Quantum Computing Is ‘Biggest Risk to Bitcoin,’ Says Coin Metrics Co-Founder

Tech

Share this article

Nic Carter says quantum computing is bitcoin’s biggest risk, explaining how spending exposes public keys and urging developers to plan post-quantum defenses.

By Siamak Masnavi, AI Boost|Edited by Aoyon Ashraf

Updated Oct 20, 2025, 3:21 p.m. Published Oct 20, 2025, 3:17 p.m.

Bitcoin Image
  • Carter calls quantum computing the biggest long-term risk to bitcoin’s core cryptography.
  • He explains, in simple terms, how private and public keys work and why the math is one way.
  • He says revealing public keys on spend raises exposure and urges near- and long-term planning.

Nic Carter says quantum computing is the biggest long-term risk to bitcoin’s core cryptography and urges developers to treat it with urgency, not as science fiction.

In an essay published Monday, the Coin Metrics cofounder explains in plain language how bitcoin’s keys work and why quantum matters. Carter writes that users start with a secret number (a private key) and derive a public key with elliptic-curve math on the secp256k1 curve, the basis for ECDSA and Schnorr signatures.

STORY CONTINUES BELOW

Don’t miss another story.Subscribe to the The Protocol Newsletter today.See all newslettersBy signing up, you will receive emails about CoinDesk products and you agree to ourterms of useandprivacy policy.

He describes that transformation as deliberately one way: easy to compute forward, infeasible to reverse under classical assumptions. “Bitcoin’s entire cryptographic premise is ‘there exists a one-way function that’s easy to compute in one direction, and infeasible to invert,’” he writes.

To build intuition, Carter likens the system to a giant number scrambler. Going from private to public is efficient for honest users, he says, because they can use a shortcut known as “double and add” to reach a result quickly. He adds there is no comparable shortcut in the opposite direction.

For non-specialists, he offers a deck-shuffle analogy: you can repeat the same sequence of shuffles to reach an identical final order, but an observer cannot look at the shuffled deck and infer how many shuffles were used.

Carter argues the concern is that a sufficiently powerful quantum computer could erode that asymmetry by making progress on the discrete logarithm problem that underpins bitcoin’s signatures. In his telling, routine network behavior also raises exposure: when coins are spent, a public key is revealed on-chain.

He says that is safe today because converting a revealed public key back to the private key is not practical, but quantum advances could change that calculus, especially if addresses are reused and more keys remain visible for longer.

He is not calling for panic. Carter says the point is to plan.

Near term, he highlights basic hygiene such as avoiding address reuse so public keys are not exposed longer than necessary. Longer term, he urges the community to prioritize post-quantum signature schemes and realistic migration paths, framing them as engineering work rather than a distant thought experiment.

The essay is the first in a short series; Carter said on X that parts II and III will arrive in the next couple of weeks and will cover “post-quantum break scenarios.”

AI Disclaimer: Parts of this article were generated with the assistance from AI tools and reviewed by our editorial team to ensure accuracy and adherence to our standards. For more information, see CoinDesk’s full AI Policy.

More For You

By CoinDesk Research

Oct 16, 2025

OwlTing logo

Commissioned by

OwlTing

OwlTing Report Open Graph Image

Stablecoin payment volumes have grown to $19.4B year-to-date in 2025. OwlTing aims to capture this market by developing payment infrastructure that processes transactions in seconds for fractions of a cent.

More For You

By Siamak Masnavi, AI Boost|Edited by Aoyon Ashraf

21 hours ago

XRP Logo (Midjourney / Modified by CoinDesk)

Long-time XRP investor Brandon LaRoque says he discovered the loss on Oct. 15 in cold wallet maker Ellipal’s mobile app, but the theft occurred on Oct. 12.

What to know:

  • He says he found the loss on Oct. 15 in the Ellipal app; the theft happened on Oct. 12.
  • Ellipal told him that if you type a hardware wallet’s seed into the Ellipal app, the private keys are saved on your phone or tablet, turning it into a hot wallet.
  • He says his iPhone app showed a blue “cold” view while his iPad showed an orange “hot” view, per Ellipal’s color cues.
  • On-chain sleuth ZackXBT traced Oct. 12 swaps via a bridge to Tron and then to OTC venues.

 

Leave a Reply

Your email address will not be published. Required fields are marked *