BlockChain News

Cointelegraph Bitcoin and Ethereum Blockchain News

What is the Q-Day Award?

The Q-Day Challing Award is a challenge to make the Bitcoin network resistant.

On April 16, 2025, the company’s 11 -focused company project announced “11”Prize Q-Day,, “Contest to break” game version of Bitcoin encryption with quantum computer. The contestants must complete Prize Challenge Q-Day By April 5, 2026.

Their reward? 1 bitcoin (BTC).

“Q” in Q-Day refers to QuantumThe potential threat to many current encryption security measures.

But can quantum computers break bitcoin? Let’s discover.

Quantum computing and threat to Bitcoin

Bitcoin is used Sha-256 retail algorithmNational Security Agency (NSA)-developed encryption algorithm. Sha-256 prevents Brute Bitcoin attacks, as deciphering them with current devices may take decades. However, the emerging threat to Sha-256 is QuantumA way for computing that mocks quantum physics and is much faster than traditional computing.

On the basic level, quantum computing uses quantum bits (Qubits), which can be found in multiple cases. This contradicts the bilateral (traditional) computing, which uses bilateral bits (1S and 0S). In 1994, mathematics, Peter Shore, presented a quantum computers to solve complex algorithms in seconds, instead of contracts that can take it for traditional devices. At that time, no devices can operate effectively, however Recent developments such as Google Willow They approach this ability.

Quantum computing, when it is pairing with the Shor algorithm, Bitcoin encryption systems can be disrupted as we know. The Shor algorithm allows quantum computers to solve complex mathematics quickly, which may threaten the safety of bitcoin.

Do you know? If Quantum Tech becomes strong enough, the current Bitcoin safety may become ancient, so developers are racing to create “quantitative resistant” shields using new mathematics that Shor’s algorithm cannot break.

Bitcoin quantum: How dangerous is the risk?

Bitcoin is vulnerable to quantum computing, but how dangerous risk?

When creating a file Check walletHe generates two important things: a The private key and a public key. The private key is a secret symbol, like the password, which you should keep safe. The public key is created from your key, and your wallet address (such as the bank account number) is manufactured from the public key.

You can share your wallet title with others so that they can send an encrypted currency for you, just like sharing your person’s email address to contact you. However, you never share your own key. It is like the password to your email – you just need to reach money and spend it in your portfolio.

for you The private key It is similar to the main password that controls the encryption wallet. From this private key, your wallet can create many public keys, and every public key creates a portfolio address.

For example, if you use a Hardware walletIt has one special key, but it can create unlimited public keys (wallet addresses). This means that you can get different addresses for each encrypted currency supported by the wallet or even multiple addresses of the same encrypted currency, all run by one special key.

While creating a public key from the private key is clear and direct, the discovery of a special key from a public key is very difficult – almost impossible – which makes your wallet safe. Every time you send the encoded currency, your key creates a special code called signature. This signature proves that you have the money and want to send it. The system that uses the private key and the public key and signature to secure the transactions is called the ECDSA.

It is believed that quantum computing can reflect the process and create special keys from public keys. It is afraid that this will cause many bitcoin holders (especially whales and Governor of Satoshi Asr) To lose their money.

Types of bitcoin and quantum risks

When you send Bitcoin, you can use a specific address type to guide the payment. Each type contains unique features, which affects safety, privacy and weakness of quantum computing attacks such as Shor algorithm.

Types of P2PK addresses

When you pay someone with Bitcoin, the transaction is usually the “Payment Facial” (P2PK). This was the most common way to pay in 2009, according to a report From Deloitte Consulting Company.

A large part of the original Bitcoin is held in the launch of the network in a wallet with the type of P2PK address, due primarily to the fact that they have sent transactions since the launch of Bitcoin 2009. These titles are long (up to 130 characters), making them less easy to use.

The portfolio containing the type P2PK address is more likely to the Shor algorithm, where it can immerse the private key from A. P2PK wallet address.

Types of p2Pkh addresses

There is a type of second -resistant second -resistant address for the Shorian algorithm: P2PKH. P2Pkh addresses are shorter and created from retail (unique and hexagonal value) for a public key created using the Sha-256 and Ripems-1660 instead of displaying the full key itself.

