What is “Quantum Supremacy” and why it sounds scary
“Quantum Tepremacy” indicates a point in which quantum computers surpass classic computers in certain tasks. This sounds abstract, but the potential results are very realistic. Especially for encryption. Bilateral Shore Theoretically, you can break the RSA and elliptical curve encryption (ECC), the backbone of Internet security. Grover’s algorithm It can also weaken symmetrical encryption by reducing indiscriminate evacuation resistance.
Because cryptocurrencies, such as Bitcoin and Ethereum, rely on ECCs (eg:: ECDSA In the case of digital signatures), they often get disconnection as a vulnerable goal in media reports (e.g. Wired’s reference Quantum apocalypse is approaching. Very afraid). But fear expands beyond the blockchain. If a competent quantum computer exists today, it will not just destroy the wallet, but also damage the bank, military network and state secrets.
There is another serious vector known as “HANGEST NOW, DECRYPT” (HNDL). Today’s majority have encrypted data such as individuals, governments, or corporate information. This is not considered a leak because it cannot be read now… In other words, the huge amount of data that looks safe today can suddenly be exposed. No ~ It was hacked in the future, but it was stolen and patiently stored until the decryption of quantum password was realized. Hacking for time based on technical expectations becomes a reality.
In other words, quantum computing is a threat to the entire Internet as well as Bitcoin.
Where threats are actually standing
Despite the headline that “Quantum is coming,” the actual machine is not close to what is needed to threaten the encryption system.
Today’s quantum computers have a cube that can cause 1,500 errors. Breaking things like Bitcoin’s ECDSA requires millions of stable defects. Recent analysis By encryption writer Microsoft Research.
Experts like Peter Wuille Daniel J. Bernstein Consent: The quantum risk is long -term and theoretical. Progress will be gradual with many signs and warnings before the existence comes out.
Meanwhile, the solution space is rapidly developing. 2024, Nist We finished the first quarter encryption (PQC) standard. FIPS 203–205 It deals with grid and hash -based systems. Global agencies and academic communities are already building software libraries and tools for migration after quests.
How the main protocol responds
The encryption world does not wait passively. The main protocol is already hardening to prepare for quantum threats or upgrade paths.
- Bitcoin uses a hash public key by default (P2pkh) The public key is not disclosed until the coin is consumed. This attacks at the mempool stage ~ 10 minutes offers Quantum Adversaries. This is an impossible period for predictable machines. Here is a big application in recent years. HD-Wallet, Silence Payment, Main Consolidation and Critical Values Signs after Quarter In Bitcoin.
- Ether Lee is moving greatly Zero knowledge evidenceIn addition to improving privacy and scalability, you can also adapt to encryption after quota. Projects such as Zksync, Polygon Zkevm and Scroll are already experimenting with quantum -friendly Snark systems.
- Vault12 Crypto inheritance Shamir’s secret sharingIt is already a quantum resistance depending on the design. It does not depend on acquisition, elliptical curve or numeric theoretical assumptions. Instead, use information theory security. Without sufficient stocks, classic or quantum power cannot recover its original secret.
This protocol includes the most important encryption infrastructure for payment, smart contracts and long -term value protection. And all three On track Maintain safety in the quarter world.
The reason why Shamir Secret sharing does not care about quantum computers
SHAMIR’s Secret Sharing (SSS) must divide the private key into several parts to reconstruct the threshold. For example, the user can divide the secret into 5 weeks and restore three.
The main strength of SSS is in information theory security. Less than critical prices, the remaining stocks are proposed zero Information about the secret -ruthless force, mathematics tricks and quantum algorithms can infer key. As documented by Academic Cryptography, this is entirely beyond the attack range of SHOR or Grover’s algorithm.
This is a rare example of the actual product of Vault12’s inheritance of Crypto. Already safe About future quantum threats. Do not wait for standards, patches or forks. Do not adapt-already built on the quantum immunodeficiency.
If more protocols adopt information theory guarantees such as Shamir, the emergency of the “quantum threat” will drop significantly.
Panican is an option. Preparation is real
The quantum advantage is an attractive and long -term challenge. But that’s not the reason to be embarrassed. The encryption world (academic, government and decentralization) is actively prepared.
Bitcoin, Etherrium and encryption inheritance of Vault12 indicates a clear effort on quantum regeneration. Bitcoin is moving toward quarter safety through stealth wallets, major and threshold signatures. Ether Liium explores ZKP and quantum compatible Premium. Vault12 provides default solutions using unbroken secret sharing.
When Quantum Future arrives, these protocols are prepared. Some of the same, such as inheritance of encryption.