Quantum is an emerging technology that follows the laws of
Quantum algorithms are algorithms that run on the model of quantum computation. These algorithms empower quantum computers to leverage the essential properties of quantum computation like quantum superposition, quantum entanglement, and quantum interference to perform fast computation. They can be classified into the types shown in the illustration below.
The types of quantum algorithms, sub-group findings, and amplitude amplification impact blockchains, so we will discuss them only in this answer.
Shor’s algorithm best represents the sub-group finding algorithms. This algorithm allows for solving the
Shor's algorithm threatens the current cryptography algorithms, which work at the core of the blockchains. Cryptographic algorithms like RSA, elliptic curve cryptography, and El-Gamal, which are widely in use today, rely on the difficulty of solving the integer factorization problem or discrete logarithm problem to provide security. Shor's algorithm's ability to solve these problems leaves these cryptographic algorithms vulnerable.
Grover’s algorithm best represents the amplitude amplification algorithms. These algorithms amplify the amplitude of the desired states of the qubits while reducing the amplitudes of the undesired states. This increases the probability of the correct state being returned during the quantum measurement of the system. These algorithms allow for a solution to be found in any search space of cardinality
Amplitude amplification algorithms impact blockchain, as most consensus algorithms rely on NP-complete problems to be solved to reach consensus. Grover’s algorithm allows an intruding party to complete the consensus process earlier than the miners, allowing them to tamper with transactions in transit.
Blockchain is a peer-to-peer network without a central authority. Nodes in the network are tasked with reaching a consensus on making changes to the ledger. In the absence of a central authority, blockchains use cryptographic techniques and consensus algorithms to oversee transactions and ensure security. Different blockchains use different consensus and cryptographic algorithms, but in this Answer, we will discuss the impact of quantum computers on bitcoin.
Bitcoin uses Proof of Work (POW) as the consensus algorithm and Elliptic Curve Digital Signature Algorithm (ECDSA) as the digital signature algorithm. Quantum computers can attack the bitcoin blockchain by exploiting the weakness of these algorithms. The attack can be classified into two types, storage attack and transit attack.
Storage attack occurs when the attacker gets access to the funds stored within a user’s wallet by generating the private key from the publicly available public key.
Bitcoin uses the ECDSA algorithm to sign the transactions and prove ownership of the tokens. Transactions are the transfer of bitcoin from one entity/wallet to another. Other entities use the wallet address generated by the public key to send bitcoin, but other entities can not access the funds in the wallet unless they own the private key. Public keys can be generated if the private key is given, but not vice versa.
ECDSA relies on the complexity of solving the Elliptic Curve Discrete Logarithm Problem (ECDLP) to find the private key corresponding to a public key. As discussed above, Shor’s algorithm can solve the discrete logarithm problem in polynomial time
During the transaction shown in the illustration above, user A wants to send User B
The public key of user A was publicly available when the transaction was initiated. This public key is now vulnerable to an attack using Shor's algorithm. To mitigate this and secure the
This security feature still leaves the private key vulnerable from the initiation of the transaction till it is committed to the bitcoin ledger. The waiting period for the transaction to be committed to the bitcoin ledger can exceed
A transit attack allows the attacker to manipulate a transaction in transit after it has been initiated and is pending addition to the bitcoin ledger. Grover's search algorithm, as discussed above, allows the attacker to perform the POW faster than the
Gaining a majority share in computing power than the whole network combined is a computationally expensive task and performing the POW before other miners leave less time for the attacker to perform the transit attack successfully. However, this is still possible, although not as likely as the storage attack.
Quantum computers represent a leap forward in the computing industry. They have many useful applications in healthcare, finance, and logistics. However, they come with certain challenges, too, involving cryptography and blockchain. In the post-quantum era, all the widely used cryptographic algorithms will be broken and need to be replaced with quantum-safe alternatives. This will also cause blockchains to shift to quantum-safe alternatives, some of which are already under consideration and development. However, as the situation currently stands, the quantum computers capable of breaking these algorithms are at least 10 to 15 years away.
Free Resources