On February 17, researchers published a study describing an architecture that significantly reduces the quantum resources required to compromise the Elliptic Curve Cryptography (ECC) family of cryptography. One of its derivatives is used in Bitcoin.
A team of researchers Clemence Chevignard, Pierre-Alain Houck, and Andre Schlottenlohr proposes a method to solve the following discrete logarithm problem. Almost half of quantum memory It is a forecast of previous estimates.
The discrete logarithm used in ECC protects Bitcoin since it is impossible to resolve the private key back; Scholl’s algorithm Use quantum superposition to quickly find keys by detecting numerical patterns.
Violating the ECC family, which includes Bitcoin, is like solving a giant puzzle on a workbench. In this analogy, logical qubits represent the physical space of the table, and logical gates indicate the number of moves required to join the parts. new algorithm Allows work in narrow areasHowever, more moves are required to complete the task.
The study estimates that using this new method, an attacker would need only 1,098 to 1,193 logical qubits to crack a 256-bit elliptic curve key. This number is a significant improvement over the 2,124 qubits required in previous models.. The authors achieved this efficiency by using Legendre symbols, a mathematical tool that compresses output information to one bit, saving vast amounts of memory.
Chevignard’s proposal increases the number of logical operations by more than 1,000 times. Each of the 22 required runs requires approximately 280-300 billion Toffoli doors. this Forcing quantum computers to maintain extreme stability It must be used for a long time to successfully complete the calculation.
These findings complement recent advances reported by CriptoNoticias on the Iceberg Quantum company’s Pinnacle architecture. The system optimizes hardware usage through quantum low-density error correction codes (QLDPC), Attack RSA encryption using 1/10th of the planned infrastructure At first. Both studies confirm that the technological threshold for breaching current digital security standards is falling faster than expected.
Stability and the challenge of time
The amount of operations proposed in this study exceeds the capacity of current technology. Cutting-edge processors such as Google’s Willow chip Maintaining the lifetime of a qubit for just 100 microseconds. In contrast, the attacks described here require qubits to remain stable for days or weeks of nonstop computing.
To manage this process with very little memory, researchers apply a technique called . creepy pebble. This method works like a small kitchen where the chef washes each utensil. Prepare next dish immediately after use. Through intermediate measurements, the system recycles qubits from previous steps to prevent equipment capacity exhaustion.
Currently, the industry is far from the requirements of research. A computer with the maximum number of logical qubits operates with only 24 to 28 functional units out of the theoretically required 1098 functional units. This is coupled with the fact that the operating time does not exceed 1 second of activity. For threats to move from academic repositories to practical reality, quantum computing will require up to several days of continuous operation, requiring hardware to expand memory capacity by an additional 97% and radically improve time.

