Blockchain And Quantum Computing Are on a Collision Course, Expert Warns (2024)

Insider Brief

  • Quantum computers could potentially break current blockchain encryption, risking billions in cryptocurrency assets, according to a quantum policy expert.
  • Quantum-resistant cryptography and quantum random-number generators are emerging as vital solutions to protect blockchain networks from quantum attacks.
  • Companies are already developing quantum-secure blockchain technologies to counter these future threats.

Cryptocurrencies are maturing.

Quantum computing is maturing.

Both crypto and quantum are earning attention from Presidential candidates and global policymakers, eager to tap into both the power of these new technologies, as well as the extensive communities of advocates.

Taken separately, practitioners of those fields may be excited about this developments. However, the two deep techs are on a collision course.

Quantum computing is poised to disrupt a wide range of industries, and the world of cryptocurrencies is no exception, points out Arthur Herman in a recent op-ed in the Korea Herald. Herman, Senior Fellow at the Hudson Institute and Director of the Quantum Alliance Initiative, writes that the same technology that could unlock immense computational power might also render existing cryptographic systems, including those that secure blockchain networks, vulnerable to attacks.

This alarming possibility, he argues, should be a wake-up call for the cryptocurrency industry and for anyone relying on blockchain technology.

Herman’s analysis highlights the inherent risks quantum computing poses to blockchain and cryptocurrencies. Currently, blockchain relies on Distributed Ledger Technology (DLT), a form of decentralized encryption that allows for secure, anonymous transactions.

“Cryptocurrencies prefer to use blockchain or DLT because it allows all parties to track, verify, and agree upon transactions, even as individual participants remain anonymous,” Herman explains in the piece.

While critics like to diminish cryptocurrency and blockchain as merely tools for speculation, other experts disagree seeing the technology that could empower entirely new economies and business models.

Chris Dixon, a General Partner at Andreessen Horowitz, who leads a16z crypto, which invests in web3 technologies, writes that blockchain has spawned two cultures: the computer and the casino.

Dixon writes: Two distinct cultures are interested in blockchains. The first sees blockchains as a way to build new networks. I call this culture the computer because, at its core, it’s about blockchains powering a new computing movement. The other culture is mainly interested in speculation and money-making. Those of this mindset see blockchains solely as a way to create new tokens for trading. I call this culture the casino because, at its core, it’s really just about gambling.”

Herman points out that large corporates are among the advocates in the computer culture camp.

“Microsoft, Walmart and JPMorgan are already starting to deploy their own private blockchain networks in which only partners, suppliers or customers are allowed to participate, while delivering thousands of transactions per second,” he writes.

However, as quantum computers become more advanced, the encryption methods that protect these transactions may become obsolete. Herman points out that traditional cryptographic methods, including the widely used Elliptic Curve Cryptography (ECC), could be easily cracked by quantum algorithms like Shor’s algorithm.

“In short, blockchains that use the same cryptographic building blocks as other forms of DLT will be just as much at risk to the quantum computer threat as other digital technologies,” Herman writes.

The potential fallout from such a scenario could be catastrophic. According to a study conducted by the Quantum Alliance Initiative, a successful quantum attack on Bitcoin alone could lead to a loss of at least $3 trillion, a blow that would send shockwaves through the global economy.

Herman warns, “The real danger regarding the future of blockchain is that it’s used to build critical digital infrastructures before this serious security vulnerability has been fully investigated. Imagine a major insurance company putting at great expense all its customers into a blockchain-based network, and then three years later having to rip it all out to install a quantum-secure network, in its place.”

Despite the bleak outlook, Herman offers a solution that lies within the very technology posing the threat. Quantum cryptography, particularly quantum random-number generators and quantum-resistant algorithms, could provide the necessary safeguards to protect blockchain networks from quantum attacks.

“Quantum random-number generators are already being implemented today by banks, governments, and private cloud carriers. Adding quantum keys to blockchain software, and to all encrypted data, will provide unhackable security against both a classical computer and a quantum computer,” he notes.

Moreover, the U.S. National Institute of Standards and Technology (NIST) has stepped in to address the issue by releasing standards for post-quantum cryptography. These quantum-resistant algorithms are designed to withstand attacks from quantum computers, making them a crucial component in the next generation of blockchain security.

“Just as asymmetric encryption uses difficult math problems to stump classical computers, post-quantum cryptography uses difficult math problems to stump a quantum computer,” Herman explains.

The transition to quantum-resistant blockchain systems has already begun. Herman cites the example of Quantum Resistant Ledger, a U.K.-based company led by Dr. Peter Waterland, which is working on developing DLT systems that can withstand quantum attacks. Efforts like this suggest a broader shift towards securing digital assets against the looming quantum threat.

Looking ahead, Herman suggests that a coordinated approach integrating crypto, blockchain and quantum technologies could inaugurate a new era in finance and digital security.

Blockchain And Quantum Computing Are on a Collision Course, Expert Warns (2024)

FAQs

Blockchain And Quantum Computing Are on a Collision Course, Expert Warns? ›

Quantum computers could potentially break current blockchain encryption, risking billions in cryptocurrency assets, according to a quantum policy expert. Quantum-resistant cryptography

Quantum-resistant cryptography
Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms (usually public-key algorithms) that are currently thought to be secure against a cryptanalytic attack by a quantum computer.
https://en.wikipedia.org › wiki › Post-quantum_cryptography
and quantum random-number generators are emerging as vital solutions to protect blockchain networks from quantum attacks.

