consensus, followed by a hard fork (a permanent, non-backwards-compatible update that all miners and node operators must adopt simultaneously). Previous hard forks have been contentious. The 2017 Bitcoin Cash split remains a cautionary tale of a community that couldn't agree on a technical upgrade without splitting into two separate currencies.

Post-quantum security improvements generate none of the commercial excitement of scaling features or new applications — making political consensus even harder to build on a 3-year timeline. Several developers have begun early-stage BIP discussions, but nothing approaching consensus exists as of early 2026.

Bitcoin cryptocurrency symbol representing SHA-256 encryption at risk from quantum computing attacks by 2029

Bitcoin Security: What You Can Do Before the Clock Runs Out

If you hold Bitcoin or other cryptocurrencies, practical steps exist today. They won't eliminate the risk, but they reduce exposure:

  • Stop reusing addresses: Every time you send Bitcoin from an address, you expose your public key. Use each address only once and migrate funds to fresh addresses if you're sitting on legacy wallets that have already sent transactions.
  • Track hardware wallet updates: Manufacturers like Ledger, Trezor, and Coldcard will eventually implement post-quantum signature schemes. Prioritize wallets with public commitments to quantum-resistant migration paths.
  • Monitor the BIP process: Bitcoin developer forums and GitHub are where protocol decisions begin. Proposals involving CRYSTALS-Dilithium or SPHINCS+ signatures will appear there first — months before mainstream coverage picks them up.
  • Don't leave large amounts on exchanges long-term: Exchange security posture, not just the Bitcoin protocol itself, determines real-world vulnerability for most retail holders.

For enterprise security and IT teams, NIST's standards are finalized and available for implementation today. Any system transmitting or storing data with long-term sensitivity — financial records, legal documents, healthcare data — should be actively evaluating migration plans before 2027 to allow adequate testing and rollout time. Our AI automation security guide covers how to assess your current encryption exposure and where to start. Three years sounds comfortable until you're trying to migrate 17 years of legacy infrastructure in 18 months.

Related ContentGet Started | Guides | More News

Stay updated on AI news

Simple explanations of the latest AI developments