Vitalik Revisits Quantum Threat Theory: Is the Foundation of Cryptocurrency Really at Stake?
Original Article Title: "The Resurgence of Quantum Threat, Is the Foundation of Cryptocurrency Shaken?"
Original Article Author: Azuma, Odaily Planet Daily
Lately, the threat of quantum computing to cryptocurrency has once again become a hot topic of discussion online. The reason behind this renewed interest is that several key figures in the quantum computing and cryptocurrency industries have recently made new predictions regarding the development of quantum computing and its potential capabilities.
Firstly, on November 13th, Scott Aaronson, a quantum computing guru and Director of the University of Texas Quantum Information Center, mentioned in an article: "I now believe that before the next US presidential election, we may have a fault-tolerant quantum computer capable of running the Shor algorithm..."

Following that, on November 19th, Ethereum co-founder Vitalik Buterin also spoke at the Devconnect conference in Buenos Aires, stating that Elliptic Curve Cryptography (ECC) could be broken by quantum computing by the US presidential election in 2028, and urged Ethereum to upgrade to a post-quantum algorithm within four years.

What is a Quantum Threat?
Before we interpret Scott and Vitalik's predictions, we need to briefly explain what a "quantum threat" is.
In simple terms, a quantum threat to cryptocurrency refers to the possibility that a sufficiently powerful quantum computer in the future could break the cryptographic foundations protecting the security of current cryptocurrencies, potentially undermining their security model.
Currently, the security of almost all cryptocurrencies (such as Bitcoin and Ethereum) relies on a technology known as "asymmetric encryption," with the two most critical parts being the "private key" and the "public key":
• Private Key: Kept secret by the user, used to sign transactions and prove ownership of assets;
• Public Key: Generated from the private key, can be made public, and is used as a wallet address or part of an address.
The cornerstone of cryptocurrency security lies in the fact that deriving a private key from a public key is currently computationally infeasible. However, quantum computing, leveraging principles of quantum mechanics, can greatly expedite the process of solving certain mathematical problems by running specific algorithms (such as the aforementioned Shor's algorithm), which is precisely the weakness of asymmetric encryption.
Let's further explain what Shor's algorithm is. We won't delve too much into the mathematics here, but in essence, the essence of Shor's algorithm is that it can transform a mathematical problem that is "almost unsolvable" on a classical computer into a "relatively solvable" period-finding problem on a quantum computer, potentially threatening the existing "private key - public key" cryptographic system of cryptocurrency.
For a more straightforward example, you can easily turn a basket of strawberries (analogous to a private key) into jam (analogous to a public key), but obviously cannot reverse the jam back into strawberries. However, suddenly a cheat code (analogous to quantum computing) emerges that may be able to achieve this expediently (analogous to the Shor's algorithm).
Has the Foundation of Cryptocurrency Been Shaken?
So, does this mean cryptocurrency is doomed?
Don't panic, the quantum threat is objectively real, but the issue is not as pressing. The reason for this statement mainly lies in two key points. First, there is still time before a real threat emerges; second, cryptocurrency can implement post-quantum algorithms through upgrades.
Firstly, regarding the first point, even if Scott's prediction comes true before the 2028 elections, it does not mean that cryptocurrency security will truly be compromised; Vitalik's statement is not suggesting that the foundation of Bitcoin and Ethereum will be shaken but merely points out a theoretical risk in the long term.
Haseeb, a Dragonfly Capital partner, explained that there is no need to panic about the new timeline for quantum computing, running Shor's algorithm does not equate to breaking a real 256-bit elliptic curve key (ECC key). You can use Shor's algorithm to break one number—that's impressive enough—but breaking down a number with hundreds of digits requires a significantly larger computational scale and engineering capacity... This is something to take seriously but is by no means imminent.

Cryptocurrency security expert MASTR has provided a clearer mathematical answer. Breaking the elliptic curve signature (ECDSA) currently used in cryptocurrencies such as Bitcoin and Ethereum would require approximately 2300 logical qubits, 10¹² to 10¹³ quantum operations, and, with error correction, would require millions to even billions of physical qubits. However, current quantum computers only have 100 to 400 noisy qubits with a high error rate and a short coherence time—the gap between the requirements to break the former is still at least four orders of magnitude.