Is quantum computing a risk to blockchain? ›

Estimates suggest that a quantum computer would need about 1 million qubits to break SHA-256 and around 1 billion qubits to perform a 51% attack on a blockchain network. Thus, consensus mechanisms remain secure in the foreseeable future.

What is the danger of quantum computing? ›

Planning for quantum computing risk

Quantum computers will be able to break common encryption methods at an alarming speed. Encryption tools currently used to protect everything from banking and retail transactions to business data, documents and digital signatures can be rendered ineffective – fast.

Is blockchain resistant to quantum computing? ›

The rise of quantum computers poses a world changing threat capable of breaking current blockchain systems, except for QRL, the first full-featured quantum-resistant blockchain protocol. A Quantum Resistant Ledger (QRL) exists to provide a solid basis on which next generation blockchain ecosystems can be built.

Why is quantum computing a threat to cryptography? ›

Threat actors can store encrypted information and decrypt it in the future when a sufficiently powerful quantum computer exists. Therefore, information with a medium or long lifespan (i.e. it will still require protection in 10 or more years) could be at risk of being decrypted by threat actors.

What happens to Bitcoin when quantum computing? ›

For example, they could decrypt the private key from a public key, enabling bad actors to control, and ultimately access, others' cryptocurrencies. This potential to break encryption and disrupt security is what makes quantum computing a potential threat to cryptocurrencies.

Can hackers use quantum computing? ›

Instead of hacking into systems one at a time, hackers could instead break into thousands (or hundreds of thousands) of systems simultaneously. That means traditional security methods are worthless against the might of a quantum computer.

What does Elon Musk think about quantum computing? ›

Elon Musk's proposed Quantum AI represents a significant leap forward in the realms of artificial intelligence (AI) and quantum computing. According to Smith and Johnson (2021), Musk envisions Quantum AI as a convergence of quantum computing's immense processing power with AI's problem-solving capabilities.

What is the biggest problem with quantum computing? ›

Cost and Accessibility. Currently, quantum computers are expensive and require very specialized environments to operate. Therefore, one of the big challenges for this technology is to make it accessible for widespread use.

What happens when AI meets quantum computing? ›

Quantum computing promises to exponentially speed up the processing capabilities necessary for AI to analyze vast datasets and make complex decisions, from drug discovery to climate modeling.

What can't quantum computing do? ›

For instance, contrary to some reports, quantum computers cannot store infinite data. While qubits can hold more information than binary bits because of their ability to exist in multiple states simultaneously, there is still a finite limit to the number of qubits and the data they can represent.

What do quantum blockchain do? ›

Quantum blockchain can be understood as a decentralized, encrypted and distributed database based on quantum computation and quantum information theory. Once the data is recorded in the quantum blockchain, it will not be maliciously tampered with.

Can quantum computer break ethereum? ›

Quantum threat to Ethereum. As described above, the security of Ethereum (and many other cryptocurrencies) is based on the one-way relation between the private key and the address. A quantum computer using Shor's algorithm is expected to break the one-way relation between the private and the public keys.

How fast can quantum computers break encryption? ›

Even if you had a quantum computer with millions of qubits (which we don't have yet), it would still take years or decades to crack 256 bit encryption.

What are quantum attacks? ›

A cybersecurity quantum attack refers to the risk that quantum computers may be used to attack traditional cryptographic schemes. It is assumed that quantum computers will solve encryption equations faster than standard computers.

How secure are quantum computers? ›

Most experts agreed in a poll that a quantum computer capable of breaking 2048-bit encryption is likely by the late 2030s. Ten to 15 years is not a long time. Many critical pieces of cybersecurity infrastructure in government and industry have remained unchanged for decades.

Is Ethereum vulnerable to quantum computing? ›

Ethereum explores hard fork and quantum-resistant cryptography to combat potential threats from quantum computers. Quantum computers can potentially crack Ethereum's security, enabling theft of user funds.

Could a quantum computer mine Bitcoin? ›

Quantum computers are super powerful and can tackle complex calculations, but using them for Bitcoin mining is a bit tricky. While they can crunch numbers insanely fast, Bitcoin's mining algorithm requires specific types of calculations that quantum computers aren't necessarily better at.

What cryptography is quantum safe? ›

Quantum-safe cryptography utilizes five different areas of math considered quantum-safe: multivariate-based, code-based, hash-based, supersingular isogeny-based, and lattice-based.

Which block is QRL quantum resistant? ›

QRL utilizes an extensible address format with quantum security built in from the genesis block.

Top Articles
How To Develop And Write An Asset Management Strategy
how to verify office 2021 without internet? - Microsoft Q&A
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Roderick King

Last Updated:

Views: 5914

Rating: 4 / 5 (71 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Roderick King

Birthday: 1997-10-09

Address: 3782 Madge Knoll, East Dudley, MA 63913

Phone: +2521695290067

Job: Customer Sales Coordinator

Hobby: Gunsmithing, Embroidery, Parkour, Kitesurfing, Rock climbing, Sand art, Beekeeping

Introduction: My name is Roderick King, I am a cute, splendid, excited, perfect, gentle, funny, vivacious person who loves writing and wants to share my knowledge and understanding with you.