The Quantum Computing Threat to Bitcoin Is Real -- and Coming Fast

0
1K

The Quantum Computing Threat to Bitcoin Is Real -- and Coming Fast

Emma Newbery, The Motley Fool

6 min read

  • Quantum computing's development is advancing faster than many people expected.

  • It's only a matter of time before quantum computers are able to break the encryption on millions of Bitcoin addresses.

  • The crypto community must prepare for this impending security risk.

  • 10 stocks we like better than Bitcoin ›

Crypto investors are accustomed to volatility risk. You have to be when prices of coins regularly swing by 10% or more in mere days. Unfortunately, volatility is just one of several potential pitfalls of crypto investing. And sometimes, the short-term noise can make it easy to overlook the bigger, longer-term risks.

Quantum computing is one such long-term threat. Without delving too deeply into how these two complex technologies work, the issue is that if quantum computers become powerful enough, they will pose a significant threat to Bitcoin's (CRYPTO: BTC) security. If you're a buy-and-hold investor with an interest in crypto, this is an issue you need to have on your radar.

The crypto community thought they had decades before quantum computing became a pressing problem. However, a recent article on Decrypt, a news website focused on the decentralized web, says that experts are now worried that the industry has a decade, or maybe only a handful of years, to prepare. Moreover, around 4 million Bitcoins could be at risk right now.

To be clear, quantum computing is not going to break the cryptographic protection around people's wallets today. However, in 1994, a mathematician called Peter Shor published an algorithm that showed how a quantum computer, if it were powerful enough, could break the encryption standards commonly used nowadays.

It's all about how crypto keys work. Bitcoin and other cryptocurrencies use a system of public and private keys to authenticate transactions. Let's say I wanted to send you some Bitcoin. I would use your public key to make the transfer. You would then use your private key -- like the PIN to your bank card, only much, much longer -- to finalize the transaction.

Each public key is generated from the corresponding private key. Asymmetric cryptography makes it practically impossible to reverse-engineer a private key from a public one. Using classical computers -- the digital type with which we are all familiar -- the task would require a prohibitive amount of time and computing power. But it isn't impossible.

Quantum computers, though, use a different technology for solving problems, and for certain unusual uses, that method could be much faster. One of those potential uses is solving the type of problem that would derive a private key from a public one. And once someone knows your private key, they can then access or transfer your crypto.


Search
Categories
Read More
Health
Diabetic patients taking GLP-1s may face increased risk of eye disease, study suggests
Diabetic patients taking GLP-1s may face increased risk of eye disease, study suggests NEWYou can...
By Mystic Queen 2025-06-24 05:00:07 0 1K
Fitness
The benefits of good sleep for exercise and fitness
The benefits of good sleep for exercise and fitnessYou don’t grow in the gym; you grow in...
By AtoZBuzz 2025-06-01 07:17:54 0 2K
Mysticism
EUTHYPHRO: EXAMPLES OF SOCRATIC METHOD, Part 1
EUTHYPHRO: EXAMPLES OF SOCRATIC METHOD, Part 1 Part 1 Examples are not Definitions Plato sets...
By Mystic Queen 2025-06-15 21:06:33 0 2K
News
Sourdough vs. Whole Wheat: Nutrition Experts Reveal Which Bread Is Healthier
Sourdough vs. Whole Wheat: Nutrition Experts Reveal Which Bread Is HealthierKey...
By Mystic Queen 2025-06-17 04:23:15 0 1K
Literature
The Joy of Discipline
The Joy of Discipline - New Acropolis Library Article By Zarina Screwvala...
By Mystic Queen 2025-06-11 21:33:09 0 1K
AtoZ Buzz! Take Control of the narrative https://atozbuzz.com