The Q-Day scenario, in which quantum computers can break blockchain mật mãgraphy, is estimated to arrive within 5 to 7 years. BlackRock also pointed out this risk in its Bitcoin ETF application. Post-quantum cryptography provides protection against quantum attacks on three security levels: communication encryption, transaction signing, and data preservation. Companies like Google and AWS have begun adopting post-quantum cryptography, but Bitcoin and Ethereum are still in the early stages of discussion. 1. A new technology raises unfamiliar questions.
If a quantum computer can crack a Bitcoin wallet in minutes, can the security of the blockchain still be maintained? The core of blockchain security is private key protection. To steal someone’s Bitcoin, an attacker must obtain the private key, which is practically impossible with current computing methods. Only the public key is visible on the chain, and even using a supercomputer, deriving the private key from the public key would take hundreds of years. Quantum computers have changed this risky situation. Classical computers process 0s or 1s sequentially, while quantum systems can process both states simultaneously. This ability makes it theoretically possible to derive a private key from a public key. Experts estimate that quantum computers capable of breaking modern cryptography may emerge around 2030. This projected moment, known as Q-Day, indicates that it is still five to seven years before a practical attack becomes feasible.
Source: SEC
Regulators and major institutions have recognized this risk. In 2024, the National Institute of Standards and Technology (NIST) introduced post-quantum cryptography standards. BlackRock also noted in its Bitcoin ETF application that advancements in quantum computing could threaten Bitcoin’s security. Quantum computing is no longer a distant theoretical problem. It has become a technological problem that requires practical preparation rather than relying on assumptions. 2. Quantum Computing Challenges Blockchain SecurityTo understand how blockchain transactions work, consider a simple example: Ekko sends 1 BTC to Ryan. When Ekko creates a transaction stating “I send Ryan my 1 BTC”, he must attach a unique signature. This signature can only be generated using his private key. Ryan and the other nodes in the network then use Ekko’s public key to verify the signature’s validity. The public key acts as a tool that can verify a signature but cannot recreate it. As long as Ekko’s private key remains confidential, no one can forge his signature. This forms the foundation for blockchain transaction security. A private key can generate a public key, but a public key cannot reveal a private key. This is achieved using the Elliptic Curve Digital Signature Algorithm, which is based on elliptic curve cryptography. ECDSA relies on a mathematical asymmetry: computation in one direction is straightforward, while computation in the reverse direction is computationally infeasible. With the development of quantum computing, this barrier is weakening. The key element is the qubit. Classical computers process 0 or 1 sequentially. A qubit can represent both states simultaneously, enabling massively parallel computing. With a sufficient number of qubits, a quantum computer can complete in seconds a computation that would take a classical computer decades. Two types of quantum algorithms pose a direct risk to blockchain security. Shor’s algorithm provides a way to derive a private key from a public key, thus weakening public-key cryptography. Grover’s algorithm reduces the effective strength of hash functions by accelerating brute-force search. 2.1 Shor’s Algorithm: Direct Asset Theft
Most internet security today relies on two public-key cryptosystems: RSA and ECC. Most internet security today relies on two public-key cryptosystems: RSA and ECC. They defend against external attacks by utilizing difficult mathematical problems such as integer factorization and discrete logarithms. Blockchain uses the same principles through an elliptic curve digital signature algorithm based on ECC. With current computing power, it would take decades to crack these systems, so they are considered practically secure. Shor’s algorithm changed that. Quantum computers running Shor’s algorithm can perform large integer factorization and discrete logarithm calculations at high speeds, a capability that could break RSA and ECC. Using Shor’s algorithm, a quantum attacker can deduce the private key from the public key and arbitrarily transfer assets in the corresponding address. Any address that has ever sent a transaction is at risk because its public key becomes visible on the blockchain. This could lead to a scenario where millions of addresses could be at risk simultaneously. 2.2 Grover Algorithm: Intercepting Transactions
