- CROX ROAD
- Posts
- Will Quantum Computers Disrupt Cryptocurrencies?
Will Quantum Computers Disrupt Cryptocurrencies?
Regular computers are no match for the strength and speed of quantum computers, which can answer the most difficult equations in a fraction of the time.
Introduction

Regular computers are no match for the strength and speed of quantum computers, which can answer the most difficult equations in a fraction of the time. According to the estimations of some industry specialists, it would just take a few short minutes for them to break an encryption that would take the world's most powerful computers thousands of years to decipher. Because of this, a significant portion of the digital security infrastructure that exists today may be at risk, and this includes the encryption that underpins Bitcoin and other cryptocurrencies.
This article will provide an overview of how quantum computers vary from traditional computers, as well as the dangers they pose to digital infrastructure and cryptocurrency markets.
Asymmetric cryptography and Internet security
Asymmetric cryptography, often known as public-key cryptography, is an essential part of the ecosystem around cryptocurrencies and a significant portion of the Internet's underlying infrastructure. Encryption and decryption of information are accomplished via a key pair, which consists of a public key for encryption and a private key for decryption. In contrast, symmetric key cryptography requires just one key to both encrypt and decode data. Symmetric key cryptography is more secure.
A public key may be widely distributed and used to encrypt information, but the information can only be decrypted by the private key that corresponds to the public key. This makes it so that only the person who is supposed to see the encrypted information can see it.
A significant benefit of asymmetric cryptography is that it enables information to be sent across an untrusted channel without the requirement for the parties involved to first agree upon and then share a shared key. On the Internet, ensuring even the most fundamental level of data confidentiality would have been impossible without this essential capability. For example, it is impossible to imagine online banking without the capability to securely encrypt information that is being sent between parties who are not normally trusted.
Check out the article "Symmetric Encryption vs. Asymmetric Encryption" if you're interested in learning more about this topic.
Some of the security of asymmetric cryptography rests on the premise that the method of creating the key pair makes it exceedingly difficult to calculate the private key from the public key, while it is trivial to compute the public key from the private key. Because it is simple to compute in one direction but difficult to calculate in the other, this kind of function is referred to as a trapdoor function in mathematics.
At the moment, the vast majority of contemporary algorithms utilized to produce the key pair are based on well-established mathematical trapdoor functions. It is unknown whether these trapdoor functions can be solved in a timescale that would be realistic for any machine currently in existence. Even the most sophisticated computers would need significant time to complete these calculations.
Nevertheless, this might soon change as a result of the development of new types of computing systems known as quantum computers. First, let's look at traditional computers' operation so we may see why quantum computers are so much more powerful.
Classical computers
Classical computers are another name for the kinds of computers that are used nowadays. This indicates that computations are done in a sequential manner—a computing job is accomplished, and then another one may be begun. This is because the memory of a classical computer is constrained by the rules of physics and can only be in one of two states: either 0 or 1. (off or on).
Many different hardware and software approaches may be used to enable computers to partition complicated calculations into more manageable portions to improve their overall efficiency. Nevertheless, the fundamentals have not changed. Before moving on to the next computational endeavor, the previous one has to be finished first.
Consider the following scenario, in which a computer is tasked with attempting to guess a 4-bit key: Each of the four bits has the potential to be either a 0 or a 1, respectively. Sixteen different permutations might occur.
In order to solve a problem, a traditional computer would have to try each possible combination in turn, one after the other. Imagine that you have a keychain with a lock and 16 keys on it. It is necessary to test every one of the 16 keys on their own. If the first one doesn't work, you may try the next one, then the next one, and so on until you find the one that does. This continues until you find the key that works.
The number of feasible combinations, on the other hand, increases at an exponential rate in proportion to the key length. In the preceding example, if we added one more bit to bring the total number of bits in the key to 5, we would end up with 32 different potential combinations. Bringing it up to 6 bits would bring the total number of viable possibilities to 64. When using 256 bits, the number of potential combinations approaches the number of atoms that are thought to exist in the observable universe.
In contrast, the speed at which computers process data can only increase linearly. The number of guesses that may be made in a given amount of time is only increased by a factor of two whenever the processing speed of a computer is increased by a factor of two. On the side of guessing, exponential growth is much faster than linear growth by a large amount.
It is projected that it would take millennia for a traditional computer machine to guess a key that is 55 bits in length successfully. As a point of comparison, the recommended minimum size for a seed used in Bitcoin is 128 bits, but many wallets use 256 bits instead.
Asymmetric encryption, which is used by cryptocurrencies and is the backbone of the internet, seems to be safe from traditional computing.
Quantum computers

