

Share Dialog
Share Dialog
Subscribe to SEA Ghost
Subscribe to SEA Ghost
Quantum computers are extremely powerful computing devices that can process information much faster than traditional computers. They operate based on the principles of quantum mechanics and perform computations using qubits, capable of handling multiple states simultaneously and possessing powerful parallel computing capabilities.
A qubit (also known as a Q-bit or qubit) is the basic unit of information in quantum computing. A classical binary bit can only represent a single binary value, such as 0 or 1, while a qubit can represent 0, 1, or any superposition of the two states in any proportion, with a certain probability of being 0 and a certain probability of being 1. Non-quantum chips use bits to store, transmit, and compute data, while the most advanced quantum devices use qubits. Bits can be either 1 or 0, while qubits are digital information units that can be both 1 and 0 simultaneously. Qubits with superposition states over two energy levels are called quantum codes and can exist in multiple states such as 0, 1, and 2. Due to the superposition of only two energy levels, qubits have limited storage space and very low tolerance for interference. In July 2018, Professor Pan Jianwei from the University of Science and Technology of China, along with his colleagues Lu Zhaoyang, Liu Nailuo, Wang Xilin, etc., achieved the entanglement of 18 optical qubits for the first time in the world by controlling the three degrees of freedom of the polarization, path, and orbital angular momentum of six photons, setting a new world record for the preparation of the largest entangled state in all physical systems.
The concept of quantum computers was first proposed by Feynman from the United States in 1982. In 1985, Deutsch from the University of Oxford in the UK established the model of the quantum Turing machine. In 1995, it was discovered that any quantum circuit could be constructed using the arbitrary rotation of single qubits and the controlled-NOT gate of double qubits, which is the standard model of quantum computers. Subsequently, in order to realize the functions of quantum computing in real physical systems, scientists proposed quantum computing schemes such as topological quantum computing, one-way quantum computing, and adiabatic quantum computing. Quantum computers theoretically possess ultra-fast parallel computing capabilities and are expected to achieve exponential acceleration compared to classical computers. In the future, it is also hoped that they can solve problems with significant social and economic value (such as codebreaking, big data optimization, material design, drug analysis, etc.) through specific algorithms.
During the development of quantum computers, many important achievements have emerged. In 2007, D-Wave Systems in Canada announced the successful development of the world's first prototype of a quantum computer with 16 qubits. In 2013, D-Wave Systems developed the D-Wave 2 computer with 512 qubits. On June 22, 2015, D-Wave, the world's first quantum computing company, announced that it had broken through the 1000-qubit barrier and developed a new processor with approximately twice the number of qubits as the previous D-Wave processor and far exceeding the qubits of products developed by D-Wave or any other competitors. On December 4, 2020, the University of Science and Technology of China announced that Pan Jianwei and others had successfully built a quantum computing prototype named "Jiuzhang" with 76 photons.
The powerful computing capabilities of quantum computers pose potential threats to cryptocurrencies. Currently, the core security mechanisms of cryptocurrency systems mainly rely on traditional encryption algorithms, such as RSA, elliptic curve encryption, etc. However, quantum computers may use their powerful computing capabilities to crack these algorithms.
Researchers have successfully used quantum computers to crack algorithms commonly used in banks and cryptocurrencies, which has raised concerns about the security of cryptocurrencies. For example, Chinese researchers used a D-Wave quantum computer to crack the encryption algorithms used to protect bank accounts, top-secret military data, and cryptocurrency wallets. Although it is currently difficult to assess the specific threat level to cryptocurrencies, this event has attracted high attention in the global research market.
