bitcoin
bitcoin

$83571.608249 USD

-1.38%

ethereum
ethereum

$1826.028236 USD

-3.02%

tether
tether

$0.999839 USD

-0.01%

xrp
xrp

$2.053149 USD

-2.48%

bnb
bnb

$601.140115 USD

-0.44%

solana
solana

$120.357332 USD

-3.79%

usd-coin
usd-coin

$0.999833 USD

-0.02%

dogecoin
dogecoin

$0.166175 USD

-3.43%

cardano
cardano

$0.652521 USD

-3.00%

tron
tron

$0.236809 USD

-0.59%

toncoin
toncoin

$3.785339 USD

-5.02%

chainlink
chainlink

$13.253231 USD

-3.91%

unus-sed-leo
unus-sed-leo

$9.397427 USD

-0.19%

stellar
stellar

$0.266444 USD

-1.00%

sui
sui

$2.409007 USD

1.15%

Cryptocurrency News Video

Tracking: Bitcoin Could Be Cracked by Google’s Quantum Computer in 2-5 Years? |Wall Street Controversy

Dec 15, 2024 at 01:25 am 華爾街電視

Tracking: Bitcoin Could Be Cracked by Google’s Quantum Computer in 2-5 Years? Chamath Palihapitiya believes that Bitcoin may be cracked by Google's Willow chip in 2-5 years, and the blockchain must re-implement a new hash algorithm in the next 2-5 years. Chamath Palihapitiya is a Canadian-American venture capitalist, engineer, and entrepreneur known for his outspoken nature and insight into technology trends. The China Research Institute conducts comprehensive and scientific in-depth analysis and reasoning on the current development status of quantum computing and the security mechanism of Bitcoin. At the same time, the topics raised by Chamath Palihapitiya will be examined in a broader technology and industry context. The potential threat of quantum computing to Bitcoin The reason why quantum computers are considered a potential threat to blockchain cryptographic mechanisms such as Bitcoin is that they have the ability to run specific quantum algorithms (such as Shor's algorithm), thus theoretically being far superior to Crack certain types of public-key cryptography at speeds faster than those of a classical computer. The core cryptographic components that Bitcoin currently relies on are: 1. Hash function (SHA-256): used for Proof of Work and the hashing process to generate addresses. This part mainly deals with collision and preimage attacks. From the perspective of quantum computing, Grover's algorithm can speed up hash collision search, but it can only reduce the search difficulty from the classic O(2^n/2) to O(2^(n/2)), which is not the case for Bitcoin. Mining difficulty and overall security impact are still limited. 2. Elliptic Curve Digital Signature Algorithm (ECDSA): a public and private key system used to sign and verify transactions. Shor's algorithm can decompose large integers and find discrete logarithms in polynomial time, which poses a real potential threat to Bitcoin's elliptic curve-based encryption algorithm. Once the public key is exposed (a typical situation is when a user initiates a transaction), in the face of a sufficiently powerful quantum computer, the private key may be quickly deduced, resulting in serious security issues of stolen funds. Feasibility analysis of being cracked by Google’s quantum computer Willow chip within 2-5 years
Video source:Youtube

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other videos published on Apr 04, 2025