Quantum risk to the Ethereum blockchain - a bump in the road or a brick wall? | Deloitte Netherlands (2024)

Quantum threat to Ethereum

As described above, the security of Ethereum (and many other cryptocurrencies) is based on the one-way relation between the private key and the address. A quantum computer using Shor’s algorithm is expected to break the one-way relation between the private and the public keys. This is the first step in Figure 1, The relation between the public key and the address is only partially impacted3. This means that a quantum computer can only derive the private key associated with a specific address if the public key is already known. This is only the case if the address has been used before to send funds.

We define quantum-exposed funds as coins residing in addresses where the public key is already published in the blockchain (through a transaction). Funds in addresses where the public key is not known (if funds have never been transferred out of the address) are not exposed, and are safe against currently known quantum attacks.

The unique way cryptography is used in cryptocurrencies (public keys are not always public) results in two distinct types of attacks: the storage attack and the transit attack.

Storage attack
In this attack, a malicious actor will search for funds that are stored in quantum-exposed addresses. They will then use a quantum computer to derive the private key associated with the vulnerable address, which will allow them to transfer the funds to a new address that is not vulnerable to a quantum attack.

Finding quantum-exposed funds is particularly easy in the Ethereum blockchain. Each node in the network keeps a balance sheet, called the world state, with all addresses that have ever been used and a counter that shows how many times they were used to transfer funds from. An attacker can simply look for all addresses in the world state where the counter is larger than 0. From the resulting list, the attacker picks a target address with plenty of funds. Next, they scan the blockchain for a transaction sent by this specific address and use it to obtain the corresponding public key. As explained before, after having obtained the public key, the attacker can now use a quantum computer to derive the private key and steal the funds from the targeted address.

We performed an analysis on the Ethereum blockchain to find out how many coins would be vulnerable to this type of attack. For the purpose of this analysis, we are focusing solely on Ethereum’s native token, Ether, and ignore other third party tokens implemented on Ethereum. Despite being ignored in this analysis, tokens implemented using the ERC20 standard that are stored in quantum-exposed addresses, would also be vulnerable to the storage attack.

In Figure 2 we see the result of the analysis, showing the total number of Ether in circulation over time, distinguishing between those in quantum-exposed addresses and those in non quantum-exposed addresses. From the data, it is clear that currently over 65% of all Ether are vulnerable to a quantum attack, and this number has been continuously increasing. This is a significantly larger percentage than the 25% we found for the Bitcoin blockchain in a previous analysis1.

The difference between Ethereum and Bitcoin is primarily caused by the fact that the Bitcoin architecture is based on generating a new address for each transaction (known as the “UTXO model”). Ethereum’s architecture is based on reusing the same address unless forced to do otherwise (known as the “account model”). The account model was intentionally chosen for Ethereum in order to facilitate the implementation and usage of smart contracts. However, it causes the funds within the network to, on average, be more vulnerable to quantum attacks.

Quantum risk to the Ethereum blockchain - a bump in the road or a brick wall? | Deloitte Netherlands (2024)

FAQs

What is the quantum threat to the blockchain? ›

Disrupting Cryptographic Randomness

Quantum computing poses a risk to this aspect by potentially predicting or influencing the pseudo-randomly generated numbers crucial for cryptographic operations, thereby undermining a foundational element of blockchain security.

Is Ethereum vulnerable to quantum computing? ›

Ethereum's Quantum Fix

Traditional Ethereum accounts rely on cryptographic keys that are vulnerable to decryption by quantum computers. However, the proposed hard fork offers a potential lifeline.

What are the biggest risks to Ethereum? ›

These include:
  • Lido is a threat to Ethereum security.
  • Ethereum's crowd sale is harmful to the current proof-of-stake system.
  • Ethereum is too complex.
  • Ethereum's high fees will drive users away.
  • Ethereum is only used for financial speculation.

Can blockchain be hacked by quantum computing? ›

Even if quantum computers will be able to break current blockchain encryption methods, this could take 10-20 years, giving blockchain cryptographers a strong head start in order to develop new and more powerful encryption methods.

Will blockchain be replaced by quantum computing? ›

Quantum computing, with its ability to process data at the speed of light, could help solve this problem by making the blockchain faster without sacrificing security. AI could use the secure environment of the blockchain to operate, with quantum computing speeding up both processes.

Can quantum break crypto? ›

This will happen even if quantum computers do not get to the level of decrypting the current standards. Cryptocurrencies including Bitcoin are not quantum resistant. They also rely on cryptographic algorithms that are vulnerable to quantum computing attacks.

Which crypto is quantum safe? ›

The Quantum Resistant Ledger (QRL) was developed to be resistant to classical and quantum computing attacks from the beginning. They bet on a future early, where quantum computers will exist that will break encryption. It uses XMSS, a hash-based digital signature scheme.

Is Ethereum future proof? ›

Given Ethereum's history of implementing the changes proposed in the Ethereum roadmap, it is safe to say that the network will strive to achieve its goals of cheaper transactions, extra security, better user experience, and future-proofing.

What are the dangers of quantum computing? ›

Quantum computers will be able to break common encryption methods at an alarming speed. Encryption tools currently used to protect everything from banking and retail transactions to business data, documents and digital signatures can be rendered ineffective – fast.

How is Ethereum bad for the environment? ›

Yes, Ethereum uses energy. It is a blockchain, a distributed ledger secured by cryptography, which requires energy to run and use.

Is Ethereum riskier than Bitcoin? ›

Buying either crypto requires a high risk tolerance. Looking at past performance, it's difficult to choose a winner between Bitcoin and Ether because their relative returns fluctuate depending on the time frame. In the past year, Bitcoin prices are up 157% compared to a 100% gain for Ether.

Why would Ethereum crash? ›

Ethereum's downturn is primarily driven by fears of a Bitcoin market dump and declining institutional interest.

What is quantum threat? ›

Q-Day is when a quantum computer so powerful is built, it could break the public encryption systems that protect our online conversations, bank accounts, and most vital infrastructure, wreaking havoc on governments and businesses. How this digital doomsday would happen comes down to simple maths.

What is the quantum risk of Bitcoin? ›

The Bitcoin blockchain uses powerful cryptography to ensure its decentralized money transfer model remains trustless, private and secure during peer-to-peer transactions. However, quantum computers may attack it by deploying machines and algorithms powerful enough to break its cryptographic shields.

What is the quantum blockchain? ›

Quantum blockchain can be understood as a decentralized, encrypted and distributed database based on quantum computation and quantum information theory. Once the data is recorded in the quantum blockchain, it will not be maliciously tampered with.

Why is blockchain a threat? ›

Blockchains rely on real-time, large data transfers. Hackers can intercept data as it's transferring to internet service providers. In a routing attack, blockchain participants typically can't see the threat, so everything looks normal.

Top Articles
New Minimum Capital Requirement For Nigerian Insurance Companies: What You Should Know - Reinsurance - Insurance
How to protect yourself from malpractice
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Pearson Correlation Coefficient
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Gregorio Kreiger

Last Updated:

Views: 6033

Rating: 4.7 / 5 (77 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Gregorio Kreiger

Birthday: 1994-12-18

Address: 89212 Tracey Ramp, Sunside, MT 08453-0951

Phone: +9014805370218

Job: Customer Designer

Hobby: Mountain biking, Orienteering, Hiking, Sewing, Backpacking, Mushroom hunting, Backpacking

Introduction: My name is Gregorio Kreiger, I am a tender, brainy, enthusiastic, combative, agreeable, gentle, gentle person who loves writing and wants to share my knowledge and understanding with you.