• Advertise with us
  • Pricing
  • Submit News
Instagram Twitter Facebook Telegram Youtube Linkedin
EdaFace Newsfeed
EdaFace Newsfeed
  • News

    Main News

    • Crypto News
    • Bitcoin and BTC
    • Altcoin News
    • Security & Hacks
    • ICO & Token Sales
    • Interviews & Profiles

    Information

    • Press Release
    • Research Report
    • Regulations, Law & Policy
    • Community/Guest Post
    • Events & Conferences
    • Tutorials & Guides

    Market

    • Technical Analysis
    • Price Analysis
    • Cryptocurrency Price Prediction
    • DeFi (Decentralized Finance)
    • Mining & Staking

    Other Categories

    • NFTs & Digital Art
    • Opinion & Editorials
    • Tech Innovations
  • Price Analysis
  • Cryptocurrencies
    • Coin Ranking
    • Trending
    • EDA Token
  • Exchanges
    • Spot
    • Derivatives
    • DEX
    • EDA Plantation
  • Verification Centre
    • Rug Pull Check
    • Blockchain Ecosystem
    • EDA Token
  • MarketPlaces
    • NFT Marketplace
    • Digital Literature
    • Digital Mall
    • P2P Market
    • Metaverse
  • EDA Academy
More
  • News
  • Price Analysis
  • Cryptocurrencies
    • Coin Ranking
    • Trending
    • EDA Token
  • Exchanges
    • Spot
    • Derivatives
    • DEX
    • EDA Plantation
  • Verification Centre
    • Rug Pull Check
    • Blockchain Ecosystem
    • EDA Token
  • MarketPlaces
    • NFT Marketplace
    • Digital Literature
    • Digital Mall
    • P2P Market
    • Metaverse
  • EDA Academy
Reading: What is quantum? Is it the end of Bitcoin and cryptocurrencies?
Share
Sign In
EdaFace Newsfeed
EdaFace Newsfeed
  • EdaFace Home
  • Edaface News
    • EdaFace News
    • Advertisement
    • Pricing
    • Submit News
  • News
    • Price Analysis
  • Cryptocurrencies
    • Coin Ranking
    • Trending
    • EDA Token
  • Exchanges
    • Spot
    • Derivatives
    • DEX
    • EDA Plantation
  • Verification Centre
    • Rug Pull Check
    • Blockchain Ecosystem
    • EDA Token
  • MarketPlaces
    • NFT Marketplace
    • Digital Literature
    • Digital Mall
    • P2P Market
    • Metaverse
  • EDA Academy
  • Contact Us
  • EdaFace Home
  • Edaface News
    • EdaFace News
    • Advertisement
    • Pricing
    • Submit News
  • News
    • Price Analysis
  • Cryptocurrencies
    • Coin Ranking
    • Trending
    • EDA Token
  • Exchanges
    • Spot
    • Derivatives
    • DEX
    • EDA Plantation
  • Verification Centre
    • Rug Pull Check
    • Blockchain Ecosystem
    • EDA Token
  • MarketPlaces
    • NFT Marketplace
    • Digital Literature
    • Digital Mall
    • P2P Market
    • Metaverse
  • EDA Academy
  • Contact Us
EdaFace Newsfeed > Latest News > Security & Hacks > What is quantum? Is it the end of Bitcoin and cryptocurrencies?
Security & Hacks

What is quantum? Is it the end of Bitcoin and cryptocurrencies?

vitalclick
Last updated: March 31, 2026 7:16 pm
5 hours ago
Share
SHARE

Contents
What is Quantum?Google’s WarningDoomsday Scenario?What is SHA-256?Latest: Will BTC and ETH Come Out of This War?

Google has been working towards a responsible transition to post-quantum cryptography since 2016, and now is the time for a warning. published article. Discussions were intense in the cryptocurrency community today, as the article dated March 31 included details that cryptocurrencies, especially Bitcoin’s encryption standard, may also be at risk. So what’s the real deal?

What is Quantum?

First, let’s start with what it is. The computers and systems we know work with 0 and 1. This is a basic knowledge that most of you learned at school. Quantum Computers use the principle called “Superposition”, which means that both 0 and 1 can be present at the same time. Classical computers needed more time than the age of the earth to decipher Bitcoin’s encryption algorithm. In the past, scientists calculated that 20 million physical qubits (quantum bits) were required to crack this password.