Quantum computers may be able to derive private keys from public keys and thus obtain users' funds. As many studies have pointed out, in Bitcoin, private keys are generated from public keys based on the secp256k1 elliptic curve. The elliptic curve encryption algorithm relies on the principle of discrete logarithms, and quantum computers may use their powerful computing capabilities to derive private keys from public keys. The solution is to avoid publishing public keys on the network to reduce the risk of being attacked. The elliptic curve used for transaction signatures may be cracked, and attackers can insert fake transactions and steal Bitcoins. For example, once the signature is cracked, attackers can use quantum computers to insert fake transactions and steal users' Bitcoins.
A quantum computer can easily account for 51% of Bitcoin's hash rate, launching the so-called 51% attack and controlling the cryptocurrency market. The computing power of quantum computers is completely different from that of traditional computers, and it can disrupt the balance of cryptocurrency mining. A quantum computer can easily account for 51% of Bitcoin's hash rate and thus control the cryptocurrency market. Such an attack will disrupt the normal operation of the network, prevent transaction confirmations, bring the threat of "double spending," and reverse already confirmed transactions. The 51% attack launched by quantum computers will cause serious damage to the cryptocurrency network, not only disrupting the normal operation of the network, preventing transaction confirmations, but also bringing the threat of "double spending" and reversing already confirmed transactions. Anderson Cheng, the CEO of the British cryptography company Post Quantum, pointed out that the cryptocurrency community should try to develop tools to resist quantum theft; otherwise, the destructive power of quantum computers may end Bitcoin.
Although the threat of quantum computers seems huge, there is currently no conclusive evidence to show that quantum computers are powerful enough to completely crack existing cryptocurrency systems in a short time. Currently, IBM has manufactured the "Osprey" quantum computer with 433 qubits, and Google also has the "Sycamore" computer with 53 qubits. However, there is still a large gap between these and the number of qubits required to crack cryptocurrencies. Studies have shown that cracking cryptocurrencies requires as many as 1500 qubits working continuously for 15 to 20 years, and current devices need to be a million times larger to pose a threat to cryptocurrencies. For example, Mark Webber's team calculated that cracking Bitcoin's encryption within a 10-minute window would require a quantum computer with 1.9 billion qubits, and cracking it within an hour would require a machine with 317 million qubits. However, IBM's record-breaking superconducting quantum computer has only achieved 127 qubits, which is far from the scale required to crack cryptocurrencies.
Most experts point out that in order to crack the security of cryptocurrencies, quantum computers may need thousands or even millions of qubits. Currently, the most advanced machines have approximately 1000 qubits. For example, IBM has announced its roadmap for the development of quantum computers, which includes building a quantum computer with 1000 qubits by 2023. However, even so, such machines still cannot fully realize the potential of quantum computers, such as cracking current Internet encryption schemes. Moreover, the error correction ability of quantum computers still needs to be proven. Whether computers like "Osprey" can capture and correct their own errors and whether IBM can try to use it to prove "quantum supremacy" are all huge challenges currently faced.
Some developers and cryptographers are researching "quantum-resistant encryption algorithms" that are designed to resist attacks from quantum computers. With the development of quantum computers, their powerful computing capabilities pose potential threats to cryptocurrencies. To cope with this threat, many developers and cryptographers have devoted themselves to the research of quantum-resistant encryption algorithms. For example, the National Institute of Standards and Technology (NIST) in the United States has selected four quantum-resistant encryption algorithms, including the CRYSTALS-Kyber algorithm for general encryption and the CRYSTALS-Dilithium, FALCON, and SPHINCS+ algorithms for digital signatures. These algorithms rely on mathematical problems that are difficult to solve for both classical computers and quantum computers, thereby protecting data from cryptanalysis attacks.
International standard organizations and the National Institute of Standards and Technology in the United States are promoting the formulation of quantum-resistant encryption standards. The International Organization for Standardization (ISO) and the National Institute of Standards and Technology (NIST) in the United States are actively promoting the formulation of quantum-resistant encryption standards. NIST launched the standardization process of quantum-resistant encryption algorithms as early as January 2017 and plans to add four more algorithms before finalizing the post-quantum cryptography standards. This process is expected to be completed in approximately two years. The formulation of quantum-resistant encryption standards will provide unified security specifications for the cryptocurrency industry and help improve the security of cryptocurrency systems.