These titles are shorter (33-34 letters), starting with “1”, and are coded in Base58 format. These addresses are widely used and include a Chikoms to prevent typographical errorsWhich makes it more reliable.

P2PKH addresses are more resistant to the Shor P2PK algorithm because the public key is segmentation. The public key is only detected when spent from the address (not upon receipt). If the P2PKH title is never sent Bitcoin, its general key will remain hidden, providing better protection against quantum attacks.

However, the reuse of the P2Pkh address (sending it several times) displays the public key, which increases weakness. Also, when you spend from the P2Pkh address, the public key becomes visible on Blockchain, which makes tracker transactions.

Taproot addresses

Taproot is the latest type of addressIt was presented in November 2021 via Taproot Soft. SCNORR signatures are used instead of ECDSA signatures used by P2PK and P2PKH. These titles begin with “BC1P”, using Bech32M coding, with a length of 62 letters.

It provides better privacy. Multisig transactions such as single signature transactions, and hiding complex spending conditions. However, Taproot addresses are displayed the public key (or modification version), making it vulnerable to the Shor algorithm, similar to P2PK.

Do you know? “Willow” from Google Computer chip I am able to solve a complex problem in just five minutes. The same task will take a year of classic computers 10 Septillion (!).

The race for bitcoin resistant to quantity

Quantitative resistance is a real challenge, but not impossible.

Poor devices, which are still in early development, can use a SHOR algorithm one day to break the encryption in Bitcoin by extracting special keys from public keys. This would threaten bitcoin and other systems using Sha-256 or ECDSA (algorithms that secure bitcoin transactions). However, this threat is not imminent, and solutions are already progressing.

While some believe that the project 11 presented the Bitcoin Bitco Award, the company claims that this initiative aims to “enhance the quantity” on the network.

In July 2022, the National Institute for Standards and Technology of the US Department of Trade (NIST) Declare Four of the quantitative coding algorithms resulting from a six -year challenge to develop such solutions.

Quantum computing will not develop in isolation, and central systems such as government networks and financial networks may be greater goals than the decentralized Bolockchain in Bitcoin. These systems use an old encryption, such as RSA, vulnerable to Shor algorithm, storing sensitive data (for example, banking records). Their individual failure points make violations easier than attacking the contract distributed to Bitcoin.

International Monetary Fund Warn Quantum computers can disable banking services via mobile phone, while Dr. Michel Muska is from the Institute of Quantum Computing High The risks of “harvest-decrypt-Later” for central data (where attackers store the encrypted data today to decode it with future quantum computers). In 2024, the G7 Cyber ​​Expert team urged financial institutions Restricting The quantum risks, noting that the central systems data can be detected if it is now intercepted and deciphered later.

Do you know? Several Blockchain networks explore quantitative algorithms, such as the book of the quantitative or algorithm professor. These are quantum computing safety methods that represent a few different methods.

How to increase your security against quantum threats

While the risks of the quantum computing currency are less threatening than one may think, it is better to remain ready.

However, if you are worried Bitcoin quantity vulnerabilityThere are some precautions that you can take to secure your encryption affairs.

  • Avoid reusing public titles: Most encryption portfolios allow you to create a new general address for each transaction. This practice will make it difficult to track your spending habits.
  • Transferring money to a private portfolio: If you use the same overall title for some time, think about moving your money to a new portfolio without date. This will help keep your habits in private spending.
  • Use different Blockchain network: Old networks such as Bitcoin and Ethereum are less resistant to quantitatives than newer networks with more modern safety algorithms. Consider alternative networks, taking into account quantum resistance.
  • Keep aware: Pay attention to the results of the Q-Day challenge, and stay in view of quantum computing news so that you can respond accordingly. The best defense is one enlightened.

Although the quantum risks are not immediate, the developers and cyber security experts are actively working on solutions to ensure long -term security. Meanwhile, users should remain permanently informed about bitcoin protocol updates and best practices, such as avoiding the re -use of the address, as the network moves gradually towards quantum resistance.

https://images.cointelegraph.com/cdn-cgi/image/format=auto,onerror=redirect,quality=90,width=1200/https://s3.cointelegraph.com/storage/uploads/view/6259d082e83d20491f43075c38d970ea.png

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button