MicroStrategy’s Saylor says quantum computing threat over decade away; BIP-360 groundwork

MSTRMSTR

Michael Saylor said credible quantum computing threats to Bitcoin’s signature cryptography are more than a decade away and any breakthrough would be met by software upgrades first. Developers have proposed BIP-360 in the Bitcoin Improvement Proposals to lay groundwork for future quantum-resistant hardening.

1. Quantum Threat Timeline

Michael Saylor argues that a quantum computer capable of breaking modern cryptography is not an in-decade event, projecting that any credible threat lies beyond ten years. He emphasizes that Bitcoin’s software architecture allows for preemptive upgrades before quantum attackers can exploit breakthroughs.

2. Core Cryptography Concern

The main vulnerability targets public-key signature schemes rather than proof-of-work mining. If large-scale quantum machines run Shor’s algorithm effectively, they could derive private keys from exposed public keys, prompting the need for post-quantum cryptography.

3. BIP-360 Proposal

Bitcoin developers have introduced BIP-360 in the Improvement Proposals repository as foundational work toward quantum-hardening. This draft outlines standards for future transitions to quantum-resistant algorithms without disrupting network consensus.

4. Address Exposure and Mitigation

Not all Bitcoin outputs reveal public keys immediately; many remain protected until spent, focusing risk on legacy address reuse and visible-on-chain keys. Mitigation efforts concentrate on adopting new output types and spending policies to minimize exposed key windows.

Sources

F