Quantum computers are still in the very early phases of development, but once they are perfected, it will be a piece of cake to resolve the aforementioned categories of issues with them. The theory of quantum mechanics, which looks at how subatomic particles behave, is the basis for quantum computers because it tells us how they should work.
In traditional computers, the information is represented by something called a bit, and each bit may be in one of two states: either 0 or 1. Quantum computers function on quantum bits, also known as qubits. A quantum computer's fundamental unit of information is referred to as a qubit. Just like a bit, a qubit may have a state of 0 or 1. But because of the strange way that quantum mechanics works, the state of a qubit can also be both zero and one at the same time.
Because of this, research and development in quantum computing have been given a boost, and both public and private institutions of higher learning and commercial businesses have begun spending their time and resources researching this fascinating new sector. Trying to solve the theoretical and practical engineering problems that this field brings up is at the forefront of human progress in the field of technology.
One of the unintended effects of these quantum computers would be that the algorithms that are the basis of asymmetric cryptography would become very easy to break. This would make the systems that use them much less reliable.
Take the previous example of breaking the 4-bit key as an example once again. In theory, a computer with four qubits would be able to do a single computing job involving all sixteen states (combinations) at the same time. In the amount of time it would take to carry out this calculation, the likelihood of successfully locating the proper key would be one hundred percent.
Quantum-resistant cryptography
The advent of quantum computing technology has the potential to damage encryption, which is the foundation of the vast majority of our current digital infrastructure. This includes cryptocurrencies.
This would put everyone's safety in danger, from national governments and global organizations to the average user on the internet. It would also put everyone's operations and communications at risk. It should not come as a surprise that a significant amount of scientific effort is now being invested in investigating and developing countermeasures to the technology. Quantum-resistant algorithms are a special kind of cryptographic algorithm that is designed to be safe even in the face of the danger posed by quantum computers.
It would seem that the threat posed by quantum computers may be addressed using symmetric key cryptography by just increasing the key length to a greater extent. This would be the case on a fundamental level. This branch of cryptography has been rendered obsolete by asymmetric key cryptography as a result of the problems that arise when attempting to share a shared secret key over an open channel. The development of quantum computing, on the other hand, may bring it back into play.
Quantum cryptography has the potential to solve not just the challenge of securely sharing a shared key over an open channel, but also the problem of solving that problem itself. Eavesdropping countermeasures are now being developed, which is a positive sign. It is possible to identify snoopers on a shared channel by using the same theoretical underpinnings necessary for creating quantum computers. Because of this, it would be able to determine whether a shared symmetric key had been intercepted by a third party in the past and read or modified with.
To defend against hypothetical assaults based on quantum mechanics, researchers are also looking into several other lines of inquiry. In this context, "fundamental techniques" might refer to things like hashing, which is used to generate enormous message sizes or other ways like lattice-based cryptography. The end goal of all of this research is to develop different kinds of encryption that would be challenging for quantum computers to decipher.
Quantum computers and Bitcoin mining
Cryptography is used in the mining of bitcoins as well. The miners are engaged in a race against one another to solve a cryptographic challenge in order to win the block reward. If just one miner were to get their hands on a quantum computer, that miner could be able to take control of the whole network. This would make the network less decentralized, which would make it more likely that a 51% attack would happen.
On the other hand, many specialists believe this does not pose an urgent danger. At least for the foreseeable future, application-specific integrated circuits, or ASICs, have the potential to lessen the efficacy of an attack of this kind. Also, the chance of this kind of attack is greatly reduced when many miners have access to a quantum computer at the same time.

Closing thoughts
The emergence of quantum computing and the accompanying danger to present methods of asymmetric encryption appears to be just a matter of time. But it shouldn't be a big deal because many theoretical and technological problems need to be solved before it can be fully realized.
Because there is so much at risk when it comes to information security, it makes sense to get a head start on preparing for any future threats by building the foundation now. We may count ourselves fortunate that a substantial amount of study is now being undertaken into prospective solutions that could be implemented for existing systems. In theory, these technologies would protect our important infrastructure from the future risks that quantum computers could pose.
Standards that are immune to the effects of quantum computing might be disseminated to a larger audience in the same manner that end-to-end encryption was introduced to widespread use by means of popular web browsers and messaging programs. Once these standards have been set, the cryptocurrency ecosystem will be able to easily add the strongest security possible against the known attack vectors.
That's all for today, see ya tomorrow! If you want more, be sure to follow our Twitter (@croxroadnews)
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
You May Also Like
Reply