8 results · ● Live web index
sciencedirect.com article

Vulnerability of blockchain technologies to quantum attacks

https://www.sciencedirect.com/science/article/pii/S2590005621000138

## Array. Volume 10, July 2021, 100065. # Vulnerability of blockchain technologies to quantum attacks. Author links open overlay panel,. https://doi.org/10.1016/j.array.2021.100065Get rights and content. Under a Creative Commons license. ## Abstract. Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048. Blockchain technologies rely on cryptographic protocols for many of their essential sub-routines. Some of these protocols, but not all, are open to quantum attacks. Here we analyze the major blockchain-based cryptocurrencies deployed today—including Bitcoin, Ethereum, Litecoin and ZCash, and determine their risk exposure to quantum attacks. We finish with a comparative analysis of the studied cryptocurrencies and their underlying blockchain technologies and their relative levels of vulnerability to quantum attacks. ## Keywords. ## Cited by (0).

Visit
thequantuminsider.com article

Blockchain And Quantum Computing Are on a Collision Course

https://thequantuminsider.com/2024/09/08/blockchain-and-quantum-computing-are…

# Blockchain And Quantum Computing Are on a Collision Course, Expert Warns. ## When Blockchain Meets Quantum Computing. Herman, Senior Fellow at the Hudson Institute and Director of the Quantum Alliance Initiative, writes that the same technology that could unlock immense computational power might also render existing cryptographic systems, including those that secure blockchain networks, vulnerable to attacks. ## Can Quantum Computing Break Blockchain? Herman’s analysis highlights the inherent risks quantum computing poses to blockchain and cryptocurrencies. ## **The Quantum Threat to Blockchain Security**. “In short, blockchains that use the same cryptographic building blocks as other forms of DLT will be just as much at risk to the quantum computer threat as other digital technologies,” Herman writes. These quantum-resistant algorithms are designed to withstand attacks from quantum computers, making them a crucial component in the next generation of blockchain security. Looking ahead, Herman suggests that a coordinated approach integrating crypto, blockchain and quantum technologies could inaugurate a new era in finance and digital security.

Visit
mpra.ub.uni-muenchen.de article

Quantum Computing and Blockchain Security: A Critical Assessment of Cryptographic Vulnerabilities and Post-Quantum Migration Strategies Munich Personal RePEc Archive

https://mpra.ub.uni-muenchen.de/127528/

# Quantum Computing and Blockchain Security: A Critical Assessment of Cryptographic Vulnerabilities and Post-Quantum Migration Strategies. *Quantum Computing and Blockchain Security: A Critical Assessment of Cryptographic Vulnerabilities and Post-Quantum Migration Strategies.*. This paper examines the growing threat that quantum computing presents to blockchain security. Core blockchain cryptographic frameworks, specifically the Elliptic Curve Digital Signature Algorithm and the Secure Hash Algorithm 256, are vulnerable to quantum algorithms. This paper examines the growing threat that quantum computing presents to blockchain security. Core blockchain cryptographic frameworks, specifically the Elliptic Curve Digital Signature Algorithm and the Secure Hash Algorithm 256, are vulnerable to quantum algorithms. | Original Title: | Quantum Computing and Blockchain Security: A Critical Assessment of Cryptographic Vulnerabilities and Post-Quantum Migration Strategies |. | English Title: | Quantum Computing and Blockchain Security: A Critical Assessment of Cryptographic Vulnerabilities and Post-Quantum Migration Strategies |. | Keywords: | Quantum Computing, Blockchain Security, Post-Quantum Cryptography, Shor’s Algorithm, Grover’s Algorithm, Cryptographic Vulnerability |.

Visit
deloitte.com article

Quantum computers and the Bitcoin blockchain - Deloitte

https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-…

* [Who we are](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Purpose & Values](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html). * [What we do](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Digital innovation](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Alliances](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Our Thinking](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industry thinking](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Who we are](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Main menu](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Who we are](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html). * [Purpose & Values](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Who we are](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Who we are](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html). * [What we do](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Main menu](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [What we do](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html). * [What we do](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Customer](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Legal](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Deloitte Private](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Enterprise Technology & Performance](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [What we do](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Government & Public Services](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Industries](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Digital innovation](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [What we do](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Alliances](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [What we do](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Our Thinking](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Main menu](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Our Thinking](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html). * [Industry thinking](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Our Thinking](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [Main menu](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). [Main Menu](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). ![Image 22](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). * [](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). ![Image 27](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html). [Update analytics and performance](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html#). ![Image 32](https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html).

