{"id":96488,"date":"2026-04-24T17:46:47","date_gmt":"2026-04-24T14:46:47","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=96488"},"modified":"2026-04-24T17:50:15","modified_gmt":"2026-04-24T14:50:15","slug":"researcher-earns-1-btc-for-cracking-ecc-key-with-quantum-computer","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/researcher-earns-1-btc-for-cracking-ecc-key-with-quantum-computer\/","title":{"rendered":"Researcher Earns 1 BTC for Cracking ECC Key with Quantum Computer"},"content":{"rendered":"<p>Independent researcher Giancarlo Lelli calculated a 15-bit cryptographic key on <span data-descr=\"elliptic curves\" class=\"old_tooltip\">ECC<\/span> using a publicly accessible quantum computer, as reported by the startup team Project Eleven.\u00a0<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Project Eleven Awards 1 BTC Q-Day Prize for Largest Quantum Attack on Elliptic Curve Cryptography to Date<\/p>\n<p>Researcher breaks 15-bit ECC key on publicly accessible quantum hardware in a 512x jump from the previous public demonstration.<\/p>\n<p>Project Eleven today awarded the Q-Day\u2026<\/p>\n<p>\u2014 Project Eleven (@projecteleven) <a href=\"https:\/\/twitter.com\/projecteleven\/status\/2047661990605156796?ref_src=twsrc%5Etfw\">April 24, 2026<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Lelli applied a modification of Shor&#8217;s algorithm to a search space of 32,767 combinations. This method targets the discrete logarithm problem on elliptic curves, the mathematical foundation of digital signatures used in most blockchains.<\/p>\n<p>Project Eleven awarded the researcher 1 BTC as part of the Q-Day Prize program. The initiative was launched in 2025 to crack keys ranging from 1 to 25 bits.\u00a0<\/p>\n<p>In September, engineer Steve Tippeconnic <a href=\"https:\/\/forklog.com\/en\/news\/quantum-computer-cracks-tiny-cryptographic-key\">extracted<\/a> a six-bit ECC key on a 133-qubit IBM computer. Developers noted that this was the first public attack of its kind on quantum hardware.\u00a0<\/p>\n<p>Lelli&#8217;s result surpassed it by 512 times. The project team described the latest experiment as the largest quantum-based attack on elliptic curves to date.<\/p>\n<p>The scale of the demonstration is still incomparable to real systems: Bitcoin uses 256-bit ECC for wallet protection. Project Eleven noted the gap. However, programmers consider the transition more of an engineering challenge than a fundamental physical problem.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">Preparation Needed\u00a0<\/h2>\n<p>CEO of Project Eleven Alex Pruden stated that the resource requirements for such attacks are decreasing, and the barrier to their practical implementation is gradually lowering. According to him, this underscores the need to transition to post-quantum cryptography.<\/p>\n<p>The company also pointed out that about 6.9 million BTC are held in addresses where public keys are already visible on-chain. Should sufficiently powerful quantum systems emerge, such wallets could become the most vulnerable.<\/p>\n<p>In recent months, discussions about quantum risks to the crypto market have intensified. Earlier, Google researchers <a href=\"https:\/\/forklog.com\/en\/news\/google-reduces-quantum-computing-power-estimate-for-bitcoin-breach\">reduced<\/a> the estimate of quantum power needed to break Bitcoin. However, some <a href=\"https:\/\/forklog.com\/en\/news\/grayscale-bitcoins-quantum-challenge-is-more-social-than-technical\">believe<\/a> the issue is exaggerated.\u00a0<\/p>\n<p>Back in April, Bitcoin developer Jameson Lopp and a group of experts <a href=\"https:\/\/forklog.com\/en\/news\/radical-plan-to-shield-bitcoin-from-quantum-computers-sparks-outrage\">presented<\/a> a draft proposal <a href=\"https:\/\/www.bip361.org\/\">BIP-361<\/a>. The initiative suggests freezing coins vulnerable to quantum computers.\u00a0<\/p>\n<p>The community criticized the idea, calling it authoritarian and confiscatory.\u00a0<\/p>\n<p>Other blockchains have also begun preparing for a transition to post-quantum cryptography, including <a href=\"https:\/\/forklog.com\/en\/news\/ethereum-foundation-to-implement-quantum-security-by-2029\">Ethereum<\/a> and <a href=\"https:\/\/forklog.com\/en\/news\/ripple-unveils-strategy-to-shield-xrp-ledger-from-quantum-threats\">Ripple<\/a>.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Independent researcher Giancarlo Lelli calculated a 15-bit cryptographic key on ECC using a publicly accessible quantum computer.<\/p>\n","protected":false},"author":1,"featured_media":96489,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"Researcher cracks 15-bit ECC key with quantum computer, earning 1 BTC.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[18,575,1360],"class_list":["post-96488","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-bitcoin","tag-quantum-computers","tag-quantum-computing"],"aioseo_notices":[],"amp_enabled":true,"views":"40","promo_type":"1","layout_type":"1","short_excerpt":"Researcher cracks 15-bit ECC key with quantum computer, earning 1 BTC.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/96488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=96488"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/96488\/revisions"}],"predecessor-version":[{"id":96490,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/96488\/revisions\/96490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/96489"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=96488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=96488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=96488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}