FREE MEETING: KEY TRENDS AND RISKS IN NFT GAMES– REGISTER

droomdroom-logo-mobile droomdroom-logo-mobile-white
  • Bitcoin
  • Altcoin
  • Metaverse
  • NFTs
  • DAO
  • DeFi
  • Adoption
  • Regulation
  • bitcoinBitcoin(BTC)$23,015.00
  • ethereumEthereum(ETH)$1,600.83
  • tetherTether(USDT)$1.00
  • binancecoinBNB(BNB)$300.97
  • usd-coinUSD Coin(USDC)$1.00
  • rippleXRP(XRP)$0.378086
  • cardanoCardano(ADA)$0.363562
  • okbOKB(OKB)$49.80
  • matic-networkPolygon(MATIC)$1.26
  • dogecoinDogecoin(DOGE)$0.081135
DroomDroomDroomDroom
Aa
  • Bitcoin
  • Altcoin
  • Metaverse
  • NFTs
  • DAO
  • DeFi
  • Adoption
  • Regulation
Search
  • Bitcoin
  • Altcoin
  • Metaverse
  • NFTs
  • DAO
  • DeFi
  • Adoption
  • Regulation
Follow US
© Droomdroom. All Rights Reserved.
DroomDroom > Adoption > Is quantum computing a threat to bitcoin?
AdoptionBitcoin

Is quantum computing a threat to bitcoin?

Last updated: 2023/03/21 at 5:44 AM
By Ronak Shah Published November 6, 2022 March 21, 2023
Share
4 Min Read
SHARE
Is quantum computing a threat to bitcoin

 

The Bitcoin network’s strength is its strong encryption. But what if, in the future, computers come to a point where current cryptographic standards are no longer relevant?

The bits in conventional computers alternate between 0 and 1, but quantum computers utilize qubits, which can exist simultaneously in both states. Since they can calculate and consider several configurations at the same time, these computers are millions of times faster than the fastest supercomputers available today.

With this scale of processing capacity, bad actors might utilize quantum computing to target protocols such as Bitcoin in an attempt to steal money from the millions of cryptocurrency users who currently make online transactions.

Such individuals might conceivably use powerful quantum computers to attack weak wallet addresses or even target transactions as they are processed on the blockchain, employing diverse strategies such as transit attacks or storage assaults.

Theoretically, such entities may use powerful quantum computers to launch attacks on weak wallet addresses or even target transactions while they are being processed on the blockchain, employing diverse strategies such as transit attacks or storage assaults.

Storage attacks tend to be more plausible since they depend on how securely tokens are kept by various users, whereas transit attacks are outside the capability of the bulk of the quantum computers now in use.

That is both the promise and the threat of quantum computing, a technology that allows computers to use quantum physics laws to speed up computations and analyze enormous amounts of data at rates that today’s computers just cannot achieve.

Blockchain technology encryption is based on the interaction between the public and private keys, known as asymmetric cryptography. The problem for hackers today is that the private key is between 1 and 2256, or 115-quarters of a billion, and it is said to be greater than the universe’s entire amount of atoms.

The level of number crunching required by those calculations is beyond the capabilities of today’s computers unless you have several hundred years at your disposal.

Mark Webber of the University of Sussex in the UK has estimated that 1.9 billion qubits of quantum computing power would be required to break the level of blockchain encryption. The number is surprisingly high, especially because IBM’s best quantum computer has only 127 qubits.

Current borderless transaction systems like Bitcoin and other blockchain protocols are not particularly sensitive to quantum computing attacks. It is because the processing capacity of quantum computers has not gone beyond 100 qubits, substantially limiting the possibility of an assault on a system as huge and secure as Bitcoin.

Nonetheless, considering how swiftly technology is evolving, quantum computers with more than a million qubits are expected to become a reality within the next ten years.

Although quantum computers do not yet possess the level of processing power necessary to pose a threat to existing protocols like Bitcoin, there are several projects now ongoing that aim to alter or adopt new designs that would make them even more secure.

Moreover, since developers and company owners compete to be the most inventive, blockchain technology itself is continually evolving. Many organizations are exploring alternate cryptographic algorithms to protect future iterations of Bitcoin and other protocols, recognizing the need for stronger and more attack-proof solutions.

You Might Also Like

An Easy Guide to Crypto On and Off-Ramps

What Are the Top 3 Blockchain Myths?

All There is to Know About Account Abstraction: Ethereum’s ERC-4337 Standard

Next Big Thing in Crypto: All you need to Know About Move-to-Earn (M2E)

What Is Decentralized Storage and Why Is It Important?

Share
Previous Article profitable crypto A quick guide to identifying a profitable crypto coin
Next Article Ultimate Guide Ultimate Guide to Become a Master of the Metaverse
- Advertisement -
Token 2049 Singapore
Discount LinkToken 2049 Singapore
Discount Link

Follow US

Find US on Socials
Facebook Like
Twitter Follow
Instagram Follow
Explore
Cryptocurrency Wallets
Cryptocurrency Wallets: Explained
Hot Wallets
Top Non-custodial Hot Wallets
4 Ways to Identify Crypto Ponzi Schemes
4 Ways to Identify Crypto Ponzi Schemes
Top 5 Crypto Job Boards to Get Hired Instantly
Top 5 Crypto Job Boards to Get Hired Instantly

Subscribe to our newslettern

Get Newest Articles Instantly!

Explore More

a hyper-realistic painting of dollar sign next to a bitcoin
Adoption

An Easy Guide to Crypto On and Off-Ramps

March 20, 2023
A hyper-realistic painting of a portrait of a person with a thought bubble thinking about blockchain
Adoption

What Are the Top 3 Blockchain Myths?

March 9, 2023
Alt Description: An image with a standout Ethereum logo and several other connected ethereum logos on a blue background describing account abstractions.
Adoption

All There is to Know About Account Abstraction: Ethereum’s ERC-4337 Standard

March 9, 2023
An image describing how the move-to-earn ecosystem works; It shows a person in motion staring at their mobile device in the background is a larger mobile device with five different huge dollar signs.
Adoption

Next Big Thing in Crypto: All you need to Know About Move-to-Earn (M2E)

March 9, 2023

Follow Us on Socials

We use social media to react to breaking news, update supporters and share information.

Twitter Facebook Youtube Telegram Linkedin Instagram Rss
Droomdroom Logo Droomdroom Logo

DroomDroom dedicates thousands of hours of research into the web3 industry to deliver you free, world-class, and accurate content.

Company

  • About Us
  • Contact Us
  • Partner
  • Careers
  • Privacy Policy
  • Terms of Service

Subscribe to our newsletter

Get Newest Articles Instantly!

- Advertisement -
Token 2049 Singapore Discount LinkToken 2049 Singapore Discount Link

Copyright © 2023 DroomDroom. All Rights Reserved

  • Bitcoin
  • Altcoin
  • Metaverse
  • NFTs
  • DAO
  • DeFi
  • Adoption
  • Regulation
Welcome Back!

Sign in to your account

Lost your password?