Close Menu
    X (Twitter)
    Blockchain Journal
    • News
      • Blockchain News
      • Bitcoin News
      • Ethereum News
      • NFT
      • DeFi News
      • Polkadot News
      • Chainlink News
      • Ripple News
      • Cardano News
      • EOS News
      • Litecoin News
      • Monero News
      • Stellar News
      • Tron News
      • Press Releases
      • Opinion
      • Sponsored
    • Price Analisys
    • Learn Crypto
    • Contact
    • bandera
    Facebook X (Twitter) Instagram
    Blockchain Journal
    Home » How real is the threat of quantum computers to blockchain security?

    How real is the threat of quantum computers to blockchain security?

    0
    By BlockchainJournal on May 20, 2019 News
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The blockchain is protected by two main mechanisms: asymmetric encryption and hashing. Not so long ago, we published material that looked at how the development of real quantum computing could create a security risk for today's blockchains, and concluded that blockchain technology would likely become more secure by the time a real quantum computer appears.

    This article discusses two quantum algorithms that a real quantum computer could use to crack asymmetric encryption and hashing.

    Shor's algorithm and asymmetric encryption

    The public and private keys that are used to secure blockchain transactions are very large numbers, converted by hashing into a group of small numbers. Asymmetric encryption algorithms are useful because computers cannot factorize these large numbers.

    Shor's algorithm is a conceptual algorithm for quantum computers, optimized for factorization. He takes the factor (number) n and decomposes it into prime factors. The essence of the algorithm is to reduce the number of steps required to find prime factors of a number (which makes it possible to find out the public and private keys).

    The algorithm is divided into two parts :

    • Transformation of the factorization task into the task of finding an order (which can be performed on an ordinary modern computer).
    • Quantum algorithm for solving the problem of finding the order (ineffective today due to the lack of opportunities for quantum computing).

    The most common encryption standard is used, in which a classic computer makes 2128 (340 282 366 920 938 463 463 374 607 431 768 211 456) basic operations for finding the private key associated with the public key. A quantum computer will require 1283 (only 2,097,152) basic operations to calculate the private key associated with the public key).

    That is why, in theory, the development of true quantum computing could pose a threat to modern blockchain encryption. Of course, this threat does not yet exist. Today, due to the lack of development in the field of quantum computing, Shor’s algorithm cannot be fully utilized.

    Grover's algorithm and hashing

    It is much more difficult for a potential quantum computer to crack cryptographic hashing than asymmetric encryption. Nevertheless, there is a quantum algorithm, which theoretically can greatly simplify the breaking of cryptographic hashing, although this process still remains time consuming.

    Grover’s algorithm allows the user to search for specific bullet points.

    Grover’s algorithm has a probability property: it measures the probability of various possible states of a system.

    Here is how it works.

    Suppose there is a bulleted list of a certain number of items. Among them it is necessary to find an element that satisfies certain conditions. You can use a regular computer and consider each element to meet these conditions.

    However, quantum computers simultaneously test a variety of input data using superposition. A quantum computer could use Grover’s algorithm to carry out several computational cycles. After each cycle of calculations, the probability that certain elements correspond to the specified conditions increases. The algorithm narrows the sample as it works and at the end produces one most likely result.

    On a classic computer, finding the correct hash would require 2,256 (78-digit) basic operations. The Grover algorithm running on a quantum computer would use only 2128 basic operations (a 39-digit number divided in the Grover algorithm section) to find the correct hash.

    Conclusion

    If powerful quantum computers existed today, most likely, they would represent a serious threat to asymmetric encryption, but not hashing. They could use Shor's algorithm to significantly reduce the number of steps to factor large numbers and simplify the process of finding a private key associated with an existing public key.

    They could also use Grover’s algorithm to more efficiently attempt to break into cryptographic hashing than modern conventional computers, but their efforts would still be almost futile.

    Fortunately, today, due to the meager developments in the field of quantum computing, these algorithms do not pose any serious threat to the security mechanisms of the blockchain.

    Publication date 20/05/2019
    Share this material on social networks and leave your opinion in the comments below.


    blockchain Computers Featured
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    BlockchainJournal

    Related Posts

    Hyperliquid’s USDH stablecoin call sparks fairness and governance debate

    September 5, 20253 Mins Read

    SharpLink to explore staking part of its $3.6 billion ETH treasury on Linea

    September 5, 20253 Mins Read

    Strategy Inc.’s path to the S&P 500 faces committee discretion, extreme volatility, and Bitcoin-dependent results

    September 5, 20253 Mins Read

    Coinbase accelerates toward a majority of AI-generated code amid a global trend

    September 5, 20253 Mins Read

    World Liberty Financial Blocks Justin Sun’s Wallet Amid WLFI Controversy

    September 5, 20253 Mins Read

    SEC bets on a pro-crypto agenda with a series of rulemakings on digital assets

    September 5, 20252 Mins Read

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 Blockchain Journal

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.