8 results ·
● Live web index
S
sciencedirect.com
article
https://www.sciencedirect.com/science/article/pii/S2590005621000138
## Array. Volume 10, July 2021, 100065. # Vulnerability of blockchain technologies to quantum attacks. Author links open overlay panel,. https://doi.org/10.1016/j.array.2021.100065Get rights and content. Under a Creative Commons license. ## Abstract. Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048. Blockchain technologies rely on cryptographic protocols for many of their essential sub-routines. Some of these protocols, but not all, are open to quantum attacks. Here we analyze the major blockchain-based cryptocurrencies deployed today—including Bitcoin, Ethereum, Litecoin and ZCash, and determine their risk exposure to quantum attacks. We finish with a comparative analysis of the studied cryptocurrencies and their underlying blockchain technologies and their relative levels of vulnerability to quantum attacks. ## Keywords. ## Cited by (0).
T
thequantuminsider.com
article
https://thequantuminsider.com/2024/09/08/blockchain-and-quantum-computing-are…
# Blockchain And Quantum Computing Are on a Collision Course, Expert Warns. ## When Blockchain Meets Quantum Computing. Herman, Senior Fellow at the Hudson Institute and Director of the Quantum Alliance Initiative, writes that the same technology that could unlock immense computational power might also render existing cryptographic systems, including those that secure blockchain networks, vulnerable to attacks. ## Can Quantum Computing Break Blockchain? Herman’s analysis highlights the inherent risks quantum computing poses to blockchain and cryptocurrencies. ## **The Quantum Threat to Blockchain Security**. “In short, blockchains that use the same cryptographic building blocks as other forms of DLT will be just as much at risk to the quantum computer threat as other digital technologies,” Herman writes. These quantum-resistant algorithms are designed to withstand attacks from quantum computers, making them a crucial component in the next generation of blockchain security. Looking ahead, Herman suggests that a coordinated approach integrating crypto, blockchain and quantum technologies could inaugurate a new era in finance and digital security.
M
mpra.ub.uni-muenchen.de
article
https://mpra.ub.uni-muenchen.de/127528/
# Quantum Computing and Blockchain Security: A Critical Assessment of Cryptographic Vulnerabilities and Post-Quantum Migration Strategies. *Quantum Computing and Blockchain Security: A Critical Assessment of Cryptographic Vulnerabilities and Post-Quantum Migration Strategies.*. This paper examines the growing threat that quantum computing presents to blockchain security. Core blockchain cryptographic frameworks, specifically the Elliptic Curve Digital Signature Algorithm and the Secure Hash Algorithm 256, are vulnerable to quantum algorithms. This paper examines the growing threat that quantum computing presents to blockchain security. Core blockchain cryptographic frameworks, specifically the Elliptic Curve Digital Signature Algorithm and the Secure Hash Algorithm 256, are vulnerable to quantum algorithms. | Original Title: | Quantum Computing and Blockchain Security: A Critical Assessment of Cryptographic Vulnerabilities and Post-Quantum Migration Strategies |. | English Title: | Quantum Computing and Blockchain Security: A Critical Assessment of Cryptographic Vulnerabilities and Post-Quantum Migration Strategies |. | Keywords: | Quantum Computing, Blockchain Security, Post-Quantum Cryptography, Shor’s Algorithm, Grover’s Algorithm, Cryptographic Vulnerability |.
D
deloitte.com
article
https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-…
* [Who we are](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Purpose & Values](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html). * [What we do](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Digital innovation](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Alliances](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Our Thinking](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industry thinking](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Who we are](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Main menu](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Who we are](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html). * [Purpose & Values](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Who we are](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Who we are](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html). * [What we do](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Main menu](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [What we do](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html). * [What we do](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Customer](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Legal](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Deloitte Private](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Enterprise Technology & Performance](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [What we do](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Government & Public Services](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Digital innovation](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [What we do](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Alliances](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [What we do](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Our Thinking](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Main menu](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Our Thinking](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html). * [Industry thinking](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Our Thinking](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Main menu](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). [Main Menu](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). . * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). . [Update analytics and performance](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). .
