Binance Square

bip360

282 views
2 Discussing
JuanpaRojine
--
Bullish
See original
$BTC #bip360 #BitcoinNews This new type of output protects transactions sent to the mempool and helps preserve the free market, avoiding the need for off-chain private transactions outside of the mempool. In January of this year, Torpey Kyle wrote in an article for Cointelgraph Magazine that "according to a 2022 study by Universal Quantum, which is a spin-off company associated with the University of Sussex, a quantum computer with 13 million qubits would take a day to decrypt a private key associated with a vulnerable Bitcoin address." Nvidia CEO Jensen Huang has stated that "very useful quantum computers" are likely still twenty years away, implying that their real-world applications will be limited for some time. In a recent episode of ARK Investments' Bitcoin Brainstorm podcast, Blockstream co-founder and CEO Adam Back also dismissed those claiming that the quantum threat to Bitcoin is imminent. The truth is that the implementation of BIP360 appears to represent a significant advance in the protection of Bitcoin against the threat of quantum computing. By introducing quantum-resistant addresses (P2QRH) and allowing users to opt for post-quantum signature schemes, it is believed that transactions will be secure, even in a future where ECDSA cryptography may be compromised. $UNI $LINK
$BTC #bip360 #BitcoinNews

This new type of output protects transactions sent to the mempool and helps preserve the free market, avoiding the need for off-chain private transactions outside of the mempool.

In January of this year, Torpey Kyle wrote in an article for Cointelgraph Magazine that "according to a 2022 study by Universal Quantum, which is a spin-off company associated with the University of Sussex, a quantum computer with 13 million qubits would take a day to decrypt a private key associated with a vulnerable Bitcoin address." Nvidia CEO Jensen Huang has stated that "very useful quantum computers" are likely still twenty years away, implying that their real-world applications will be limited for some time. In a recent episode of ARK Investments' Bitcoin Brainstorm podcast, Blockstream co-founder and CEO Adam Back also dismissed those claiming that the quantum threat to Bitcoin is imminent.

The truth is that the implementation of BIP360 appears to represent a significant advance in the protection of Bitcoin against the threat of quantum computing. By introducing quantum-resistant addresses (P2QRH) and allowing users to opt for post-quantum signature schemes, it is believed that transactions will be secure, even in a future where ECDSA cryptography may be compromised.

$UNI
$LINK
--
Bullish
See original
$BTC #bip360 #BTC Why is the ECDSA cryptography used by Bitcoin considered vulnerable to future quantum attacks? ECDSA (Elliptic Curve Digital Signature Algorithm) is the digital signature algorithm that secures transactions in Bitcoin, and it is also widely used in financial systems, governments, and technology platforms. Its security relies on the computational difficulty of solving the discrete logarithm problem on elliptic curves. It is believed that with quantum computing, algorithms like Shor could break this security in reasonable time frames, allowing an attacker to compute the private key from a public key. Although there are currently no quantum computers at that scale, security experts consider it prudent to anticipate. Bitcoin, by exposing public keys when spending funds, may be leaving a record of public keys available for future attacks, even if they are not vulnerable today. In this regard, the author of the network improvement proposal indicated that: “The security of ECDSA, and its elliptic curve secp256k1, is based on the practical difficulty of deriving a private key from a public key, as doing so requires solving a mathematical problem known as the discrete logarithm problem on elliptic curves. For a traditional computer, this would take approximately 10⁷⁷ years (that is, a 1 followed by 77 zeros), making it practically impossible.” “However, quantum computers could run an algorithm called Shor's algorithm, which would allow for efficient finding of the discrete logarithm of a public key on an elliptic curve. Depending on how many qubits (the basic unit of quantum computers, analogous to bits in classical computers) it has, a quantum computer could derive a private key from a public one in a time range that goes from days to seconds,” he assured. $ETH $BNB
$BTC #bip360 #BTC

Why is the ECDSA cryptography used by Bitcoin considered vulnerable to future quantum attacks?
ECDSA (Elliptic Curve Digital Signature Algorithm) is the digital signature algorithm that secures transactions in Bitcoin, and it is also widely used in financial systems, governments, and technology platforms. Its security relies on the computational difficulty of solving the discrete logarithm problem on elliptic curves.

It is believed that with quantum computing, algorithms like Shor could break this security in reasonable time frames, allowing an attacker to compute the private key from a public key. Although there are currently no quantum computers at that scale, security experts consider it prudent to anticipate.

Bitcoin, by exposing public keys when spending funds, may be leaving a record of public keys available for future attacks, even if they are not vulnerable today.

In this regard, the author of the network improvement proposal indicated that: “The security of ECDSA, and its elliptic curve secp256k1, is based on the practical difficulty of deriving a private key from a public key, as doing so requires solving a mathematical problem known as the discrete logarithm problem on elliptic curves. For a traditional computer, this would take approximately 10⁷⁷ years (that is, a 1 followed by 77 zeros), making it practically impossible.”

“However, quantum computers could run an algorithm called Shor's algorithm, which would allow for efficient finding of the discrete logarithm of a public key on an elliptic curve. Depending on how many qubits (the basic unit of quantum computers, analogous to bits in classical computers) it has, a quantum computer could derive a private key from a public one in a time range that goes from days to seconds,” he assured.

$ETH
$BNB
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number