TL;DR
The race between quantum computing and cryptography is entering a more concrete phase after Google reported progress that was long considered theoretical. For crypto holders, the implications are not immediate, but they are increasingly relevant.
Building for the future means preparing for the quantum era today. Our security teams have just introduced our 2029 timeline for PQC migration, warning that quantum computers could break standard encryption much sooner than many previously expected. Learn more in @ArsTechnica. https://t.co/JDgAKAwXtj
— News from Google (@NewsFromGoogle) March 25, 2026
Google’s latest experiment demonstrated below-threshold quantum error correction, meaning that adding more qubits can improve stability instead of increasing errors. This marks a necessary condition for building large-scale, fault-tolerant quantum computers.
The connection to crypto security is direct. Networks like Bitcoin and Ethereum rely on public-key cryptography, particularly ECDSA, to validate ownership and authorize transactions. These systems are built on the assumption that deriving a private key from a public key is computationally unfeasible with classical machines.
Quantum computers challenge that assumption. Through Shor’s algorithm, a sufficiently advanced system could derive private keys from exposed public keys using mathematical shortcuts rather than brute force. This introduces a structural vulnerability once the hardware reaches the required scale.
At present, quantum machines remain far from that threshold. Experts estimate that thousands of stable logical qubits are needed, while current systems still operate with limited and error-prone qubits. The gap is still wide, but the direction of progress is now clearer.

The crypto sector has already begun preparing for this scenario. In 2024, NIST finalized post-quantum cryptography standards, including CRYSTALS-Dilithium for digital signatures and CRYSTALS-Kyber for secure key exchange. These algorithms are designed to resist both classical and quantum attacks.
Ethereum may have a more flexible transition path due to its evolving architecture. Mechanisms such as account abstraction allow updates to signature schemes without requiring disruptive protocol changes. Bitcoin, by contrast, would likely need a coordinated upgrade such as a hard fork, which involves broader consensus across the network.
Risk exposure also depends on wallet behavior. Addresses that have already broadcast their public keys are more vulnerable in a future quantum scenario. This has increased focus on best practices like avoiding address reuse and moving funds to fresh addresses.
Another growing concern is the “harvest now, decrypt later” strategy, where attackers store encrypted blockchain data today with the intention of breaking it once quantum capabilities mature.