Developing and even rapidly developing technology now reduces this time to reasonable levels. In other words, Bitcoin’s encryption algorithm is moving “towards the decipherable phase”. Google’s new paper reduced this need to less than 500,000 qubits by improving “error correction” techniques. In the future, this will decrease even more with developing algorithms and hardware. This is just like the change in this process between trying to write your hardware store’s inventory in the contact section of the fax machine and printing a report and trying to get a stock report, and today you can easily print it from the printer. When you had a fax machine, printing an inventory report was possible with the method you developed after a long effort, but then printers came along and everyone could do it much more smoothly. Google is now warning that it may soon be possible to print inventory from a fax machine, meaning that our technology is approaching this stage.



In the next stage just Google Not just more companies, countries, and then smaller companies and eventually individuals will have these capabilities.

Google’s Warning

Google issued a warning on March 31 about the current and future state of the technology, saying, “We are moving this technology forward and we do not want to have the power to open all the locks at once and face serious consequences.”



“We show that future quantum computers may be able to break the elliptic curve cryptography that protects cryptocurrencies and other systems, using fewer quantum bits and gates than previously thought. We want to raise awareness of this issue and offer recommendations to the cryptocurrency community to increase security and stability before this happens.” – Google

Google has urged cryptocurrency teams and others to transition to post-quantum cryptography (PQC), which is resistant to quantum attacks.

“We have collaborated with the US government to share this research responsibly and developed a new method for disclosing these vulnerabilities through zero-knowledge proof, making it possible to verify these vulnerabilities without providing a road map to malicious actors. We urge other research teams to do the same to keep people safe. We look forward to continuing our work in the industry, along with other organizations working on responsible approaches, such as Coinbase, the Stanford Blockchain Research Institute, and the Ethereum Foundation, in line with our 2029 timeline.”

The company made the above statement regarding the process in which crypto actors such as the Ethereum Foundation were involved. So the cryptocurrencies have not been decrypted and Google will not put dormant Bitcoins into circulation, but the technology is moving towards this stage (as there has already been a nearly 20-fold reduction in the number of physical quantum bits required to decrypt ECDLP-256) and it is time for the crypto giants to take precautions against crypto risk. Google gives the world time until 2029.

“Governments and other organizations, including Google, have been preparing for this security challenge for years. With continued scientific and technological advances, CRQCs are moving closer to reality, necessitating a transition to PQC, which is why we recently announced our 2029 transition timeline. In our white paper, we describe the quantum computing “resources” (i.e., quantum bits and We express our resource estimates in terms of the number of logical quantum bits (error-corrected quantum bits made up of hundreds of physical quantum bits) and Toffoli gates (expensive elementary operations on quantum bits, which are the primary driver of the time required to execute many algorithms).

Doomsday Scenario?

Let’s simplify. Quantum computing is advancing to the point where it can break SHA-256. It is the basis for everything in this world, from digital signatures to military secure communications, from payment encryption on e-commerce platforms to much more. In other words, when SHA-256 is “cracked” (huge computing power is required to break it. Google can do this for the USA and it is not likely to have many competitors at this stage). Before Bitcoin, the USA can seize all the confidential data of the states it sees as enemies, secure the banking infrastructure in the country, and then circulate the assets in Nakamoto’s wallet for pleasure. So, there is a lot to do until Bitcoin’s turn comes.

In other words, Google is not trying to make encryption algorithms breakable by sitting down and saying “Let’s break Bitcoin’s password (!).”

What is SHA-256?

SHA-256 (Secure Hash Algorithm 256-bit) converts any data into a unique string of 64 characters, that is, it is a one-way algorithm. Where is it used? When you access a website (HTTPS), your browser checks whether the site’s certificate is genuine. SHA-256 signatures are used to verify that these certificates have not been corrupted.

SHA-1: It is 160-bit strong. (2^{160} possibilities), SHA-256: 256-bit strength. (2^{256} possibilities)

When you become a member of a site, your password is hashed with SHA-256 (usually with the addition of “salt”) and saved in the database. In digital signing of official documents, the content of the document is hashed with SHA-256 and then encrypted with the sender’s private key.

Anti-virus software has a huge database of SHA-256 digests of known viruses.

