Quantum Computing Is Poised to Break More Than Bitcoin: Encrypted Chats Are in the Crosshairs
For years, quantum computing has been framed as a looming danger for Bitcoin and other cryptocurrencies. But the same mathematical breakthroughs that could one day tear through blockchain defenses are just as capable of ripping open supposedly secure messaging apps used by governments, activists, journalists, and ordinary users.
A new report from IBM highlights this broader risk. The company has been collaborating with developers from secure messaging platforms like Signal and Threema to rethink how their underlying protocols work in a world where quantum computers are powerful enough to crack today’s standard encryption.
According to the researchers, the encryption systems that currently protect most internet traffic-including private chats-are extraordinarily resilient against traditional, or “classical,” computers. Even the fastest supercomputers would need incomprehensible amounts of time to brute-force their way into properly implemented modern encryption.
The situation changes dramatically once large-scale quantum computers arrive. Quantum algorithms such as Shor’s algorithm can, in principle, solve the hard mathematical problems that today’s public-key cryptography relies on-like factoring large prime numbers or computing discrete logarithms-at speeds that turn “billions of years” into “maybe hours or days.”
That’s the core of the concern: encryption that looks unbreakable today could become vulnerable practically overnight once a sufficiently powerful quantum machine exists.
From Bitcoin to Backchannels: A Broader Quantum Threat
The crypto industry has been debating for years how quantum computing might impact Bitcoin’s security model. If quantum computers can derive private keys from public keys, attackers could potentially forge transactions, steal funds, or compromise older addresses that reveal their public keys on-chain.
But cryptography researcher Ethan Heilman and others stress that focusing solely on digital currencies misses the bigger picture. The same cryptographic primitives that underpin wallets and smart contracts also secure end-to-end encrypted chats, secure email, VPNs, and much of the world’s secure web traffic.
Encrypted messaging apps often rely on public-key cryptography to establish secure channels, verify identities, and perform key exchanges. If those building blocks are broken, attackers could do much more than just snoop-they could impersonate contacts, insert themselves into conversations, or retroactively unlock years of archived communications.
“Harvest Now, Decrypt Later”: Why the Threat Is Already Real
One of the most disturbing aspects of the quantum threat is that the damage doesn’t start when quantum computers are ready-it starts now.
Adversaries can quietly store, or “harvest,” encrypted data today with the expectation that they’ll be able to decrypt it in the future, once quantum hardware matures. This strategy, often described as “harvest now, decrypt later,” is particularly dangerous for:
– Government communications and diplomatic cables
– Investigative journalism and whistleblower chats
– Corporate secrets, trade negotiations, and legal files
– Personal data and private conversations that remain sensitive for years
The sensitivity of a message doesn’t end when it’s sent. Medical records, political discussions, identities of sources, or long-term strategic plans may all remain harmful or compromising if revealed years later. That time-lag vulnerability is exactly why security experts argue that messaging protocols must become quantum-resistant well before quantum machines become practically capable of breaking them.
Why Current Messaging Protocols Are at Risk
Most popular end-to-end encrypted apps use a combination of:
– Public-key encryption (often elliptic curve-based)
– Key exchange mechanisms (like Diffie-Hellman over elliptic curves)
– Symmetric encryption for message content
Quantum computers pose the greatest threat to the asymmetric, public-key components. A sufficiently advanced quantum machine could:
– Derive private keys from public keys
– Break key exchange protocols
– Weaken digital signatures used to verify identities
Once those layers are compromised, the rest of the security model collapses. Even if the actual message encryption (usually symmetric algorithms like AES) stays relatively safe with longer keys, the mechanisms used to share and manage those keys could be broken.
That’s why IBM’s collaboration with Signal and Threema focuses on re-engineering the foundations, not just patching around the edges.
IBM, Signal, Threema: Building Quantum-Resistant Messaging
In its report, IBM outlines its work with messaging developers to integrate so-called “post-quantum” cryptography into their protocols. The goal is to create messaging systems that:
– Remain secure against both classical and quantum attacks
– Are compatible with existing devices and networks
– Minimize performance overhead so users don’t notice a slowdown
– Maintain the usability and privacy guarantees that made apps like Signal popular in the first place
Post-quantum cryptography uses mathematical problems believed to be hard even for quantum computers-such as lattice-based schemes, hash-based signatures, or code-based constructions. Standards bodies are in the process of formalizing which algorithms should be adopted globally, but messaging platforms can already start experimenting with hybrid approaches.
One strategy gaining traction is “hybrid key establishment,” where a messaging app combines a traditional key exchange (like elliptic-curve Diffie-Hellman) with a post-quantum key exchange. Even if one of them is broken-by future quantum computers or by some unforeseen classical attack-the other mechanism still protects the final shared secret.
Why This Migration Is So Complex
In theory, replacing vulnerable algorithms with quantum-safe ones sounds straightforward. In practice, it’s a massive engineering, usability, and governance challenge:
– Compatibility: Billions of devices use existing protocols. Any change must work seamlessly across old and new hardware, operating systems, and network conditions.
– Performance: Some post-quantum algorithms require larger keys and more computational resources, which can strain low-end devices or slow connection times.
– Security Proofs: New schemes need rigorous analysis to avoid trading one set of risks (quantum attacks) for another (immature or flawed designs).
– User Experience: Users are unlikely to accept visible complexity or disruptions. The transition must be largely invisible while still meaningful.
Messaging apps don’t just swap ciphers in a vacuum. They have to consider group chats, backups, multi-device usage, identity verification, and interoperability. All of that has to be re-evaluated under a quantum threat model.
Governments, Journalists, and High-Value Targets
While your everyday chat may not seem like a high-value target, certain users are at significantly greater risk from a quantum-enabled adversary:
– Diplomats and civil servants exchanging sensitive political information
– Journalists communicating with confidential sources
– Human rights advocates and dissidents operating in hostile environments
– Executives and negotiators handling mergers, acquisitions, or trade deals
For these groups, “harvest now, decrypt later” is not a theoretical concept-it’s a plausible strategy that well-resourced adversaries could already be pursuing. Long-lived secrets are especially exposed: a negotiation transcript or leaked document might be just as damaging when revealed five or ten years later.
This is why experts argue for early adoption of quantum-resistant protocols in critical sectors, even before average consumer apps fully transition.
What Quantum-Safe Messaging Might Look Like
A future-ready secure messaging ecosystem will likely incorporate several concrete shifts:
1. Post-quantum key exchange and signatures
Messaging protocols will rely on algorithms chosen specifically for their resistance to quantum attacks, standardized by international cryptographic bodies.
2. Hybrid cryptography during the transition phase
For years, apps may use both classical and post-quantum methods simultaneously, combining their outputs so that breaking one is not enough.
3. Forward secrecy with quantum safety in mind
Many apps already implement forward secrecy so that compromising one key doesn’t reveal past messages. Future designs must ensure this principle survives quantum-scale attacks.
4. Re-keying and protocol agility
Protocols will need to be flexible enough to swap algorithms again in the future if new vulnerabilities are discovered-without forcing entire ecosystems to rebuild from scratch.
5. Stronger key management and identity protection
Quantum threats make it even more important to secure identity keys, verification methods, and backup mechanisms against long-term compromise.
Timelines: How Urgent Is the Quantum Threat?
There’s no consensus on exactly when large-scale, fault-tolerant quantum computers will become capable of breaking widely used encryption. Estimates range from “within a decade” to “many decades away,” depending on technological progress and unknown breakthroughs.
However, the lack of a precise timeline doesn’t reduce the urgency. Because sensitive data can remain valuable for years or decades, and because it takes a long time to redesign and deploy new cryptographic systems at global scale, security professionals argue that the transition needs to begin well before quantum computers are visibly capable of breaking current schemes.
In other words, if you wait until the threat is obvious, you’re already too late for any data that has been intercepted and stored in the meantime.
What Regular Users Can Do Today
While the heavy lifting has to be done by protocol designers, app developers, and standards bodies, individual users and organizations are not powerless. They can:
– Favor messaging apps that are transparent about their cryptographic designs and long-term security plans
– Keep devices and apps updated, since newer versions are more likely to adopt quantum-safe or hybrid approaches sooner
– Limit the unnecessary long-term storage of highly sensitive chats, especially in cloud backups or unencrypted archives
– Monitor public communication from security-conscious organizations, academic researchers, and developers about quantum-resistant roadmaps
For organizations handling particularly sensitive or long-lived information, it may already be time to consult specialists about post-quantum migration strategies-not just for messaging, but for VPNs, internal services, and stored archives.
Beyond Messaging: The Whole Internet Has to Adapt
The threat to messaging apps is part of a much broader shift. The same public-key cryptography underpins:
– HTTPS connections securing websites
– Software updates and code-signing mechanisms
– Secure email and digital signatures
– Virtual private networks (VPNs) and corporate access controls
As quantum computing advances, each of these layers must eventually adopt quantum-resistant techniques. Messaging is simply one of the most visible and personally relevant fronts in a much larger security overhaul.
The Bottom Line
Quantum computing does not just pose a risk to Bitcoin wallets or blockchain signatures. It challenges the very cryptographic foundations that keep private conversations, sensitive documents, and critical infrastructure secure.
IBM’s work with developers from Signal and Threema signals a recognition that the messaging world cannot wait until quantum machines are fully realized before acting. The “harvest now, decrypt later” strategy means the clock is already ticking: adversaries can collect encrypted data today and patiently wait for tomorrow’s decryption tools.
Moving to quantum-safe messaging won’t happen overnight. It demands new algorithms, careful engineering, and a phased global transition. But the alternative-waking up one day to discover that years of “secure” communications are suddenly readable-is far worse.