Some cryptocurrency projects are also exploring ways to implement network upgrades to cope with the threat of future quantum computing. Faced with the potential threat of quantum computers, some cryptocurrency projects have begun to actively explore ways to upgrade their networks. For example, Ethereum has planned to introduce quantum-resistant encryption technology in its 2.0 upgrade to ensure that the future Ethereum network can resist attacks from quantum computing. Ethereum 2.0 adopts technologies such as the beacon chain, sharding, Proof of Stake (PoS), and eWASM, choosing components that can resist quantum computing or using components that can be replaced with quantum-resistant ones in the future to improve the security and performance of the network.
Ethereum has planned to introduce quantum-resistant encryption technology in its 2.0 upgrade to ensure that the future Ethereum network can resist attacks from quantum computing. Ethereum 2.0 is a planned alternative to Ethereum, aiming to solve problems such as high transaction fees and long transaction times faced by Ethereum 1.0. In the design of Ethereum 2.0, quantum-resistant encryption technology is an important consideration. Ethereum hopes to achieve resistance to quantum computing within three to five years and expects Ethereum 2.0 to be put into use by the end of 2019 or the beginning of 2020. Currently, Danny Ryan, the Ethereum 2.0 network launch coordinator, has also preliminarily announced in the forum that the final testnet of Ethereum 2.0 is expected to be officially launched for testing in early August. This shows that the Ethereum project has begun to actively map out the post-quantum roadmap, providing a positive example for the cryptocurrency industry to cope with the threat of quantum computing.
The advent of quantum computing technology, although it may bring challenges, will also bring new opportunities to the cryptocurrency industry, such as improving the efficiency and speed of transactions and promoting the development of smart contracts and distributed applications. The powerful parallel computing capabilities of quantum computing bring many potential opportunities for cryptocurrency transactions. On the one hand, it can accelerate the transaction process, significantly shorten the transaction time through optimized algorithms and parallel processing. Quantum machine learning models can also analyze a large amount of transaction data, identify trends and patterns, and thus improve the accuracy and efficiency of trading strategies. In addition, quantum computing can enhance market monitoring and fraud detection, process transaction data in real-time, and detect suspicious activities in a timely manner. In terms of smart contracts and distributed applications, quantum computing can improve their performance and functions. Features such as quantum state superposition and quantum entanglement enable quantum computers to process massive computing tasks in parallel, which is of great significance for the execution of smart contracts and the operation of distributed applications. It can accelerate the execution speed of smart contracts, improve their reliability and security, and at the same time promote the innovation and development of distributed applications.
The cryptocurrency industry needs to strike a balance between security and innovation to achieve long-term development. Faced with the challenges and opportunities brought by quantum computing, the cryptocurrency industry must find a balance between security and innovation. In terms of security, as the threat of quantum computers to traditional encryption algorithms is increasing day by day, the industry needs to accelerate the research and adoption of quantum-resistant encryption algorithms, strengthen network security protection, and protect the security of users' assets and transactions. International standard organizations and the National Institute of Standards and Technology in the United States are promoting the formulation of quantum-resistant encryption standards, and cryptocurrency projects are also exploring network upgrades. For example, Ethereum plans to introduce quantum-resistant encryption technology in its 2.0 upgrade. At the same time, the industry should also strengthen user education, improve users' awareness of the threat of quantum computing, and guide users to take appropriate security measures. In terms of innovation, quantum computing is not only a threat but also an opportunity. It can be used for other innovative applications in the encryption field, such as improving the efficiency and speed of transactions and promoting the development of smart contracts and distributed applications. The cryptocurrency industry should actively explore the applications of quantum computing in these aspects and promote the innovation and development of the industry. Only by striking a balance between security and innovation can the cryptocurrency industry achieve long-term and stable development.