Dropbox or Google Services like Drive avoid storing thousands of copies of the same file. SHA-256 uses. When downloading libraries for Linux or programming languages, a SHA-256 check is performed to verify that the downloaded packages are the same as on the server. This prevents “man-in-the-middle” attacks.

When your computer boots up, it checks the motherboard (UEFI) SHA-256 signatures to check whether the operating system (Windows/Linux) kernel is genuine. When smart home devices or industrial sensors receive a software update over the internet, they verify with SHA-256 that the update file comes from the manufacturer. Police or cybersecurity experts obtain the SHA-256 digest of the file and seal it to prove that the image (copy) they receive from a computer at the scene of a crime has not been changed during the court process.

DNS records are protected with SHA-256-based digital signatures to prevent internet addresses (like googlecom) from redirecting you to a wrong IP address. Digital signatures created with SHA-256 are added to email headers to prove that the emails you send have not been modified in transit and actually originate from your server.

The list goes on, so if we see Quantum break it at some point, if the entire internet encryption infrastructure is not upgraded to the required level that day, the problem will not only be a problem of cryptocurrencies.

Latest: Will BTC and ETH Come Out of This War?

Ethereum the team is already quantum risks He took action for precautions and added it to his road map. Before 2029, Ethereum will easily insure itself against risks. The situation is slightly different for Bitcoin because the principle of immutability is slightly misinterpreted here. Even for security, we can see discussions in the Bitcoin community throughout the process. We have all seen what kind of discussions and risks posed by Taproot or ordinals.

In any case, the Bitcoin community will not resist this update in order to keep Bitcoin alive, so BTC and ETH will easily come out of this quantum war, but the time has come for them to determine their road map and take action. There is SHA256, there is SHA512, there are more advanced versions, and making encryption algorithms resilient is a much simpler thing than developing quantum computing systems. In summary, you can breathe easy.

Disclaimer: The information contained in this content is not investment advice. Please note that cryptocurrencies involve high volatility and therefore risk. It is recommended that you make your investment decisions based on your own research and risk assessments. You can review our Trust Center page for detailed information.

You Might Also Like

Critical Warning from Uniswap Founder: Fake Ads Trap Crypto Users

$19 Million Recovered in Attack on US Government Wallet

He defrauded Cryptocurrency Investors by Selling Subscriptions for $250-500

Suspicious $70 Million Transfer That Created Panic in DeFi Altcoin: Price Dropped

Crypto Fraud Operation in the USA in which $61 Million Tether was Seized

TAGGED:Security
Share This Article
Facebook Twitter Email Print
Previous Article Algorand Price Surges 10%—Is ALGO Finally Breaking Its Downtrend?
Next Article Ripple  Partners With Convera for Stablecoin Payments
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Crypto Live Widget

Follow for Live Updates
Subscribe to our newslettern

Get Newest Articles Instantly!

- Advertisement -
Ad imageAd image
Popular News
Why Ethereum is Poised to Explode to $4,600 Sooner Than You Think!
Five Altcoins With 100x Potential To Buy Now
ETF Approvals, Regulatory Frameworks, and Market Dynamics
Top News, Bitcoin and Altcoin Volatility, Major Hacks, and DeFi Investments
RCO Finance (RCOF) Captures The Future

Company

  • Vision
  • Mission
  • LitePaper
  • Whitepaper
  • Core Values
  • Branding
  • Teams
  • Career Listing
  • FAQ
  • Welfare Donations

Products

  • EDA Coin
  • Blockchain Literature
  • EdaFace Dex
  • EdaFace Mall
  • Listing Platforms
  • Newsfeed
  • NFT Marketplace
  • P2P Market
  • Scam Verification Centre
  • School of Crypto

Legal

  • Term of Use
  • Privacy Policy
  • Disclaimers
  • Contact Us
  • Chat Forun

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

EdaFace

About US

EdaFace is a user interface aggregator that brings all the various functionalities of the crypto industry onto a single platform! You can advertise, launch and crowdfund your crypto project via EdaFace Launchpad and Newsfeed.

Contact us: [email protected]

Follow us

Instagram Twitter Facebook Telegram Youtube Linkedin

Copyright © 2022 – 2026. EdaFace is a product of Emerging Digital Age (EDA) Pty Ltd. All Rights Reserved.

Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.
EdaFace
Welcome Back!

Sign in to your account

Lost your password?