Bitcoin will have little time to swallow anti-rich western kryptonite

5 Min Read
5 Min Read

Pierre-Luc, a researcher and quantum computer specialist, “Little Five -YEAR -ELD WINDOW” To prevent this technology from being used to undermine the security of the encryption system.

“Added to the combined improvements in error correction codes and algorithms, leaving only a small window to update digital infrastructure to Post-Sauryu Round Critegraphy,” an analyst who is also CEO and co-founder of Pauli Group, dedicated to the development of Post-Post encryption, said on June 17.

This statement, in his opinion, emphasizes the urgency to adapt current technology so that quantum computers cannot disable existing encryption systems. Among them, Bitcoin.

Pierre-Luc doesn’t specifically mention Bitcoin, but his reference to the “digital infrastructure” update implicitly includes the protocol created by Nakamoto Sato.

How does Bitcoin affect researchers’ estimates?

Bitcoin as a decentralized system uses encryption based on the ECDSA algorithm (digital signature signature of elliptic curves). This protects the private key that guarantees the user fund properties, and the mining industry is fixed by the SHA-256 algorithm. Once a quantum computer has reached the ability to perform sufficiently strong cryptographic analysis, it can derive a private key from the public. Break the safety of saved funds With a vulnerable address.

The following graph, presented by Pierre-Luc, titled “Resources Required for Quantum Algorithms Useful Compared to Hardware Features,” provides a vision of projected evolution in the field of quantum computing.

The vertical axis represents the amount of logical qubits in quantum information units that have been corrected from errors essential to running the algorithm, while the horizontal axis measures the time over several years.

See also  Metamask allows you to use sunlight (Sun)

Furthermore, two curves show opposite trends in the image: ascending red curves show Growth of quantum hardware functions,Although it increases over time thanks to qubit construction and improved error correction, the blue curve that descends is Reduced resources required If Quantum Algorithms is optimized.

The intersection labeled “the beginning of the quantum age” indicates the moment when these lines converge, suggesting that for the near future. The hardware reaches the level necessary to withstand useful algorithmswhich can include quantum cryptography analysis, which researchers consider to be a possible threat within five years.

Therefore, the convergence of the hardware, correction code, and improvements in quantum algorithms established by Pierre-Luc suggests that gaps can be closed in the next decade, marking the beginning of an era in which quantum cryptography analysis can be feasible.

At this point, despite certain advances in quantum computing, such as IBM, IONQ companies and Oxford University groups, some analysts agree that there is a risk of Bitcoin crypto. It’s still far Others consider it closer.

For example, Oxford Quantum Circuits (OQC) predicts that by 2034 it will reach 50,000 logical qubits. This corresponds to about 5 million physical qubits under the optimistic conversion of 100 physical qubits by logical qubits.

However, these levels are It’s under 13 million Cubit Physical It is estimated that the University of Sussex is necessary to compromise on a private Bitcoin key in one day, and is further estimated from what BlockStream co-founder Adam Back proposed.

It was established back One or Decades of Therefore, Quantum represents a specific danger of BTC.

See also  Solana Dreams Filling your performance failures with more capacity

However, the estimates of Charles Edwards, founder of Capriole, a 2,500 logical qubit financial company, are more closely matched with IBM’s objectives within four years.

Bitcoin Community’s proposal to prevent rebuttal

While it is difficult to determine whether Bitcoin has an effective anti-charter shield for the next five years (times indicated by Pierre-Luc), concerns drive the Bitcoiner ecosystem and its developers. I propose mitigation measures.

In it, as reported by Cryptonoticias, at the beginning of June, they proposed to integrate signature types into Taproot addresses to protect Bitcoin from quantum attacks.

Recommended by a Chilean developer in April Required transition period Meanwhile, users will need to transfer funds from traditional ECDSA addresses to new quantum tolerance addresses. This replaces the ECDSA algorithm of algorithms that are said to be resistant to quantum attacks such as reticles and hash companies.

In mid-March, BitConnor software engineer Jameson Rop raised the initiative Cancel BTC fund without owner To avoid Quantum’s invitation, “it’s better to burn Bitcoin, which is vulnerable to Quantum.”

Finally, in December 2024, Bitcoin Libre CEO Ben Sigman advocated a proposal to improve Bitcoin 360 (BIP-360). Bitcoin resistance is strengthened Facing advances in quantum computing.

TAGGED:
Share This Article
Leave a comment