The resurgence of quantum threat theory: Has the foundation of cryptocurrency been shaken?

CN
6 hours ago

Original | Odaily Planet Daily (@OdailyChina)

Author | Azuma (@azumaeth)_

Recently, the threat of quantum computing to cryptocurrencies has once again become a hot topic of discussion online. The renewed interest in this issue is due to several key figures in the quantum computing and cryptocurrency industries making new predictions about the development of quantum computing and its potential capabilities.

First, on November 13, Scott Aaronson, a leading figure in the field of quantum computing and director of the Quantum Information Center at the University of Texas, mentioned in an article: “I now believe that before the next U.S. presidential election, we may have a fault-tolerant quantum computer capable of running Shor's algorithm…

Following that, on November 19, Ethereum co-founder Vitalik Buterin also spoke at the Devconnect conference in Buenos Aires, stating that elliptic curve cryptography (ECC) may be broken by quantum computing before the 2028 U.S. presidential election, urging Ethereum to upgrade to quantum-resistant algorithms within four years.

What is the quantum threat?

Before interpreting Scott and Vitalik's predictions, we need to briefly explain what is meant by "quantum threat."

In short, the quantum threat to cryptocurrencies refers to the possibility that sufficiently powerful quantum computers in the future may break the cryptographic foundations that currently secure cryptocurrencies, potentially destroying their security models.

Currently, the security of almost all cryptocurrencies (such as Bitcoin and Ethereum) relies on a technology called "asymmetric encryption," which consists of two key components: "private key" and "public key":

  • Private Key: Kept secret by the user, used to sign transactions and prove ownership of assets;
  • Public Key: Generated from the private key, can be made public, used as a wallet address or part of an address.

The cornerstone of cryptocurrency security is that — currently, it is computationally infeasible to derive the private key from the public key. However, quantum computing could leverage principles of quantum mechanics to significantly accelerate the process of solving certain mathematical problems by running specific algorithms (such as the aforementioned Shor's algorithm), which is precisely the weakness of asymmetric encryption.

To further explain what Shor's algorithm is, without delving too deeply into mathematics, the essence of Shor's algorithm is that it can transform a mathematical problem that is "almost unsolvable" on a classical computer into a "relatively easy to solve" periodicity search problem on a quantum computer, thereby potentially threatening the existing "private key - public key" cryptographic system of cryptocurrencies.

For a more relatable example, you can think of a basket of strawberries (representing the private key) that can easily be turned into jam (analogous to the public key), and while it is clearly impossible to reverse jam back into strawberries, a suddenly powerful entity (analogous to quantum computing) might achieve this through a convenient method (analogous to Shor's algorithm).

Is the foundation of cryptocurrency shaken?

If that's the case, doesn't it mean cryptocurrencies are doomed?

Don't panic, the quantum threat objectively exists, but the situation is not as urgent as it seems. The reasons for this are twofold. First, there is still time before the real threat arrives; second, cryptocurrencies can upgrade to implement quantum-resistant algorithms.

First, even if Scott's prediction comes true before the 2028 election, it does not mean that it will genuinely threaten the security of cryptocurrencies; Vitalik's statement does not imply that the foundations of Bitcoin and Ethereum will be shaken, but merely points out a theoretical risk that exists in the long term.

Haseeb, managing partner at Dragonfly, explained that there is no need to panic about the new timeline for quantum computing, running Shor's algorithm does not equate to breaking a real 256-bit elliptic curve key (ECC key). You can use Shor's algorithm to break one number — which is impressive enough — but to factor a number with hundreds of digits requires a much larger scale of computation and engineering capability… This matter deserves serious attention, but it is by no means imminent.

Cryptocurrency security expert MASTR provided a clearer mathematical answer, stating that breaking the elliptic curve signatures (ECDSA) currently used by Bitcoin, Ethereum, and other cryptocurrencies would require about 2300 logical qubits, 10¹² to 10¹³ quantum operations, and after error correction, it would need millions to billions of physical qubits; however, the currently realized quantum computing only has 100 – 400 noisy qubits, with a high error rate and short coherence time — the gap to meet the requirements for breaking the former is still at least four orders of magnitude.

As for the second point, cryptographers in the industry are also developing new post-quantum cryptography (PQC) algorithms that can resist quantum computing attacks, and mainstream blockchains are already preparing for this.

As early as last March, Vitalik wrote an article titled “If Quantum Attacks Come Tomorrow, How Will Ethereum Solve It?,” in which he mentioned the effectiveness of Winternitz signatures, STARKs, and other defenses against quantum threats, and even envisioned how Ethereum could urgently upgrade in the event of an emergency.

Compared to Ethereum, Bitcoin may not be as flexible in executing upgrades, but the community has already proposed various potential algorithm upgrade solutions such as Dilithium, Falcon, and SPHINCS+. Recently, with the rise in related discussions, Bitcoin OG Adam Back also stated that the cryptographic standards for the post-quantum era could be implemented long before a substantial quantum computing threat emerges.

In summary, the quantum threat is like a "master key" hanging in the distance, theoretically capable of unlocking all current blockchain cryptographic locks, but the lock makers have already begun researching new locks that this master key cannot open, and are preparing to replace all the doors with new locks before the master key is completed.

This is the current objective reality regarding the quantum threat; we cannot ignore its progress, but there is no need to panic blindly because of it.

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

Share To
APP

X

Telegram

Facebook

Reddit

CopyLink