ECDSA Quantum Computing

Bitcoin’s Vulnerability and Google’s Quantum Advances Reports of Google’s quantum factoring breakthroughs have surfaced, reigniting concerns about the security of Bitcoin. Researchers at Google have made significant progress in decreasing the number of qubits needed to break RSA-2048 from 20 million to one million by refining Shor’s algorithm and enhancing error correction for quantum decoherence. Despite this noteworthy advancement, the largest quantum processor to date only has 1021 qubits, and the more qubits, the more difficult it is to maintain quantum coherence. There hasn’t been any noticeable progress in factoring small numbers like 35, despite claims of increased qubit counts.

SHA-256 and the Elliptic Curve Digital Signature Algorithm (ECDSA) are the two main security techniques used by Bitcoin. Shor’s algorithm solves the discrete logarithm issue exponentially quicker than classical computers, which could lead to the possibility of using a quantum computer to extract a private key from a Bitcoin public key.

ECDSA is commonly thought to be easier to crack than RSA, even if Google’s latest development has no direct effect on Bitcoin’s “secp256k1” elliptic curve. According to the creator of the Pauli Group, AI may make Shor’s algorithm more readily evade ECDSA. The developer of quantum computers, IonQ, has predicted that the Bitcoin curve’s “secp32k1” might be broken by 2027 and “secp256k1” by 2029. However, it is important to take these forecasts “with a big grain of salt.”

You can also read Robotic Inspection from Hybrid Quantum Computing Approaches

Approximately 4 million Bitcoin, or 25% of the total supply, may be susceptible to quantum assaults, according to a 2022 Deloitte study. These attacks might target older Pay-to-Public-Key (P2PK) and reused Pay-to-Public-Key-Hash (P2PKH) addresses that reveal public keys. Particularly vulnerable are wallets that are dormant, such as Satoshi Nakamoto’s wallet. In addition to digital signatures, Grover’s technique may also be able to exploit Bitcoin’s SHA-256 hash function, which might be advantageous to miners with quantum capabilities and result in centralized mining power or even a 51% attack.

Temporal and Mitigation Techniques Experts predict that the emergence of quantum computers that can pose a danger to present cryptography standards will not occur until the 2030s at the latest, probably ten or more years away, due to major obstacles in hardware stability and error correction. The 13–300 million qubits estimated to be required to practically breach ECDSA are far above the capabilities of current quantum computers. But there is a “harvest now, decrypt later” risk, in which adversaries gather encrypted data now in order to decrypt it later.

The Bitcoin community is actively working on solutions:

  • In the field of post-quantum cryptography (PQC), quantum-resistant algorithms have been standardized by the National Institute of Standards and Technology (NIST) since 2016. ECDSA may eventually be replaced by CRYSTALS-Dilithium, SPHINCS+, and FALCON, three prominent contenders for digital signatures. Quantum computers have difficulty solving mathematical problems, which are the basis for these.
  • Hunter Beast proposed BIP-360 (Pay to Quantum Resistant Hash, or P2QRH), a “pragmatic first step” through a soft fork that would add new UTXO kinds and addresses beginning with “bc1r.” It suggests adding both post-quantum and ECDSA signatures to transactions so that an ECDSA backup can be used in the event that a selected post-quantum technique is proven to have flaws. Because of its signature aggregation capabilities, Hunter Beast supports the FALCON algorithm.
  • Challenges of PQC Integration: Implementing PQC won’t be “free”. Signatures and keys will be much larger, inevitably reducing on-chain transaction throughput and increasing the time for creating and verifying signatures. For example, FALCON signatures are 20 times larger than Schnorr signatures and 13 times larger than ECDSA signatures, while SPHINCS+ signatures can be 40 times larger, potentially meaning 40 times fewer transactions per block.
  • The BIP “Quantum-Resistant Address Migration Protocol” (QRAMP), put forth by Agustin Cruz, is also being considered as a conceptual proposal. It would entail a hard fork in which bitcoins that have not been moved to post-quantum addresses would be lost. But most likely, like the Taproot upgrade, transitions will be voluntary migrations and soft forks. Satoshi Nakamoto’s address is one example of an inactive address that poses a problem and may spark heated discussions.
  • Replacing Hash Functions: Bitcoin developers may swap out SHA-256 for a quantum-resistant hash function to lessen the possibility of a quantum-driven mining oligopoly. It is thought to be theoretically possible.

The Function of Bitcoin and Its Wider Social Effects Banking, payments, communications, healthcare, and government networks that depend on comparable cryptographic methods like RSA and ECC are all impacted by the quantum danger, which goes beyond Bitcoin. A “Q-Day” breach could undermine trust and cause worldwide financial disruptions. There is a 50% to 70% possibility that quantum computers may be able to crack current cryptography techniques in the next five to thirty years, according to the 2023 EY Quantum Approach to Cybersecurity research. A shift to PQC by 2035 has been imposed by the federal government of the United States.

Because of its decentralized governance and $2 trillion market value, Bitcoin offers developers a special motivation to create cutting-edge quantum-resistant solutions, which might establish a benchmark for other sectors. According to Texas A&M professor Korok Ray, Bitcoin is unique in its ability to evolve and adapt to quantum threats because of its open-source nature and active developer community. In their filings for Bitcoin ETFs, firms such as BlackRock have already identified quantum computing as a long-term risk.

You can also read IBM Quantum Releases Qiskit SDK v2.1 for Quantum Advantage

Thank you for your Interest in Quantum Computer. Please Reply

Trending

Discover more from Quantum Computing News

Subscribe now to keep reading and get access to the full archive.

Continue reading