Quantum computers are extremely powerful computing devices that can process information much faster than traditional computers. They operate based on the principles of quantum mechanics and perform computations using qubits, capable of handling multiple states simultaneously and possessing powerful parallel computing capabilities.
A qubit (also known as a Q-bit or qubit) is the basic unit of information in quantum computing. A classical binary bit can only represent a single binary value, such as 0 or 1, while a qubit can represent 0, 1, or any superposition of the two states in any proportion, with a certain probability of being 0 and a certain probability of being 1. Non-quantum chips use bits to store, transmit, and compute data, while the most advanced quantum devices use qubits. Bits can be either 1 or 0, while qubits are digital information units that can be both 1 and 0 simultaneously. Qubits with superposition states over two energy levels are called quantum codes and can exist in multiple states such as 0, 1, and 2. Due to the superposition of only two energy levels, qubits have limited storage space and very low tolerance for interference. In July 2018, Professor Pan Jianwei from the University of Science and Technology of China, along with his colleagues Lu Zhaoyang, Liu Nailuo, Wang Xilin, etc., achieved the entanglement of 18 optical qubits for the first time in the world by controlling the three degrees of freedom of the polarization, path, and orbital angular momentum of six photons, setting a new world record for the preparation of the largest entangled state in all physical systems.
The concept of quantum computers was first proposed by Feynman from the United States in 1982. In 1985, Deutsch from the University of Oxford in the UK established the model of the quantum Turing machine. In 1995, it was discovered that any quantum circuit could be constructed using the arbitrary rotation of single qubits and the controlled-NOT gate of double qubits, which is the standard model of quantum computers. Subsequently, in order to realize the functions of quantum computing in real physical systems, scientists proposed quantum computing schemes such as topological quantum computing, one-way quantum computing, and adiabatic quantum computing. Quantum computers theoretically possess ultra-fast parallel computing capabilities and are expected to achieve exponential acceleration compared to classical computers. In the future, it is also hoped that they can solve problems with significant social and economic value (such as codebreaking, big data optimization, material design, drug analysis, etc.) through specific algorithms.
During the development of quantum computers, many important achievements have emerged. In 2007, D-Wave Systems in Canada announced the successful development of the world's first prototype of a quantum computer with 16 qubits. In 2013, D-Wave Systems developed the D-Wave 2 computer with 512 qubits. On June 22, 2015, D-Wave, the world's first quantum computing company, announced that it had broken through the 1000-qubit barrier and developed a new processor with approximately twice the number of qubits as the previous D-Wave processor and far exceeding the qubits of products developed by D-Wave or any other competitors. On December 4, 2020, the University of Science and Technology of China announced that Pan Jianwei and others had successfully built a quantum computing prototype named "Jiuzhang" with 76 photons.
The powerful computing capabilities of quantum computers pose potential threats to cryptocurrencies. Currently, the core security mechanisms of cryptocurrency systems mainly rely on traditional encryption algorithms, such as RSA, elliptic curve encryption, etc. However, quantum computers may use their powerful computing capabilities to crack these algorithms.
Researchers have successfully used quantum computers to crack algorithms commonly used in banks and cryptocurrencies, which has raised concerns about the security of cryptocurrencies. For example, Chinese researchers used a D-Wave quantum computer to crack the encryption algorithms used to protect bank accounts, top-secret military data, and cryptocurrency wallets. Although it is currently difficult to assess the specific threat level to cryptocurrencies, this event has attracted high attention in the global research market.
Quantum computers may be able to derive private keys from public keys and thus obtain users' funds. As many studies have pointed out, in Bitcoin, private keys are generated from public keys based on the secp256k1 elliptic curve. The elliptic curve encryption algorithm relies on the principle of discrete logarithms, and quantum computers may use their powerful computing capabilities to derive private keys from public keys. The solution is to avoid publishing public keys on the network to reduce the risk of being attacked. The elliptic curve used for transaction signatures may be cracked, and attackers can insert fake transactions and steal Bitcoins. For example, once the signature is cracked, attackers can use quantum computers to insert fake transactions and steal users' Bitcoins.
