The Quantum Computing Threat to Bitcoin Is Real -- and Coming Fast

0
1KB

The Quantum Computing Threat to Bitcoin Is Real -- and Coming Fast

Emma Newbery, The Motley Fool

6 min read

  • Quantum computing's development is advancing faster than many people expected.

  • It's only a matter of time before quantum computers are able to break the encryption on millions of Bitcoin addresses.

  • The crypto community must prepare for this impending security risk.

  • 10 stocks we like better than Bitcoin ›

Crypto investors are accustomed to volatility risk. You have to be when prices of coins regularly swing by 10% or more in mere days. Unfortunately, volatility is just one of several potential pitfalls of crypto investing. And sometimes, the short-term noise can make it easy to overlook the bigger, longer-term risks.

Quantum computing is one such long-term threat. Without delving too deeply into how these two complex technologies work, the issue is that if quantum computers become powerful enough, they will pose a significant threat to Bitcoin's (CRYPTO: BTC) security. If you're a buy-and-hold investor with an interest in crypto, this is an issue you need to have on your radar.

The crypto community thought they had decades before quantum computing became a pressing problem. However, a recent article on Decrypt, a news website focused on the decentralized web, says that experts are now worried that the industry has a decade, or maybe only a handful of years, to prepare. Moreover, around 4 million Bitcoins could be at risk right now.

To be clear, quantum computing is not going to break the cryptographic protection around people's wallets today. However, in 1994, a mathematician called Peter Shor published an algorithm that showed how a quantum computer, if it were powerful enough, could break the encryption standards commonly used nowadays.

It's all about how crypto keys work. Bitcoin and other cryptocurrencies use a system of public and private keys to authenticate transactions. Let's say I wanted to send you some Bitcoin. I would use your public key to make the transfer. You would then use your private key -- like the PIN to your bank card, only much, much longer -- to finalize the transaction.

Each public key is generated from the corresponding private key. Asymmetric cryptography makes it practically impossible to reverse-engineer a private key from a public one. Using classical computers -- the digital type with which we are all familiar -- the task would require a prohibitive amount of time and computing power. But it isn't impossible.

Quantum computers, though, use a different technology for solving problems, and for certain unusual uses, that method could be much faster. One of those potential uses is solving the type of problem that would derive a private key from a public one. And once someone knows your private key, they can then access or transfer your crypto.


Suche
Kategorien
Mehr lesen
Religion
Traveling Beyond: Egypt Explorations with New Acropolis India Part 2 – The Egyptian Temple as a Metaphor for Life
Traveling Beyond: Egypt Explorations with New Acropolis India Part 2 - The Egyptian Temple as a...
Von Mystic Queen 2025-06-11 21:31:03 0 1KB
Mysticism
Philosophy as psychedelic practice
Philosophy as psychedelic practice David J. Blacker’s recent Deeper Learning with...
Von Mystic Queen 2025-06-15 21:01:18 0 1KB
News
Nvidia stock jumps with record high in sight again
Nvidia stock jumps with record high in sight again Mon, Jun 16, 2025, 4:09 PM 1 min...
Von Mystic Queen 2025-06-18 03:44:37 0 1KB
News
Nvidia, HPE to build new supercomputer in Germany
Nvidia, HPE to build new supercomputer in Germany Stephen Nellis Tue, Jun 10, 2025,...
Von Mystic Queen 2025-06-11 05:00:09 0 1KB
News
This Was The Last Carbureted Engine Sold New In America
This Was The Last Carbureted Engine Sold New In AmericaAh yes, the carburetor. A humble device...
Von Mystic Queen 2025-06-23 05:00:19 0 1KB
AtoZ Buzz! Take Control of the narrative https://atozbuzz.com