visit
The biggest danger to Blockchain networks from quantum computing is its
ability to break traditional encryption.
Quantum computing is the area of study focused on developing computer
technology based on the principles of quantum theory. The quantum computer, following the laws of quantum physics, would gain enormous processing power through the ability to be in multiple states, and to perform tasks using all possible permutations simultaneously.
Superposition: Think of a qubit as an electron in a magnetic field. The
electron's spin may be either in alignment with the field, which is known as a spin-up state, or opposite to the field, which is known as a spin-down state.
According to quantum law, the particle enters a superposition of states, in
which it behaves as if it were in both states simultaneously. Each qubit
utilized could take a superposition of both 0 and 1.
Entanglement: Particles that have interacted at some point retain a
type of connection and can be entangled with each other in pairs, in a process known as correlation. Knowing the spin state of one entangled particle -up or down - allows one to know that the spin of its mate is in the opposite direction. Quantum entanglement allows qubits that are separated by incredible distances to interact with each other instantaneously (not limited to the speed of light).
No matter how great the distance between the correlated particles, they will remain entangled as long as they are isolated. Taken together, quantum superposition and entanglement create an enormously enhanced computing
power. Where a 2-bit register in an ordinary computer can store only one of four binary configurations (00, 01, 10, or 11) at any given time, a 2-qubit
register in a quantum computer can store all four numbers simultaneously, because each qubit represents two values. If more qubits are added, the increased capacity is expanded exponentially
Interference
During the computation phase of a quantum calculation, the slightest disturbance in a quantum system (say a stray photon or wave of EM radiation) causes the quantum computation to collapse, a process known as de-coherence. A quantum computer must be totally isolated from all external interference during the computation phase.
Error correction
Given the nature of quantum computing, error correction is
ultra-critical - even a single error in a calculation can cause the
validity of the entire computation to collapse.
Output observance
Closely related to the above two, retrieving output data after a quantum
calculation is complete risks corrupting the data.
What is Quantum Supremacy?
According to the Financial Times, Google claims to have successfully built the world’s most powerful quantum computer. What that means, according to Google’s researchers, is that calculations that normally take more than 10,000 years to perform, its computer was able to do in about 200 seconds, and potentially mean Blockchain, and the encryption that underpins it, could be broken.Asymmetric cryptography used in crypto relies on keypairs, namely a private and public key. Public keys can be calculated from their private counterpart, but not the other way around.This is due to the impossibility of certain mathematical problems. Quantum computers are more efficient in accomplishing this by magnitudes, and if the calculation is done the other way then the whole scheme breaks.It would appear Google is still some way away from building a quantum computer that could be a threat to Blockchain cryptography or other encryption.
"Google's supercomputer currently has 53 qubits," said Dragos Ilie, a quantum computing and encryption researcher at Imperial College London."In order to have any effect on bitcoin or most other financial systems it would take at least about 1500 qubits and the system must allow for the entanglement of all of them," Ilie said. Meanwhile, scaling quantum computers is "a huge challenge," according to Ilie. Blockchain networks including Bitcoin’s architecture relies on two algorithms: Elliptic Curve Digital Signature Algorithm (ECDSA) for digital signatures and SHA-256 as a hash function. A quantum computer could use Shor’s algorithm to get your private from your public key, but the most optimistic scientific estimates say that even if this were possible, it won’t happen during this decade.
“A 160-bit elliptic curve cryptographic key could be broken on a quantum computer using around 1000 qubits while factoring the security-wise equivalent 1024-bit RSA modulus would require 2000 qubits”.By comparison, Google's measly 53 qubits are still no match for this kind of cryptography. According to research paper on the matter published by Cornell University.But that isn’t to say that there’s no cause for alarm. While the native encryption algorithms used by Blockchain’s applications are safe for now, the fact is that the rate of advancements in quantum technology is increasing, and that could, in time, pose a threat. "We expect their computational power will continue to grow at a double exponential rate," Google researchers.
The word quantum itself refers to the most fundamental behavior of the smallest particles of matter and energy.Quantum cryptography is different from traditional cryptographic systems in that it relies more on physics, rather than mathematics, as a key aspect of its security model.Essentially, quantum cryptography is based on the usage of individual particles/waves of light (photon) and their intrinsic quantum properties to develop an unbreakable cryptosystem (because it is impossible to measure the quantum state of any system without disturbing that system.)Quantum cryptography uses photons to transmit a key. Once the key is transmitted, coding and encoding using the normal secret-key method can take place. But how does a photon become a key? How do you attach information to a photon's spin?This is where binary code comes into play. Each type of a photon's spin represents one piece of information -- usually a 1 or a 0, for binary code. This code uses strings of 1s and 0s to create a coherent message. For example, could correspond with h-e-l-l-o. So a binary code can be assigned to each photon -- for example, a photon that has a vertical spin ( | ) can be assigned a 1.
“If you build it correctly, no hacker can hack the system. The question is what it means to build it correctly,” said physicist Renato Renner from the Institute of Theoretical Physics in Zurich.Regular, non-quantum encryption can work in a variety of ways but generally a message is scrambled and can only be unscrambled using a secret key. The trick is to make sure that whomever you’re trying to hide your communication from doesn’t get their hands on your secret key. Cracking the private key in a modern crypto system would generally require figuring out the factors of a number that is the product of two insanely huge prime numbers.
The numbers are chosen to be so large that, with the given processing power of computers, it would take longer than the lifetime of the universe for an algorithm to factor their product.
Encryption techniques have their vulnerabilities. Certain products – called weak keys – happen to be easier to factor than others. Also, Moore’s Law continually ups the processing power of our computers. Even more importantly, mathematicians are constantly developing new
algorithms that allow for easier factorization.
Ahmed Banafa, Author the Books :
References:
//www.forbes.com/sites/billybambrough/2019/10/02/could-google-be-about-to-break-bitcoin/#1d78c5373329//decrypt.co/9642/what-google-quantum-computer-means-for-bitcoin///www.coindesk.com/how-should-crypto-prepare-for-googles-quantum-supremacy?