A quantum computer can easily account for 51% of Bitcoin's hash rate, launching the so-called 51% attack and controlling the cryptocurrency market. The computing power of quantum computers is completely different from that of traditional computers, and it can disrupt the balance of cryptocurrency mining. A quantum computer can easily account for 51% of Bitcoin's hash rate and thus control the cryptocurrency market. Such an attack will disrupt the normal operation of the network, prevent transaction confirmations, bring the threat of "double spending," and reverse already confirmed transactions. The 51% attack launched by quantum computers will cause serious damage to the cryptocurrency network, not only disrupting the normal operation of the network, preventing transaction confirmations, but also bringing the threat of "double spending" and reversing already confirmed transactions. Anderson Cheng, the CEO of the British cryptography company Post Quantum, pointed out that the cryptocurrency community should try to develop tools to resist quantum theft; otherwise, the destructive power of quantum computers may end Bitcoin.
Although the threat of quantum computers seems huge, there is currently no conclusive evidence to show that quantum computers are powerful enough to completely crack existing cryptocurrency systems in a short time. Currently, IBM has manufactured the "Osprey" quantum computer with 433 qubits, and Google also has the "Sycamore" computer with 53 qubits. However, there is still a large gap between these and the number of qubits required to crack cryptocurrencies. Studies have shown that cracking cryptocurrencies requires as many as 1500 qubits working continuously for 15 to 20 years, and current devices need to be a million times larger to pose a threat to cryptocurrencies. For example, Mark Webber's team calculated that cracking Bitcoin's encryption within a 10-minute window would require a quantum computer with 1.9 billion qubits, and cracking it within an hour would require a machine with 317 million qubits. However, IBM's record-breaking superconducting quantum computer has only achieved 127 qubits, which is far from the scale required to crack cryptocurrencies.
Most experts point out that in order to crack the security of cryptocurrencies, quantum computers may need thousands or even millions of qubits. Currently, the most advanced machines have approximately 1000 qubits. For example, IBM has announced its roadmap for the development of quantum computers, which includes building a quantum computer with 1000 qubits by 2023. However, even so, such machines still cannot fully realize the potential of quantum computers, such as cracking current Internet encryption schemes. Moreover, the error correction ability of quantum computers still needs to be proven. Whether computers like "Osprey" can capture and correct their own errors and whether IBM can try to use it to prove "quantum supremacy" are all huge challenges currently faced.
Some developers and cryptographers are researching "quantum-resistant encryption algorithms" that are designed to resist attacks from quantum computers. With the development of quantum computers, their powerful computing capabilities pose potential threats to cryptocurrencies. To cope with this threat, many developers and cryptographers have devoted themselves to the research of quantum-resistant encryption algorithms. For example, the National Institute of Standards and Technology (NIST) in the United States has selected four quantum-resistant encryption algorithms, including the CRYSTALS-Kyber algorithm for general encryption and the CRYSTALS-Dilithium, FALCON, and SPHINCS+ algorithms for digital signatures. These algorithms rely on mathematical problems that are difficult to solve for both classical computers and quantum computers, thereby protecting data from cryptanalysis attacks.
International standard organizations and the National Institute of Standards and Technology in the United States are promoting the formulation of quantum-resistant encryption standards. The International Organization for Standardization (ISO) and the National Institute of Standards and Technology (NIST) in the United States are actively promoting the formulation of quantum-resistant encryption standards. NIST launched the standardization process of quantum-resistant encryption algorithms as early as January 2017 and plans to add four more algorithms before finalizing the post-quantum cryptography standards. This process is expected to be completed in approximately two years. The formulation of quantum-resistant encryption standards will provide unified security specifications for the cryptocurrency industry and help improve the security of cryptocurrency systems.