Blockchain security also relies on symmetric key encryption (such as AES) and hash functions (such as SHA-256). AES is used to encrypt wallet files and transaction data; finding the correct key requires trying all possible combinations. SHA-256 supports proof-of-work difficulty adjustment, requiring miners to repeatedly search for hash values that meet specified conditions. These systems assume that while a transaction is waiting in the mempool, other users do not have enough time to analyze or forge it before it is packaged into a block. The Grover algorithm weakens this assumption. It leverages quantum superposition to accelerate the search process and reduces the effective security level of AES and SHA-256. A quantum attacker can analyze transactions in the mempool in real time and generate a forged version that uses the same input (UTXO) but redirects the output to a different address. This creates the risk that transactions could be intercepted by attackers equipped with quantum computers, resulting in funds being transferred to unintended destinations. Withdrawals from exchanges and regular transfers are common targets for such interceptions. 3. Post-quantum cryptography
How can we maintain blockchain security in the era of quantum computing? Future blockchain systems will require cryptographic algorithms that remain secure even under quantum attacks. These algorithms are known as post-quantum cryptography. The National Institute of Standards and Technology (NIST) has proposed three major PQC standards, which are being discussed by the Bitcoin and Ethereum communities as the basis for long-term security. 3.1 Kyber: Protecting inter-node communication
Kyber is an algorithm designed to allow two parties on a network to securely exchange symmetric keys. Traditional methods that have long supported internet infrastructure, such as RSA and ECDH, are vulnerable to Shor’s algorithm attacks and are exposed in quantum environments. Kyber addresses this problem by using a lattice-based mathematical problem (called Module-LWE), which is believed to be resistant even to quantum attacks. This structure prevents data from being intercepted or decrypted during transmission. Kyber protects all communication paths: HTTPS connections, exchange APIs, and wallet-to-node messaging. Within the blockchain network, nodes can also use Kyber when sharing transaction data to prevent third-party monitoring or information extraction. In fact, Kyber rebuilt the security of the network transport layer for the quantum computing era. 3.2 Dilithium: Verifying Transaction Signatures
Dilithium is a digital signature algorithm used to verify that a transaction was created by the rightful holder of the private key. Ownership in a blockchain relies on the ECDSA model, which involves signing with a private key and verifying with a public key. The problem is that ECDSA is vulnerable to Shor’s algorithm attacks. By accessing the public key, a quantum attacker can deduce the corresponding private key, enabling signature forgery and asset theft. Dilithium avoids this risk by using a lattice-based structure that combines Module-SIS and LWE. Even if an attacker analyzes the public key and signature, the private key cannot be deduced, and the design remains secure against quantum attacks. Applying Dilithium can prevent signature forgery, private key extraction, and large-scale asset theft. It protects both asset ownership and the authenticity of each transaction. 3.3 SPHINCS+: Preserving long-term records
SPHINCS+ uses a multi-level hash tree structure. Each signature is verified through a specific path in the tree, and because a single hash value cannot be reverse-engineered to derive its input, the system remains secure even against quantum attacks. Once Ekko and Ryan’s transaction is added to a block, the record becomes permanent. This can be likened to a document fingerprint. SPHINCS+ converts each part of a transaction into a hash value, creating a unique pattern. If even a single character in the document changes, its fingerprint will be completely altered. Similarly, modifying any part of the transaction will change the entire signature. Even decades later, any attempt to alter the Ekko and Ryan transactions would be immediately detected. While the signature generated by SPHINCS+ is relatively large, it is well-suited for financial data or government records that must maintain verifiability over long periods. Quantum computers would find it extremely difficult to forge or replicate this fingerprint. In summary, PQC technology builds three layers of protection against quantum attacks in a standard 1 BTC transaction: Kyber for communication encryption, Dilithium for signature verification, and SPHINCS+ for record integrity. 4. Bitcoin and Ethereum: Different Paths, Same Destination
Bitcoin emphasizes immutability, while Ethereum prioritizes adaptability. These design principles are shaped by past events and influence how each network addresses the threat of quantum computing. 4.1 Bitcoin: Protecting the Existing Chain by Minimizing Changes
Bitcoin’s emphasis on immutability dates back to the 2010 value spillover event. A hacker exploited a vulnerability to create 184 billion BTC, which the community invalidated within five hours via a soft fork. Following this emergency, the principle that “confirmed transactions must never be altered” became central to Bitcoin’s identity. This immutability maintains trust but also makes rapid structural changes difficult. This philosophy extends to Bitcoin’s approach to quantum security. Developers agree that upgrades are necessary, but a full-chain replacement via a hard fork is considered too risky for network consensus. Therefore, Bitcoin is exploring a gradual transition through a hybrid migration model.
