Scan to Download Gate App
qrCode
More Download Options
Don't remind me again today

Bitcoin in 2028: Cracked? The "Quantum Doomsday Clock" is just marketing hype and FUD from the vendors.

Websites operated by Postquant Labs and Hadamard Gate Inc., such as the “Quantum Doomsday Clock,” package aggressive assumptions about qubit scaling and error rates into a timeline spanning the late 2020s to early 2030s. However, the NSA’s CNSA 2.0 guidelines recommend that national security systems transition to post-quantum algorithms by 2035.

The Gap Between the Quantum Doomsday Clock’s Aggressive Assumptions and Reality

According to the Quantum Doomsday Clock, recent resource estimates for logical qubits—combined with optimistic hardware error trends—suggest that, under favorable models, physical qubits needed to break ECC could reach into the millions. The clock’s assumptions rely on exponential hardware growth and increasing fidelity with scale, with runtime and error correction overheads considered surmountable in the short term.

How aggressive are these assumptions? A widely cited analysis by Gidney and Ekerå in 2021 estimated that factoring RSA-2048 would require roughly 20 million noisy physical qubits operating over about 8 hours, with a physical error rate around 10⁻³. This highlights how improvements in error correction and code distance can outweigh raw device counts. For Bitcoin, cracking ECC-256 would demand even greater resources.

Marketing-driven timelines assume exponential qubit growth and error rates dropping to 10⁻³ or lower, projecting that hundreds of thousands to millions of qubits could enable cryptanalytic breakthroughs by the late 2020s or early 2030s. Mainstream laboratory perspectives favor a gradual scaling approach, believing that reducing errors via code distance will require hundreds of thousands of qubits, with the earliest feasible window around mid-2030s to 2040s. Conservative estimates point to slow hardware growth, plateauing fidelity improvements, and bottlenecks in qubit manufacturing, suggesting that tens of millions or more qubits might be needed, pushing timelines into the 2040s or beyond.

Government standards do not treat the 2027–2031 transition window as baseline. The NSA’s CNSA 2.0 recommends that national security systems complete the transition to post-quantum algorithms by 2035, with phased milestones—identifying quantum-sensitive services by 2028, prioritizing high-value assets by 2031, and completing migration by 2035. The UK’s NCSC proposes similar pacing.

Policy timelines serve as practical risk guides for institutions planning budgets, dependencies, and compliance. They imply multi-year transitions rather than abrupt shifts in 2 years. This 7-year (2028–2035) gradual schedule starkly contrasts with the Quantum Doomsday Clock’s aggressive 2-3 year predictions, which are likely designed to create urgency for marketing purposes.

Laboratory Progress and the Gap in Cryptanalytic Feasibility

Laboratory advances are real and relevant but have not yet demonstrated the combination of scale, coherence, gate fidelity, and T-gate throughput necessary for breaking Bitcoin parameters with Shor’s algorithm. For example, Caltech reports a neutral atom array with 6,100 qubits achieving 12.6 seconds of coherence and high-fidelity transmission—an engineering milestone toward fault tolerance, not a demonstration of low-error logical gates at the required code distance.

Google’s Sycamore chip with 105 qubits achieved breakthroughs in algorithms and hardware, claiming exponential error suppression for specific tasks. IBM has demonstrated real-time error correction control loops on general AMD hardware, an important step toward system-level fault tolerance. However, these existing solutions do not eliminate the resource bottlenecks identified in surface code simulations, where classical overheads for RSA and ECC remain significant under current assumptions.

Scaling from 105 qubits to hundreds of thousands or millions is not a simple linear process. Each added qubit exponentially increases system complexity. Control electronics, cooling, error correction overhead, and crosstalk all worsen with scale. While Google and IBM’s breakthroughs show promising paths, practical, cryptographically relevant quantum computers are still several orders of magnitude away.

For Bitcoin and quantum threat assessment, the earliest realistic attack vector involves on-chain key exposure rather than preemptive decryption of SHA-256 hashes. According to Bitcoin Optech, once a quantum-capable machine exists, outputs with exposed public keys—such as reused P2PK or certain Taproot paths—become targets. Typically, P2PKH addresses are protected by hashing before exposure.

Bitcoin’s Multi-Layer Defense and Upgrade Path

Developers and researchers are exploring multiple mitigation strategies, including Lamport or Winternitz one-time signatures, P2QRH address formats, and proposals to isolate or rotate vulnerable UTXOs. Supporters of BIP-360 estimate that over 6 million Bitcoin outputs are potentially quantum-exposed—these figures represent upper bounds, not consensus.

The economic and physical implications of migration are equally critical. With NIST standards like FIPS-203 (key encapsulation) and FIPS-204 (signatures), wallets and exchanges can implement post-quantum algorithms today. For example, FIPS-204’s ML-DSA-44 public keys are 1,312 bytes, signatures 2,420 bytes—much larger than secp256k1 counterparts.

Under current block size limits, replacing P2WPKH inputs with post-quantum signatures and public keys would increase each input from tens to thousands of bytes. Without aggregation, batch verification, or moving data off critical paths, this would reduce throughput and raise costs. Entities with many publicly exposed UTXOs have economic incentives to gradually phase out exposed keys before demand peaks.

Bitcoin’s Defense Layers Against Quantum Attacks

  • Hash Protection: P2PKH addresses are hashed before exposure, delaying public key revelation.
  • One-Time Signatures: Lamport or Winternitz signatures resist quantum attacks.
  • P2QRH Address Format: Designed for post-quantum era.
  • UTXO Rotation: Isolating or rotating vulnerable outputs.

Bitcoin’s design, which hashes public keys before spending, extends the window before exposure. When signals indicate it’s time to transition, the network’s strategy includes multiple rotation and mitigation options. This layered defense provides a sufficient time window to adapt to quantum threats.

Traditional Systems Are More Vulnerable; Many Still Run Windows XP

It’s important to note that when quantum computers threaten Bitcoin’s cryptography, other traditional systems face similar risks. Banks, social media, financial apps—many rely on outdated infrastructure. If legacy systems aren’t updated, societal risks could surpass the loss of some cryptocurrencies.

Some argue Bitcoin’s upgrade process is faster than traditional institutions, but many ATMs and banks still run Windows XP—released in 2001, unsupported since 2014, yet still in use in critical financial infrastructure. The inertia of legacy systems exceeds public perception.

While Bitcoin’s decentralized consensus can facilitate upgrades more efficiently than banks, the narrative of an imminent “doomsday” clock often serves marketing purposes—creating urgency to push solutions. In reality, risk management relies on standards like NIST’s final algorithms, government transition timelines around 2035, and laboratory milestones indicating system resilience.

With standards like FIPS-203 and FIPS-204 available, wallets and services can begin addressing key leaks and testing larger signatures without waiting for worst-case scenarios. The relationship between Bitcoin and quantum computing should be grounded in scientific consensus and government standards, not marketing-driven timelines.

BTC2.23%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)