Bitcompare Community

Vicky Sharp
Vicky Sharp

Posted on

Can quantum computing break Bitcoin’s security?

Top comments (1)

Collapse
 
ohdislam profile image
Ohidul Islam • Edited

Bitcoin relies on cryptographic systems to ensure its security, primarily elliptic curve cryptography (ECC) and hashing algorithms like SHA-256. These systems are highly secure against classical computers but may be vulnerable to quantum computers, which leverage quantum mechanics to perform certain computations far more efficiently. Here’s a detailed breakdown of whether quantum computing poses a real threat to Bitcoin’s security.

Understanding Bitcoin’s Cryptography

  • Elliptic Curve Cryptography (ECC): Used for generating private and public key pairs. Bitcoin wallets use ECC to secure private keys.
  • SHA-256 Hashing: Used for mining and transaction verification. Miners solve SHA-256-based puzzles to add blocks to the blockchain.

ECC and SHA-256 are currently considered computationally infeasible to break with classical computers.

Quantum Computing and Its Threat

  • Shor’s Algorithm: Quantum computers running Shor’s algorithm can factor large numbers and solve the discrete logarithm problem exponentially faster than classical computers. This directly threatens ECC, as it could theoretically derive private keys from public keys.
  • Grover’s Algorithm: Could theoretically be used to attack Bitcoin’s SHA-256 hashing algorithm, but the improvement is quadratic rather than exponential. Doubling the hash size (e.g., SHA-512) would effectively neutralize this threat.

How Bitcoin Is Affected

  • Immediate Risks to Wallets:

Bitcoin wallets are safe if private keys remain undisclosed. However, when a transaction is made, the public key is revealed. A sufficiently powerful quantum computer could derive the private key from the public key, potentially stealing funds.

  • Miners and Blockchain Security:

Mining would not be significantly impacted because quantum computers do not dramatically outperform classical ones for brute-forcing SHA-256.

Current State of Quantum Computing

Quantum computers capable of breaking Bitcoin’s ECC or SHA-256 are not yet feasible. Breaking ECC with Shor’s algorithm requires a quantum computer with thousands of logical qubits. Current systems, like Google’s Sycamore and IBM’s Osprey, have fewer than 500 physical qubits and still struggle with error rates and coherence times.

Estimates suggest it may take 10-20 years (or more) before quantum computers become a credible threat to Bitcoin’s cryptography.

Mitigation Strategies

Bitcoin and its ecosystem can adopt measures to address quantum risks:

  • Post-Quantum Cryptography: Transitioning to quantum-resistant cryptographic algorithms, like lattice-based or hash-based cryptography, can secure Bitcoin against quantum attacks.
  • Soft Forks and Upgrades: Bitcoin’s decentralized nature allows for protocol updates. A community-wide agreement can implement quantum-resistant features.
  • Increasing Key Size: Expanding key sizes could make quantum attacks impractical, even if they are theoretically possible.
Aspect of Bitcoin Threat Level from Quantum Computing Mitigation Strategy
Private Key (ECC) High (in the future) Post-quantum cryptography, larger keys
SHA-256 (Mining) Low Transition to SHA-512 or similar
Wallet Safety (Public Key) Medium to High Avoid reusing addresses

6. Conclusion

While quantum computing poses a theoretical threat to Bitcoin’s security, practical implementation of such an attack is decades away. The Bitcoin network has ample time to prepare by adopting quantum-resistant cryptographic standards. Thus, while it is crucial to remain vigilant, quantum computing does not currently endanger Bitcoin.