The quantum computing threat with regard to cryptocurrency seems far away, but networks like Kaspa are already beginning to design defenses. Developer Gaurav Rana has created suggestions for Kaspa (KIP) improvements he is looking for Violates current digital signature system.
The document that was published last May and is still under discussion is proposed. Wallet tier update,Introduction in a direction called «p2pkh-blake2b-256-via-p2sh».
These acronyms mean that the network uses the 256-bit Blake2B encryption function to use an address of type “Pay a Script Hash” (P2SH) with the “Pay a Script Hash” (P2PKH).
These addresses are allowed as explained in the repository «Hide public key Reduce the risk of quantum enemies extracting personal keys from exposed public keys after a commitment to encryption until the moment of spending».
KIP’s central motivation starts with concern. Quantum computers running the Shor algorithm will be able to solve the conservative logarithmic problem of elliptic curves (ECDLP).
this It will break security The Schnoller company currently protects Kaspa’s transactions, as the developer details.
The current form of administration known as P2PK (Paying a Public Key) exposes the public key when creating a transaction.
This initiative shows that this represents a high risk under quantum scenarios. In contrast, the proposed address (P2PKH-BLAKE2B-VIA-P2SH) They differ in public key exposure until the time of spendinguses cryptographic hash as a protection measure.
It is to ensure that “it is not revealed until the public key is used”, and thanks to the hash Blake2B-256 function, the address is They have been protected since their creation.
Seal Dress Consensus
KIP emphasizes that this change does not require a change to the network (power supply) of the network. Read the document saying “All node software is as is.” Additionally, “mining and validation infrastructure continues to use existing P2SH management.”
This means you can perform the migration No hard branching or changes to the protocolusers, wallets, voluntarily by exchange.
Implementation Strategy
The plan is split In three phases. First, we introduce new addresses in the wallet layer. These addresses are generated by default and are also displayed in user interface messages describing quantum protection.
The second stage calls for exchanges and integration with managers. This should include shipping and spending support from the new address.
Finally, the third phase will result in a gradual disuse of P2PK addresses and warnings to users who are still using them. The proposed temporary horizon is 1-3 months to complete this initial transition.
Economic impact of measures considered minimal. The document shows overload of size of script It’s a small amount, and the benefits of long-term protections are widespread over the cost.
Short Benefits and Long-Term of Caspa
The proposal concludes that immediate benefits include “mitigating quantum attacks on new addresses” and enhancing user trust by receiving an aggressive security position.
In the long term, this transition will strengthen the maturity of the Kaspa ecosystem and position it as a competitive network against chains that do not take precautions against quantum risk.