L
lfdecentralizedtrust.org
article
https://www.lfdecentralizedtrust.org/quantum-threat-of-blockchain-and-cryptog…
[](https://www.lfdecentralizedtrust.org/quantum-threat-of-blockchain-and-cryptographic-systems#search-popup). * [Cryptographic tools & protocols](https://www.lfdecentralizedtrust.org/projects/tag/cryptographic-tools-protocols). Even if quantum bits can be much faster than classical computers, building real life or sometimes even theoretical quantum algorithms can be pretty challenging. Quantum computers are expected to be better in solving different optimization and simulation problems than competing with classical computers in running traditional algorithms faster. * **_-Post-quantum cryptography_** tries to invent new cryptographic technologies that can be run on classical computers but are vulnerable to quantum attacks, like the Shor’s or Grover’s algorithm. * _Hash-based cryptography_: creates digital signature algorithms based on cryptographic hash functions, exploiting the idea that hash function are more resistant to quantum attacks (see Grover’s algorithm). Quantum cryptography means cryptographic algorithms running on quantum computers or based on quantum physics. | Post-quantum cryptography | Cryptographic protocols running on classical computers but being resistant to quantum attacks. | Quantum cryptography | Cryptographic protocols realized by quantum computers. Shor, Polynomial-Time Algorithms for Prime Factorization and](https://arxiv.org/abs/quant-ph/9508027%C2%A0)[Discrete Logarithms on a Quantum Computer](https://arxiv.org/abs/quant-ph/9508027%C2%A0),. Grover, A fast quantum mechanical algorithm for database](https://arxiv.org/abs/quant-ph/9605043%C2%A0).
R
research.google
research
https://research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantu…
[Jump to Content](https://research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/#page-content). * [Algorithms & Theory](https://research.google/research-areas/algorithms-and-theory/). * [Algorithms & Theory](https://research.google/research-areas/algorithms-and-theory/). * [Quantum Computing](https://research.google/research-areas/quantum-computing/). * [Quantum Computing](https://research.google/research-areas/quantum-computing/). * [Responsible AI](https://research.google/research-areas/responsible-ai/). * [Responsible AI](https://research.google/research-areas/responsible-ai/). * [Blog](https://research.google/blog/). 2. [Blog](https://research.google/blog/). * [](https://twitter.com/intent/tweet?text=https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/ "Share on Twitter"). * [](https://www.facebook.com/sharer/sharer.php?u=https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/ "Share on Facebook"). * [](https://www.linkedin.com/shareArticle?url=https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/&mini=true "Share on LinkedIn"). * [](mailto:name@example.com?subject=Check%20out%20this%20site&body=Check%20out%20https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/ "Send via Email"). [Google has led the responsible transition](https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/) to post-quantum cryptography [since 2016](https://security.googleblog.com/2016/07/experimenting-with-post-quantum.html). We look forward to [continuing our work across the industry](https://blog.google/innovation-and-ai/technology/safety-security/the-quantum-era-is-coming-are-we-ready-to-secure-it/) following our 2029 timeline alongside others working on responsible approaches, like Coinbase, the Stanford Institute for Blockchain Research, and the Ethereum Foundation. We estimate that these circuits can be executed on a superconducting qubit CRQC with fewer than 500,000 physical qubits in a few minutes, given standard assumptions about hardware capabilities that are consistent with some of [Google’s flagship quantum processors](https://blog.google/innovation-and-ai/technology/research/google-willow-quantum-chip/). * [Quantum](https://research.google/blog/label/quantum). * [](https://twitter.com/intent/tweet?text=https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/ "Share on Twitter"). * [](https://www.facebook.com/sharer/sharer.php?u=https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/ "Share on Facebook"). * [](https://www.linkedin.com/shareArticle?url=https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/&mini=true "Share on LinkedIn"). * [](mailto:name@example.com?subject=Check%20out%20this%20site&body=Check%20out%20https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/ "Send via Email"). * Algorithms & Theory · * Machine Intelligence](https://research.google/blog/building-better-ai-benchmarks-how-many-raters-are-enough/). .
A
arxiv.org
article
https://arxiv.org/abs/2105.01815
Some of these protocols, but not all, are open to quantum attacks. Here we analyze the major blockchain-based cryptocurrencies deployed today --
R
reddit.com
article
https://www.reddit.com/r/CryptoTechnology/comments/1q85i1u/quantum_computing_…
Quantum changes the game because it's not spray and pray anymore, it's targeted. Once public keys are exposed, the math itself becomes