Source: bip360.org
This philosophy extends to Bitcoin’s approach to quantum security. Developers agree that upgrades are necessary, but a full-chain replacement via a hard fork is considered too risky for network consensus. Therefore, Bitcoin is exploring a gradual transition through a hybrid migration model. If adopted, users will be able to use both traditional ECDSA addresses and the new PQC addresses simultaneously. For example, if Ekko’s funds are held in an old Bitcoin address, he can gradually migrate them to a PQC address as Q-Day approaches. Security is improved because the network recognizes both formats simultaneously, without forcing a disruptive transition. The challenges remain significant. Hundreds of millions of wallets need to be migrated, and there is still no clear solution for wallets with lost private keys. Divergent opinions within the community may also increase the risk of chain forks. 4.2 Ethereum: Achieving a Rapid Transition Through Flexible Architectural RedesignEthereum’s adaptability principle stems from the 2016 DAO hack. When approximately 3.6 million ETH were stolen, Vitalik Buterin and the Ethereum Foundation executed a hard fork to reverse the theft. This decision split the community into Ethereum (ETH) and Ethereum Classic (ETC). Since then, adaptability has become a bất chấpning characteristic of Ethereum and a key factor in its ability to implement rapid changes.
Nguồn: web3edge
Historically, all Ethereum users relied on external accounts that could only send transactions using the ECDSA signature algorithm. Because every user relied on the same cryptographic model, changing the signature scheme required a network-wide hard fork. EIP-4337 changed this structure, enabling accounts to function like smart contracts. Each account can define its own signature verification logic, allowing users to adopt alternative signature schemes without modifying the entire network. Signature algorithms can now be replaced at the account level, rather than through protocol-wide upgrades. Based on this, several proposals have emerged that support the adoption of PQC: EIP-7693: Introduces a hybrid migration path that supports a gradual transition to PQC signatures while maintaining compatibility with ECDSA. EIP-8051: Applying the NIST PQC standard on-chain to test PQC signatures under real-world network conditions. EIP-7932: Allows protocols to simultaneously recognize and verify multiple signature algorithms, enabling users to choose their preferred method. In practice, users of ECDSA-based wallets can migrate to Dilithium-based PQC wallets when a quantum threat looms. This transition occurs at the account level and does not require replacing the entire chain. In summary, Bitcoin aims to maintain its current structure while integrating PQC in parallel, while Ethereum is redesigning its account model to directly incorporate PQC. Both pursue the same goal of quantum resistance, but Bitcoin relies on conservative evolution, while Ethereum adopts structural innovation. 5. While blockchain is still being debated, the world has already changed.The global internet infrastructure has begun to transition to new security standards. Web2 platforms, powered by centralized decision-making, are moving rapidly. Google began enabling post-quantum key exchange by default in its Chrome browser in April 2024 and has deployed it to billions of devices. Microsoft announced an organization-wide migration plan with the goal of full PQC adoption by 2033. AWS began using hybrid PQC by the end of 2024. Blockchain faces different situations. Bitcoin’s BIP-360 is still under discussion, while