In light of the rapid evolution of quantum computing, it has become much more than just a subject for academic curiosity—it has begun to pose a serious threat to the cryptographic systems that secure digital currencies such as Bitcoin, which have long been a secure cryptographic system.
According to experts, powerful quantum machines will probably be able to break the elliptic curve cryptography (ECC), which underpins Bitcoin’s security, within the next one to two decades, putting billions of dollars worth of digital assets at risk.
Despite some debate regarding the exact timing, there is speculation that quantum computers with the capabilities to render Bitcoin obsolete could be available by 2030, depending on the advancement of quantum computing in terms of qubit stability, error correction, and other aspects.
Despite some debate regarding the exact timing, there is speculation that quantum computers with the capabilities to render Bitcoin obsolete could be available by 2030, depending on the advancement of quantum computing in terms of qubit stability, error correction, and other aspects.
Cryptographic algorithms are used to secure transactions and wallet addresses in Bitcoin, such as SHA-256 and ECDSA (Elliptic Curve Digital Signature Algorithm).
It can be argued that quantum algorithms, such as Shor’s, might allow the removal of these barriers by cracking private keys from public addresses in a fraction of the time it would take classical computers.
It can be argued that quantum algorithms, such as Shor’s, might allow the removal of these barriers by cracking private keys from public addresses in a fraction of the time it would take classical computers.
Although Bitcoin has not yet been compromised, the crypto community is already discussing possible post-quantum cryptographic solutions. There is no doubt that quantum computing is on
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
Read the original article: