Quantum Computing
Updated 2026-04-04
A computing paradigm that uses quantum mechanics, especially superposition and entanglement, to solve certain classes of problems exponentially faster than classical computers. Not faster at everything, but potentially transformative for specific problems such as factoring large integers.
Why It Threatens Cryptography
Modern encryption systems such as RSA, elliptic-curve cryptography, and much of the current security stack depend on the practical difficulty of factoring very large numbers or solving related hard problems. That assumption holds for classical computers. It does not necessarily hold for quantum computers.
Shor’s algorithm (1994): a theoretical method for efficient prime factorization on a quantum computer. The catch so far is that it requires millions of stable qubits, far beyond what is currently practical.
Regev’s improvement (2023, Oded Regev, NYU): reduces the required quantum operations from roughly 28 million to roughly 500,000. That is a major step that shortens the plausible timeline significantly.
Timeline: 5 to 7 Years?
Chamath Palihapitiya argued in April 2026 that the horizon for a cryptography-breaking quantum chip may have moved from “25 to 30 years” down to “5 to 7 years.” Markets are already reacting to that possibility, with quantum-computing stocks benefiting from the repricing.
Bitcoin as the Obvious Honeypot
Chamath’s warning is that if a non-state actor gets the first functional quantum chip, they may not immediately attack every database on earth. That would create too much noise. The quieter move would be to drain Bitcoin wallets first, because they are concentrated, public, and financially attractive, and only then reveal the broader implications.
That gives the Bitcoin ecosystem perhaps 5 to 7 years to become quantum-resistant. In practice that means redesigning wallets, transaction flows, and node software around post-quantum cryptography. Technically possible, but organizationally enormous.
What Quantum-Resistant Means
Algorithms such as CRYSTALS-Kyber and CRYSTALS-Dilithium, standardized by NIST in 2024, are designed to remain secure even against quantum attacks. They do not rely on factoring, but on lattice-based problems for which no efficient quantum algorithm is currently known.
Eventually the entire internet, HTTPS, banking, and secure communications included, will need to migrate. Crypto is simply the most visible early attack surface.