Some cryptocurrency projects are also exploring ways to implement network upgrades to cope with the threat of future quantum computing. Faced with the potential threat of quantum computers, some cryptocurrency projects have begun to actively explore ways to upgrade their networks. For example, Ethereum has planned to introduce quantum-resistant encryption technology in its 2.0 upgrade to ensure that the future Ethereum network can resist attacks from quantum computing. Ethereum 2.0 adopts technologies such as the beacon chain, sharding, Proof of Stake (PoS), and eWASM, choosing components that can resist quantum computing or using components that can be replaced with quantum-resistant ones in the future to improve the security and performance of the network.
Ethereum has planned to introduce quantum-resistant encryption technology in its 2.0 upgrade to ensure that the future Ethereum network can resist attacks from quantum computing. Ethereum 2.0 is a planned alternative to Ethereum, aiming to solve problems such as high transaction fees and long transaction times faced by Ethereum 1.0. In the design of Ethereum 2.0, quantum-resistant encryption technology is an important consideration. Ethereum hopes to achieve resistance to quantum computing within three to five years and expects Ethereum 2.0 to be put into use by the end of 2019 or the beginning of 2020. Currently, Danny Ryan, the Ethereum 2.0 network launch coordinator, has also preliminarily announced in the forum that the final testnet of Ethereum 2.0 is expected to be officially launched for testing in early August. This shows that the Ethereum project has begun to actively map out the post-quantum roadmap, providing a positive example for the cryptocurrency industry to cope with the threat of quantum computing.
The advent of quantum computing technology, although it may bring challenges, will also bring new opportunities to the cryptocurrency industry, such as improving the efficiency and speed of transactions and promoting the development of smart contracts and distributed applications. The powerful parallel computing capabilities of quantum computing bring many potential opportunities for cryptocurrency transactions. On the one hand, it can accelerate the transaction process, significantly shorten the transaction time through optimized algorithms and parallel processing. Quantum machine learning models can also analyze a large amount of transaction data, identify trends and patterns, and thus improve the accuracy and efficiency of trading strategies. In addition, quantum computing can enhance market monitoring and fraud detection, process transaction data in real-time, and detect suspicious activities in a timely manner. In terms of smart contracts and distributed applications, quantum computing can improve their performance and functions. Features such as quantum state superposition and quantum entanglement enable quantum computers to process massive computing tasks in parallel, which is of great significance for the execution of smart contracts and the operation of distributed applications. It can accelerate the execution speed of smart contracts, improve their reliability and security, and at the same time promote the innovation and development of distributed applications.
The cryptocurrency industry needs to strike a balance between security and innovation to achieve long-term development. Faced with the challenges and opportunities brought by quantum computing, the cryptocurrency industry must find a balance between security and innovation. In terms of security, as the threat of quantum computers to traditional encryption algorithms is increasing day by day, the industry needs to accelerate the research and adoption of quantum-resistant encryption algorithms, strengthen network security protection, and protect the security of users' assets and transactions. International standard organizations and the National Institute of Standards and Technology in the United States are promoting the formulation of quantum-resistant encryption standards, and cryptocurrency projects are also exploring network upgrades. For example, Ethereum plans to introduce quantum-resistant encryption technology in its 2.0 upgrade. At the same time, the industry should also strengthen user education, improve users' awareness of the threat of quantum computing, and guide users to take appropriate security measures. In terms of innovation, quantum computing is not only a threat but also an opportunity. It can be used for other innovative applications in the encryption field, such as improving the efficiency and speed of transactions and promoting the development of smart contracts and distributed applications. The cryptocurrency industry should actively explore the applications of quantum computing in these aspects and promote the innovation and development of the industry. Only by striking a balance between security and innovation can the cryptocurrency industry achieve long-term and stable development.
<100 subscribers
<100 subscribers
No activity yet