Ethereum’s EIP-7932 has been submitted for months but has yet to have a public testnet. Vitalik Buterin has outlined a gradual migration path, but it remains unclear whether the transition can be completed before quantum attacks become practically feasible. A Deloitte report estimates that approximately 20% to 30% of Bitcoin addresses have already exposed their public keys. These are currently secure, but could become targets once quantum computers mature in the 2030s. If the network attempts a hard fork at that stage, the likelihood of a split is high. Bitcoin’s commitment to immutability, while fundamental to its identity, also makes rapid change difficult. Ultimately, quantum computing presents both technological and governance challenges. Web2 has already begun its transition. Blockchain is still debating how to begin. The decisive question will not be who acts first, but who can safely complete the transition. Liên kết gốc Bài viết này được lấy từ internet: Tiger Research: Will Bitcoin be hacked by quantum computers?Recommended Articles Related: Of the potential $8 billion DeFi disaster, only $100 million has already been triggered. At that time, everyone admired fund managers who graduated from prestigious universities and had impressive resumes, believing that funds were less risky and more professional than direct stock trading. However, when the market falls, investors realize that so-called “professionalism” cannot combat systemic risks. Worse still, they receive management fees and performance bonuses, so if they make money, it’s their own skill, but if they lose money, it’s the investors’ money. Now, the situation has become even more precarious when the role of “fund manager” has come onto the blockchain under the new name of “Curator” (external manager). They don’t need to pass any qualification exams, undergo any regulatory scrutiny, or even disclose their true identities. Simply create a “vault” on a DeFi protocol and lure in hundreds of millions of… Phân tích ## bitcoinTiền mã hóa ## định nghĩa# ethereumTrao đổi #Công cụ ## web3© 版权声明Mảng 上一 hình ảnh In-depth analysis: Current status and data comparison of the four major Perp DEXs 下一 hình ảnh The Undercurrents Amid the Stablecoin Crisis: How to Safeguard Risk Boundaries Behind Decentralized Innovation? 相关文章 a16z Crypto adds to Story ecosystem, leads $15 million investment in decentralized data layer Poseidon to solve AI data 6086cf14eb90bc67ca4fc62b 24.259 Bubbles, cockroaches, and a 367% surge: Decoding 11 key moments in global financial markets in 2025 6086cf14eb90bc67ca4fc62b 19.148 3 Tariffs, whales, market makers: Who’s behind today’s crypto market crash? 6086cf14eb90bc67ca4fc62b 17.115 1 24H Hot Coins and News | Binance launches SHELL trading; SEC terminates investigation into OpenSea (2.28) 6086cf14eb90bc67ca4fc62b 37.673 Zeus unveiled its institutional-grade MPC infrastructure roadmap at Solana Breakpoint 2025, unlocking Bitcoin’s access to the Solana on-chain capital market. 6086cf14eb90bc67ca4fc62b 15.571 1 PUMP sold out in 12 minutes. Which of the two scenarios after the opening do you believe? 