Most Popular

Most governments think of Bitcoin like people see walking with rocks in their shoes. Recent hacks and ransomware takeovers, where hackers targeted crucial infrastructure like pipelines and demanded they get ransom through Bitcoin, add additional scrutiny to cryptocurrency. There is a lot of regulatory scrutiny on Bitcoin for illegal activities. Plus, the energy of mining Bitcoin has gotten out of control in recent years and gives a direct threat to climate change agendas.

With the rise of quantum computing, governments might soon have a means to clamp down on Bitcoin and other forms of cryptocurrencies. Information inside “quantum” computers, called qubits, exists in infinite states because of something known as superposition, as there are infinite numbers between 0 and 1, greatly enhancing their speed compared to normal binary computer systems. Governments might possibly decrypt digital currencies or create hash attacks to seize their network for regulation with these machines. Let’s look at this risk.

Bitcoin cryptography 

Bitcoin’s network operates using public key cryptography. It uses both ECDSA and SHA-256 to be exact.

Cracking these two encryption schemes is simple on paper. Someone guesses a potential path or combination, tries it, and it works or it doesn’t. But imagine mapping out all the solutions to the lock and then trying them all at once. This is what a quantum computer can do.

Keep in mind that it would take a 5,000 qubit quantum computer to break Bitcoin’s encryption and solve these private keys. Right now, the top quantum computers can only do 66 qubits as their quantum states are hard to control. So the idea that any government’s quantum supercomputers decrypting a crypto wallet might be the least of your concern for the next 100 years or more.

Should you be concerned? 

Fortunately, cryptography is an area that favors the defender over the attacker. The quantum computing worry and dread is far away given its slower development and the Bitcoin network’s ability to change to resist these attacks, like with encryption upgrades. Remember there are more priorities that governments might want to use their quantum machines for.

Author: Scott Dowdy


Most Popular

These content links are provided by Content.ad. Both Content.ad and the web site upon which the links are displayed may receive compensation when readers click on these links. Some of the content you are redirected to may be sponsored content. View our privacy policy here.

To learn how you can use Content.ad to drive visitors to your content or add this service to your site, please contact us at [email protected].

Family-Friendly Content

Website owners select the type of content that appears in our units. However, if you would like to ensure that Content.ad always displays family-friendly content on this device, regardless of what site you are on, check the option below. Learn More



Most Popular
Sponsored Content

These content links are provided by Content.ad. Both Content.ad and the web site upon which the links are displayed may receive compensation when readers click on these links. Some of the content you are redirected to may be sponsored content. View our privacy policy here.

To learn how you can use Content.ad to drive visitors to your content or add this service to your site, please contact us at [email protected].

Family-Friendly Content

Website owners select the type of content that appears in our units. However, if you would like to ensure that Content.ad always displays family-friendly content on this device, regardless of what site you are on, check the option below. Learn More

Comments are closed.

Ad Blocker Detected!

Advertisements fund this website. Please disable your adblocking software or whitelist our website.
Thank You!