Part one explained the physics of quantum computing. This piece explains the target — how bitcoin’s encryption works, why a quantum algorithm breaks it, and what Google’s paper changed about the timeline.

What to know:
- Bitcoin’s security relies on elliptic curve cryptography, a one-way mathematical function that makes deriving a private key from a public key effectively impossible for traditional computers.
- Shor’s algorithm allows a sufficiently powerful quantum computer to efficiently reverse this one-way function, turning a bitcoin public key into its corresponding private key and enabling theft.
- A recent Google-led paper outlines a realistic attack in which a future quantum computer could, within about nine minutes, derive a private key from an exposed public key and potentially front-run or drain vulnerable bitcoin wallets.
Part 1 of this series explained what quantum computers actually are. Not just faster versions of regular computers, but a fundamentally different kind of machine that exploits the weird rules of physics that only apply at the scale of atoms and particles.
But knowing how a quantum computer works does not tell you how it can be used to steal bitcoin by a bad actor. That requires understanding what it is actually attacking, how bitcoin’s security is built, and exactly where the weakness sits.
This piece starts with bitcoin’s encryption and works through to the nine-minute window it takes to break it, as identified by Google’s recent quantum computing paper.
The one-way map
Bitcoin uses a system called elliptic curve cryptography to prove who owns what. Every wallet has two keys. A private key, which is a secret number, 256 digits long in binary, roughly as long as this sentence. A public key is derived from the private key by performing a mathematical operation on the specific curve called «secp256k1.»
Think of it as a one-way map. Start at a known location on the curve that everyone agrees on, called the generator point G (as shown in the chart below). Take a private number of steps in a pattern defined by the curve’s math. The number of steps is your private key. Where you end up on the curve is your public key (point K in the chart). Anyone can verify that you ended up at that specific location. Nobody can figure out how many steps you took to get there.

Technically, this is written as K = k × G, where k is your private key and K is your public key. The «multiplication» is not regular multiplication but a geometric operation where you repeatedly add a point to itself along the curve. The result lands on a seemingly random spot that only your specific number k would produce.

The crucial property is that going forward is easy and going backward is, for classical computers, effectively impossible. If you know k and G, calculating K takes milliseconds. If you know K and G and want to figure out k, you are solving what mathematicians call the elliptic curve discrete logarithm problem.
It is estimated that the best-known classical algorithms for a 256-bit curve would take longer than the age of the universe.
This