6086cf14eb90bc67ca4fc62b 24.314 1 1 bình luận Bạn phải đăng nhập để co thể để lại một lơi nhận xét! Đăng nhập ngay lập tức # Người tin tưởng INL5WWK Khách mời Tôi là nạn nhân của một vụ lừa đảo, đã mất một số tiền lớn lên đến $170.000. Tôi xin bày tỏ lòng biết ơn sâu sắc đến các chuyên gia phân tích thu hồi tài sản của Innovations vì sự hỗ trợ xuất sắc của họ trong việc thu hồi số tiền của tôi từ một nhà môi giới forex. Sự chuyên môn và sự chuyên nghiệp của họ trong việc xử lý quy trình phức tạp này thực sự đáng khen ngợi. Dưới sự hướng dẫn và nỗ lực không ngừng của họ, tôi đã thành công trong việc thu hồi số tiền $170,000, mang lại cho tôi sự nhẹ nhõm cần thiết. Tôi nhiệt liệt khuyến nghị họ qua email INNOVATIONSANALYST@ GMAIL. COM hoặc WhatsApp + 1 424 285 0682 cho bất kỳ ai đang gặp phải thách thức tương tự, vì sự tận tâm và cam kết của họ trong việc hỗ trợ khách hàng thực sự ấn tượng. Tôi chân thành cảm ơn sự hỗ trợ vô giá của họ trong việc giải quyết vấn đề này. 3 tháng trước Bee.com Cổng thông tin Web3 lớn nhất thế giới Đối tác đồng xuCá chép Binance CoinMarketCap CoinGecko Coinlive Giáp Tải xuống Bee Network APP và bắt đầu hành trình web3 Giấy trắng Vai trò Câu hỏi thường gặp © 2021–2026. Tất cả quyền được bảo lưu. Chính sách bảo mật | Điều khoản dịch vụ Tải xuống ứng dụng Bee Network và bắt đầu hành trình web3 Cổng thông tin Web3 lớn nhất thế giới Đối tác CoinCarp Binance CoinMarketCap CoinGecko Coinlive Armors Giấy trắng Vai trò Câu hỏi thường gặp © 2021–2026. Tất cả quyền được bảo lưu. Chính sách bảo mật | Điều khoản dịch vụ Tìm kiếm Tìm kiếmTrong trang webOnChainXã hộiTin tức 热门推荐: Thợ săn airdrop Phân tích dữ liệu Người nổi tiếng về tiền điện tử Máy dò bẫy Tiếng Việt English 繁體中文 简体中文 日本語 العربية 한국어 Bahasa Indonesia हिन्दी اردو Русский Tiếng Việt
智能索引记录
-
2026-03-02 13:39:48
综合导航
成功
标题:Fantasy Football 2025: QB Matthew Stafford player profile
简介:Nathan Jahnke breaks down Los Angeles Rams quarterback Matth
-
2026-03-02 15:06:26
旅游出行
成功
标题:平潭岛旅游必看帖-平潭岛详细避雷攻略-果果圈模板
简介:近期来平潭旅游~~必看避雷指南!今天不讲景区的雷,讲下住宿的雷!我敢保证!如果你有计划来平潭玩,这一篇笔记你算看对了!实
-
2026-03-02 17:10:14
综合导航
成功
标题:Combat 3d Pixel Strike Multiplayer - Play The Free Mobile Game Online
简介:Combat 3d Pixel Strike Multiplayer - click to play online. S
-
2026-03-02 13:07:27
电商商城
成功
标题:丝塔芙晚霜怎么样 - 京东
简介:京东是专业的丝塔芙晚霜网上购物商城,为您提供丝塔芙晚霜价格图片信息、丝塔芙晚霜怎么样的用户评论、丝塔芙晚霜精选导购、更多
-
2026-03-02 16:44:20
综合导航
成功
标题:Fence sb. World English Historical Dictionary
简介:Fence sb. World English Historical Dictionary
-
2026-03-02 16:39:16
综合导航
成功
标题:荒野求生,开局奖励游乐园_痴嗔本真_344 同款完结荒野求生文《我靠荒野求生直播风靡全星际》_笔趣阁
简介:笔趣阁提供荒野求生,开局奖励游乐园(痴嗔本真)344 同款完结荒野求生文《我靠荒野求生直播风靡全星际》在线阅读,所有小说
-
2026-03-02 12:29:13
综合导航
成功
标题:学英语作文汇总[10篇]
简介:在我们平凡的日常里,大家或多或少都会接触过作文吧,作文是通过文字来表达一个主题意义的记叙方法。如何写一篇有思想、有文采的
-
2026-03-02 10:45:46
综合导航
成功
标题:Hohenstaufen. The Reader's Biographical Encyclopaedia. 1922
简介:Hohenstaufen. The Reader
-
2026-03-02 12:11:50
教育培训
成功
标题:上海初中培训机构哪家好?-高中培训机构哪家好?-上海新王牌
简介:高中辅导培训哪家好?新王牌高中辅导培训频道为您提供的高中辅导培训班,高中辅导培训课程,高中辅导培训机构/学校价格与课程内
-
2026-03-02 16:34:46
新闻资讯
成功
标题:是什么让数据科学家从优秀变得伟大?, 站长资讯平台
简介:本文从目前数据科学行业发展角度出发,总结了顶级数据科学家必备的几项技能。 数据科学领域的劳动力市场正发生着快
-
2026-03-02 14:42:23
综合导航
成功
标题:2019年安全工程师报考成功后有哪些缴费方式?-中级注册安全工程师-233网校
简介:2019年安全工程师报考成功后有哪些缴费方式?报考人员缴费分为网上支付和现场缴费两种方式。如果当地考试机构实行现场缴费,
-
2026-03-02 13:26:25
法律咨询
成功
标题:别墅网 - 别墅设计图
简介:别墅网专注提供最新别墅设计图纸、农村自建房全套施工图、3D别墅模型下载。涵盖现代、新中式、欧式等多种风格,专业设计师团队
-
2026-03-02 14:00:08
综合导航
成功
标题:Dialogue with Solana Node: Who is making a fortune in silence behind Memecoin? Bee Network
简介:Compiled by: Wu Talks about Blockchain In this podcast, hos
-
2026-03-02 12:15:24
图片素材
成功
标题:汉字的作文900字 描写汉字的作文 关于汉字的作文-作文网
简介:作文网精选关于汉字的900字作文,包含汉字的作文素材,关于汉字的作文题目,以汉字为话题的900字作文大全,作文网原创名师
-
2026-03-02 17:43:47
综合导航
成功
标题:Access to Letters to Shareholders TP
简介:Find key information about the TP Group activity: message fr
-
2026-03-02 12:59:20
教育培训
成功
标题:【精品】我的朋友英语作文
简介:在日复一日的学习、工作或生活中,大家都不可避免地要接触到作文吧,通过作文可以把我们那些零零散散的思想,聚集在一块。那么你
-
2026-03-02 14:53:41
游戏娱乐
成功
标题:动物园里的动物,动物园里的动物小游戏,4399小游戏 www.4399.com
简介:动物园里的动物在线玩,动物园里的动物下载, 动物园里的动物攻略秘籍.更多动物园里的动物游戏尽在4399小游戏,好玩记得告
-
2026-03-02 13:53:35
游戏娱乐
成功
标题:气球塔防3,气球塔防3小游戏,4399小游戏 www.4399.com
简介:气球塔防3在线玩,气球塔防3下载, 气球塔防3攻略秘籍.更多气球塔防3游戏尽在4399小游戏,好玩记得告诉你的朋友哦!
