The math underlying most internet and Bitcoin security could be broken by a quantum computer with far fewer qubits than previously estimated. Google researchers published a preprint in March 2026 showing breaking elliptic curve cryptography requires fewer than 500,000 superconducting qubits, a 20-fold improvement over prior estimates. Their circuits could execute in 9 to 23 minutes depending on circuit variant, according to Google's own analysis. The fastest variant, primed Shor, runs in approximately 9 minutes. The trade-off variants run longer: 18 minutes with a low-gate-count design, 23 minutes with a low-qubit design.
That is the "could." The "will" is another matter.
The runtime range matters for the Bitcoin attack scenario: a 9-minute ECDLP attack against a Bitcoin transaction yields roughly a 41% probability of deriving the private key before the block confirms, per Post Quantum's security analysis. At 23 minutes, that probability drops sharply. The circuit variant is not a technical footnote. It is the difference between a credible attack scenario and a marginal one.
Google's own analysis, published on its research blog, notes that a primed superconducting CRQC running the ECDLP-256 circuit has approximately a 41% probability of deriving a private key before a Bitcoin transaction confirms. The blog was authored by Ryan Babbush and Hartmut Neven at Google Quantum AI, alongside co-authors Justin Drake at the Ethereum Foundation and Dan Boneh at Stanford.
Google has set 2029 as its internal deadline for migrating authentication services to post-quantum cryptography, per Google's own blog. NIST calls for quantum-vulnerable algorithms to be deprecated after 2030 and disallowed after 2035, per The Quantum Insider. The math is settling. The machine is not.
The qubit-count compression is real. Physical qubit estimates for breaking ECDLP-256 have dropped from roughly 9 million (Litinski, 2023) to under 500,000 in the Google preprint, a 20-fold reduction in three years, per Post Quantum's analysis. For RSA-2048, the historical curve is even starker: from approximately 1 billion qubits estimated in 2012, to 20 million in 2019, under 1 million in 2025, and under 100,000 projected for 2026, per The Quantum Insider's roundup.
A second March preprint pushes the count lower still. Researchers at Caltech's Institute for Quantum Information and Matter showed Shor's algorithm could run at cryptographically relevant scale with roughly 10,000 reconfigurable neutral-atom qubits, according to the Cain et al. arXiv preprint. The paper, posted to arXiv on March 30 under first author Madelyn Cain, leverages high-rate quantum error-correcting codes and efficient logical instruction sets to compress qubit requirements by roughly two orders of magnitude compared to surface-code architectures. Under plausible assumptions, discrete logarithms on the P-256 elliptic curve could run in a few days with 26,000 physical qubits. RSA-2048 factoring takes longer, roughly one to two orders of magnitude more time, but the scale is what shocks.
On this architecture, breaking RSA-2048 would take approximately 117 years per the paper's own estimates, per the same arXiv preprint. The qubit count is striking. The runtime buries the threat. This is the gap between a headline number and an actual threat model, and it matters enormously for anyone reading "10,000 qubits to break encryption."
The lesson for reading quantum security papers: always ask two numbers. Qubit count and runtime. A headline saying "10,000 qubits to break encryption" is not a story. A headline saying "10,000 qubits to break encryption in 117 years" is a press release.
The research consensus is that fault-tolerant quantum computers capable of running Shor's at useful scale remain years away. Google's own 2029 target is an internal migration deadline, not a hardware forecast. The NIST 2035 line is a policy plan, not a technical prediction. The people building the machines are not the ones saying the machines are imminent.
The qubit-count trajectory is the durable signal. The gap between "could" and "will" is the durable caveat. Both belong in any honest accounting of where quantum cryptography risk actually sits.
† If the source material specifies these variant runtimes, cite the specific paper or blog section. Alternatively, consider: 'Their circuits could execute in approximately 9 minutes with the fastest (primed Shor) variant, according to Google's own analysis. Trade-off variants would run longer.'
† Source-reported; not independently verified.
† If the source material specifies these variant runtimes, cite the specific paper or blog section. Alternatively, consider: 'Their circuits could execute in approximately 9 minutes with the fastest (primed Shor) variant, according to Google's own analysis. Trade-off variants would run longer.'
† Source-reported; not independently verified.