Insider Transient
- A brand new international competitors backed by Mission Eleven will award 1 Bitcoin—at present valued round $84,000 — to anybody who can use a quantum laptop to interrupt elliptic curve cryptography utilizing Shor’s algorithm.
- Members should submit a working quantum implementation focusing on ECC keys as much as 25 bits, with no classical shortcuts or hybrid strategies allowed.
- The competition highlights the real-world cryptographic dangers of advancing quantum {hardware}, as specialists estimate a 256-bit ECC key might be cracked with 2,000 logical qubits, probably inside a decade.
A brand new competitors is providing a single Bitcoin to anybody who can break elliptic curve cryptography utilizing a quantum laptop — no shortcuts allowed.
Launched by Mission Eleven, an open science initiative targeted on quantum and cryptographic challenges, the QDay Prize goals to check simply how shut quantum computing is to undermining one of many world’s most generally used encryption schemes. The competition runs by way of April 5, 2026.
Elliptic Curve Cryptography, or ECC, secures a variety of programs — from Bitcoin wallets and safe web sites to messaging apps and authorities infrastructure. Its enchantment lies in effectivity: a 256-bit ECC key delivers the identical safety as a a lot bigger 3,072-bit RSA key. And whereas classical computer systems wrestle to crack ECC, quantum computing presents an actual menace, if it may be made to work.
(*1*)
Proper now, a Bitcoin is price about $84,000.
Pure Quantum Energy

The problem is easy in premise however formidable in execution: “Break the most important ECC key doable utilizing Shor’s algorithm on a quantum laptop,” based on Mission Eleven. Submissions should display gate-level implementation of Shor’s algorithm fixing the elliptic curve discrete logarithm downside (ECDLP): “No classical shortcuts. No hybrid methods. Pure quantum energy.”
Members can register as people or groups, with no institutional affiliation required. Submissions should embody quantum program code, a written clarification of the tactic, and particulars in regards to the {hardware} used.
The quantum machine doesn’t should be publicly accessible, however the organizers emphasize transparency, including they are going to share submissions publicly.
The undertaking has ready a set of ECC keys starting from 1 to 25 bits for testing. That’s properly beneath the 256-bit keys utilized in precise Bitcoin wallets, however a profitable assault — even at 3 bits — would mark an actual milestone.
That’s as a result of Shor’s algorithm, launched in 1994, stays one of the vital essential theoretical breakthroughs in quantum computing. The algorithm permits a sufficiently giant quantum laptop to unravel sure mathematical issues exponentially sooner than any identified classical methodology. Amongst them: factoring giant integers and fixing the ECDLP, which underpins ECC.
How Shor’s Algorithm Works
Shor’s algorithm works by turning the issue into one in all discovering the interval of a mathematical operate — a activity quantum computer systems can clear up effectively utilizing the Quantum Fourier Rework.
The algorithm creates a superposition of states, permitting it to discover many inputs directly and use interference to zero in on the right reply. For elliptic curve cryptography, it targets the elliptic curve discrete logarithm downside, making it a strong theoretical menace to fashionable encryption programs.
Error-Inclined Quantum Methods
Sensible implementation of Shor’s algorithm stays tough. Right now’s quantum programs are error-prone and restricted in scale. Operating Shor’s algorithm reliably requires high-fidelity qubits and error correction, each of which stay energetic areas of analysis.
“Right now’s qubits have 99%–99.9% constancy—is that ok?” Mission Eleven asks on the QDay Prize web site.
Regardless of the constraints, quantum progress is accelerating. Corporations and nations are advancing {hardware} steadily. Estimates recommend that round 2,000 logical (error-corrected) qubits could also be sufficient to interrupt a 256-bit ECC key, one thing researchers imagine is achievable throughout the subsequent decade.
That readiness has turn into a spotlight of worldwide cryptographic communities. The U.S. Nationwide Institute of Requirements and Expertise (NIST) is already standardizing post-quantum algorithms, ones designed to withstand quantum assaults. However till quantum programs are able to breaking one thing actual, nobody is aware of precisely how pressing the menace is.
To date, no real-world ECC key has been damaged by both classical or quantum strategies. The most effective classical assaults stay exponentially slower than quantum ones in principle, and quantum demonstrations to this point have solely dealt with toy issues.
“Quantum computing is advancing quick, and the affect on cryptography is inevitable,” the organizers say. “As a substitute of ready for breakthroughs to occur behind closed doorways, we imagine in dealing with this problem head on, in a clear and rigorous method.”