-
2026-03-02 09:48:45
综合导航
成功
标题:Paul Atkins may become the chairman of the SEC. What are the related hype targets? Bee Network
简介:Last night, RSR instantly increased by 50.72% to $0.026, the
-
2026-03-02 13:07:42
综合导航
成功
标题:以读书为乐
简介:以读书为乐1敬爱的老师,亲爱的同学们: 大家好!我是来自五一班的田梓霖,今天我国旗下讲话的主题是“以读书为荣,以读书为乐
-
2026-03-02 09:59:49
综合导航
成功
标题:十二小说网_玄幻小说_言情小说_都市小说_好看的免费小说网_规则类怪谈扮演指南
简介:十二小说网是网络小说书迷喜爱的免费小说网,收录最热门的好看小说,小说更新速度更快,主打玄幻、都市、官场、乡村、仙侠、军事
-
2026-03-02 17:25:44
综合导航
成功
标题:[精选]什么让生活更美好作文
简介:无论是身处学校还是步入社会,大家总免不了要接触或使用作文吧,作文根据体裁的不同可以分为记叙文、说明文、应用文、议论文。那
-
2026-03-02 10:34:05
教育培训
成功
标题:初二的生活作文(通用15篇)
简介:在学习、工作乃至生活中,许多人都有过写作文的经历,对作文都不陌生吧,作文是人们以书面形式表情达意的言语活动。相信许多人会
-
2026-03-02 17:05:30
综合导航
成功
标题:散热设计的户外耐环境性防水光连接器「FO-BD7系列」开始正式销售 连接器 Connectors - JAE Japan Aviation Electronics Industry, Ltd.
简介:JAE研发了应用于5G基站等户外设备的光通信用「FO-BD7」连接器,该连接器将通过光学模块(SFP+,SFP28等)组
-
2026-03-02 17:47:57
综合导航
成功
标题:Preços especiais para a área da educação e descontos para estudantes - Educação - Apple (BR)
简介:É a última chance de escolher os AirPods ou um acessório qua
-
2026-03-02 06:34:02
综合导航
成功
标题:【优秀】四年级作文300字
简介:在平平淡淡的日常中,说到作文,大家肯定都不陌生吧,作文是从内部言语向外部言语的过渡,即从经过压缩的简要的、自己能明白的语
-
2026-03-02 14:12:26
图片素材
成功
标题:木兰的作文500字 描写木兰的作文 关于木兰的作文-作文网
简介:作文网精选关于木兰的500字作文,包含木兰的作文素材,关于木兰的作文题目,以木兰为话题的500字作文大全,作文网原创名师
-
2026-03-02 13:47:11
综合导航
成功
标题:ISG job portal - FAQ
简介:Here you will find frequently asked questions and answers ab
-
2026-03-02 14:52:39
游戏娱乐
成功
标题:包围泡泡龙_包围泡泡龙html5游戏_4399h5游戏-4399小游戏
简介:包围泡泡龙在线玩,包围泡泡龙下载, 包围泡泡龙攻略秘籍.更多包围泡泡龙游戏尽在4399小游戏,好玩记得告诉你的朋友哦!
-
2026-03-02 16:56:45
综合导航
成功
标题:常见问题——豆丁网
简介:豆丁网