List of Flash News about ECC security
Time | Details |
---|---|
2025-09-29 06:28 |
Quantum Computing Threat to Bitcoin (BTC) Security: McKinsey 2025 Flags $1B Revenue, 40%+ Growth, and Q-Day Window of 2–10 Years
According to @caprioleio, McKinsey’s Quantum Monitor 2025 indicates quantum computing industry revenues are set to surpass $1 billion in 2025 with annual growth above 40% and $54 billion in global commitments, underscoring accelerating timelines that crypto markets must track for security risk pricing. Source: McKinsey Quantum Monitor 2025; @caprioleio. @caprioleio highlights a 4–5 year path to multi-thousand logical qubits and frames a Q-Day window of 2–10 years, asserting this scale would be sufficient to threaten Bitcoin’s ECC-based security. Source: @caprioleio. Bitcoin relies on ECDSA over secp256k1, and sufficiently large fault-tolerant quantum computers running Shor’s algorithm can compute elliptic-curve discrete logarithms, enabling private-key recovery from public keys in principle. Source: NIST Post-Quantum Cryptography (2024) overview; NIST Computer Security Resource Center. Academic resource estimates suggest low-thousands logical qubits are in the ballpark needed to attack 256-bit ECC, aligning with the risk threshold cited by the author. Source: Roetteler, Naehrig, Svore, Lauter (Microsoft Research, 2017); Gidney and Ekerå (2019, Quantum). If ECC were broken, UTXOs that reveal public keys (e.g., address reuse or legacy pay-to-pubkey outputs) are first at risk, which is directly relevant for assessing BTC key-exposure on-chain. Source: Bitcoin Wiki – Address reuse; Bitcoin protocol documentation. NIST finalized initial post-quantum cryptography standards in 2024 (including CRYSTALS-Kyber and CRYSTALS-Dilithium), providing a migration path that security-focused market participants can monitor against the author’s Q-Day window. Source: NIST PQC standards announcement 2024; NIST CSRC. |