Visit
lfdecentralizedtrust.org article

Quantum threat of blockchain and cryptographic systems

https://www.lfdecentralizedtrust.org/quantum-threat-of-blockchain-and-cryptog…

[](https://www.lfdecentralizedtrust.org/quantum-threat-of-blockchain-and-cryptographic-systems#search-popup). * [Cryptographic tools & protocols](https://www.lfdecentralizedtrust.org/projects/tag/cryptographic-tools-protocols). Even if quantum bits can be much faster than classical computers, building real life or sometimes even theoretical quantum algorithms can be pretty challenging. Quantum computers are expected to be better in solving different optimization and simulation problems than competing with classical computers in running traditional algorithms faster. * **_-Post-quantum cryptography_** tries to invent new cryptographic technologies that can be run on classical computers but are vulnerable to quantum attacks, like the Shor’s or Grover’s algorithm. * _Hash-based cryptography_: creates digital signature algorithms based on cryptographic hash functions, exploiting the idea that hash function are more resistant to quantum attacks (see Grover’s algorithm). Quantum cryptography means cryptographic algorithms running on quantum computers or based on quantum physics. | Post-quantum cryptography | Cryptographic protocols running on classical computers but being resistant to quantum attacks. | Quantum cryptography | Cryptographic protocols realized by quantum computers. Shor, Polynomial-Time Algorithms for Prime Factorization and](https://arxiv.org/abs/quant-ph/9508027%C2%A0)[Discrete Logarithms on a Quantum Computer](https://arxiv.org/abs/quant-ph/9508027%C2%A0),. Grover, A fast quantum mechanical algorithm for database](https://arxiv.org/abs/quant-ph/9605043%C2%A0).

Visit
research.google research

Safeguarding cryptocurrency by disclosing quantum vulnerabilities ...

https://research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantu…

[Jump to Content](https://research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/#page-content). * [Algorithms & Theory](https://research.google/research-areas/algorithms-and-theory/). * [Algorithms & Theory](https://research.google/research-areas/algorithms-and-theory/). * [Quantum Computing](https://research.google/research-areas/quantum-computing/). * [Quantum Computing](https://research.google/research-areas/quantum-computing/). * [Responsible AI](https://research.google/research-areas/responsible-ai/). * [Responsible AI](https://research.google/research-areas/responsible-ai/). * [Blog](https://research.google/blog/). 2. [Blog](https://research.google/blog/). * [](https://twitter.com/intent/tweet?text=https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/ "Share on Twitter"). * [](https://www.facebook.com/sharer/sharer.php?u=https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/ "Share on Facebook"). * [](https://www.linkedin.com/shareArticle?url=https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/&mini=true "Share on LinkedIn"). * [](mailto:name@example.com?subject=Check%20out%20this%20site&body=Check%20out%20https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/ "Send via Email"). [Google has led the responsible transition](https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/) to post-quantum cryptography [since 2016](https://security.googleblog.com/2016/07/experimenting-with-post-quantum.html). We look forward to [continuing our work across the industry](https://blog.google/innovation-and-ai/technology/safety-security/the-quantum-era-is-coming-are-we-ready-to-secure-it/) following our 2029 timeline alongside others working on responsible approaches, like Coinbase, the Stanford Institute for Blockchain Research, and the Ethereum Foundation. We estimate that these circuits can be executed on a superconducting qubit CRQC with fewer than 500,000 physical qubits in a few minutes, given standard assumptions about hardware capabilities that are consistent with some of [Google’s flagship quantum processors](https://blog.google/innovation-and-ai/technology/research/google-willow-quantum-chip/). * [Quantum](https://research.google/blog/label/quantum). * [](https://twitter.com/intent/tweet?text=https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/ "Share on Twitter"). * [](https://www.facebook.com/sharer/sharer.php?u=https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/ "Share on Facebook"). * [](https://www.linkedin.com/shareArticle?url=https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/&mini=true "Share on LinkedIn"). * [](mailto:name@example.com?subject=Check%20out%20this%20site&body=Check%20out%20https%3A//research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/ "Send via Email"). * Algorithms & Theory · * Machine Intelligence](https://research.google/blog/building-better-ai-benchmarks-how-many-raters-are-enough/). ![Image 5](https://research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/).

Visit