Recently recorded in the field of quantum computers, this technology is Bitcoin $103,918.75 He brought up the discussions on his possible effects. The newly released report is elaborated on the status of existing quantum computers, threats to Bitcoin and ways to watch. The report emphasizes the importance of taking timely measures to minimize the risks that the Bitcoin ecosystem may face in the coming years.
Double -way strategy for preparation for quantum period
A two -stage action plan is proposed to increase Bitcoin’s resistance to quantum computers. The first path envisages the long -term and comprehensive adaptation process and is expected to spread over a seven -year period. The second way aims to move rapidly in case of sudden quantum computer breakthroughs and involves emergency measures that can be implemented within two years. In both cases, it is stated that the funds that are carefully managed and not repetition of addresses are relatively safe for now, but additional infrastructure will be required for long -term protection.
The report states that the US National Standards and Technology Institute (NIST) proposes the abandonment of classic encryption methods by 2030, and until 2035, all systems be transferred to post -quantum post -quantum algorithms. It is stated that similar studies are carried out in countries such as the European Union, China and the United Kingdom, while major technology companies started the transition process with hybrid cryptography systems.
Quantum computers’ threats to Bitcoin
In the study, quantum computers may threaten Bitcoin at two main points: mining and processing. In mining, actors using large -scale central quantum equipment may provide advantage, which can increase the risk of centralization. However, common systems such as ECDSA in signature algorithms may become broken with quantum computers. In this case, the attackers can derive special switches from the open switches in the publication and seize funds.
It is emphasized that approximately 6.51 million Bitcoin (32.7 %of the current supply), which has certain address types in the Bitcoin network and repetition, is now vulnerable and has a potentially high financial risk. In some types of addresses, when the funds are spent, the open switches become more open to attacks because they appear permanently on the chain.
Challenges of the transition process and philosophical debates
After quantum, it has been said that there has been research on secure signature algorithms for many years and some protocols such as SPHINCS+, Falcon come to the fore. However, performance problems, such as the key and signature dimensions of these methods are seriously large and the prolongation of verification times are underlined. In addition, it is stated that these systems have not yet offered all functions provided by existing algorithms, especially in applications such as Lightning Network.
Various strategies are being discussed on address solutions and transporting UTXOs to quantum safe formats. In this process, it is stated that chain rules should be changed, for example, soft biflings should be made. It is noted that a comprehensive transition will be technically and practical.
Within the framework of Bitcoin’s basic philosophy, a dilemma emerges. The community has to decide whether the funds under the threat of quantum are completely burned (burn) or to allow those who access their quantum computers to get into their hands. This decision may have significant consequences associated with Bitcoin’s basic principles, such as user sovereignty and censorship resistance.
Bitcoin ecosystem is recommended to avoid address repetition and raise awareness in the near term on issues such as the management of open switches on the chain. Experts emphasize the necessity of following developments carefully and taking proactive measures until the post -quantum encryption standards mature and become widespread all over the world.
Although it is not possible to take place in the near term, it is recommended to take a quick and conscious action for Bitcoin’s long -term security. With its technical, economic and philosophical dimensions, the preparation process for quantum computers can be shaped by community participation and transparent decision -making practices. Bitcoin owners, addresses and funds to avoid repetition of repetition to increase the safety of address and to follow up -to -date applications in the transition to new security standards will be useful.
Responsibility Rejection: The information contained in this article does not contain investment advice. Investors should be aware that crypto currencies carry high volatility and thus risk and carry out their operations in line with their own research.