As for the second point, industry cryptographers are also developing new post-quantum cryptography (PQC) algorithms that can resist quantum computing attacks, and mainstream blockchains have already prepared for this.
As early as March last year, Vitalik wrote an article titled "If Quantum Attack Comes Tomorrow, How Will Ethereum Solve It?" In the article, he mentioned the resilience to quantum threats of Winternitz signatures, STARKs, and even envisioned how Ethereum would urgently upgrade in case of an emergency.
Compared to Ethereum, Bitcoin may not be as flexible in upgrade implementation, but the community has long proposed various potential algorithm upgrade solutions such as Dilithium, Falcon, SPHINCS+. With the recent increase in related discussions, Bitcoin OG figure Adam Back has also stated that post-quantum cryptographic standards can be implemented long before a substantial quantum computing threat emerges.
In summary, the quantum threat is like a distant "master key" that theoretically can unlock all current blockchain cryptographic locks. However, the creators of the locks have long been studying new locks that this master key cannot open and are preparing to replace all the doors with new locks before the master key is created.
This is the current objective reality regarding the quantum threat. We cannot ignore its progress, but there is no need to blind panic because of it.
You may also like

Analyzing the Impact of Technological Trends in 2026
Key Takeaways The rapid evolution of technology continues to reshape industries, creating both opportunities and challenges. Understanding the…

Navigating Crypto Content Challenges in a Digital World
Key Takeaways Effective content management in the crypto industry involves addressing usage limits and optimizing resources. Staying informed…

Cryptocurrency Exchanges: Current Trends and Future Outlook
Key Takeaways The cryptocurrency exchange market continues to expand, influenced by various global economic trends. User experience and…

Untitled
I’m sorry, but I can’t generate a rewritten article without access to specific content for rewriting. If you…

Crypto Market Dynamics: An In-depth Overview
Market fluctuations provide insights into the volatility and dynamics of cryptocurrency trading. Key market participants play significant roles…

Predicting High-Frequency Trading Strategies in the Market, How to Ensure a Guaranteed $100,000 Profit?

This might be the average person's final opportunity to get ahead of AI

A Day Gathering Wall Street's Old Money: LayerZero's "Mainnet Transition" Narrative

Full Text of CZ's New Interview: From Ordinary Programmer to Richest Chinese, Involvement with FTX, Going to Jail, Doing Charity, Publishing a Book, What is CZ Focus on Now?

Mr. Beast is officially entering the world of finance, the Gen Z's new banker

SBF Appeals from Prison, Files 35-Page Motion Accusing Trial of "Collusion"

Robinhood 2025 Report Card: Earned $45 Billion, Why Did the Stock Price Drop by Half?

$1M+ AI Trading Finals: Hubble AI & WEEX Spotlight the Future of Crypto Trading
The WEEX AI Trading Hackathon Finals are now live, featuring real-time PnL leaderboards, daily rankings, and in-depth AMA sessions. Explore how top AI trading strategies perform under real market volatility and follow the competition as it unfolds.

WEEX Alpha Awakens Final Round Has Officially Begun
Day 1 of the WEEX AI Trading Hackathon Final Round is now live! Watch top algorithmic trading strategies compete with real capital. Follow the action from Feb 3–16, 2026, with $880K+ in prizes. Tune in live now. #AITrading #TradingHackathon

WLFI Team Meeting, Ally Meeting, Seaside Villa Cryptocurrency Business Kickoff

OpenClaw Hackathon, What are some projects worth checking out

The Bithumb 2000 BTC Mistake: The Fundamental Issue with CEX Ledgers

LayerZero releases L1 chain Zero, CZ appears on the All-In podcast, what's the overseas crypto community talking about today?
Analyzing the Impact of Technological Trends in 2026
Key Takeaways The rapid evolution of technology continues to reshape industries, creating both opportunities and challenges. Understanding the…
Navigating Crypto Content Challenges in a Digital World
Key Takeaways Effective content management in the crypto industry involves addressing usage limits and optimizing resources. Staying informed…
Cryptocurrency Exchanges: Current Trends and Future Outlook
Key Takeaways The cryptocurrency exchange market continues to expand, influenced by various global economic trends. User experience and…
Untitled
I’m sorry, but I can’t generate a rewritten article without access to specific content for rewriting. If you…
Crypto Market Dynamics: An In-depth Overview
Market fluctuations provide insights into the volatility and dynamics of cryptocurrency trading. Key market participants play significant roles…