{"id":2182,"date":"2020-01-08T02:58:24","date_gmt":"2020-01-08T02:58:24","guid":{"rendered":"http:\/\/kusuaks7\/?p=1787"},"modified":"2024-01-30T05:44:03","modified_gmt":"2024-01-30T05:44:03","slug":"quantum-computing-and-blockchain-facts-and-myths","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/fintech\/quantum-computing-and-blockchain-facts-and-myths\/","title":{"rendered":"Quantum Computing and Blockchain: Facts and Myths"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2182\" class=\"elementor elementor-2182\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-528b8215 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"528b8215\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-38dae38e\" data-id=\"38dae38e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e54a8b7 elementor-widget elementor-widget-text-editor\" data-id=\"4e54a8b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe biggest danger to Blockchain networks from quantum computing is its ability to break traditional encryption [3].\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1a7e23 elementor-widget elementor-widget-text-editor\" data-id=\"d1a7e23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tGoogle sent shock waves around the internet when it was claimed, had built a quantum computer able to solve formerly impossible mathematical calculations\u2013with some fearing crypto industry could be at risk [7]. Google states that its experiment is the first experimental challenge against the\u00a0<em>extended Church-Turing thesis<\/em>\u00a0\u2014 also known as computability thesis \u2014 which claims that traditional computers can effectively carry out any \u201creasonable\u201d model of computation\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82e6413 elementor-widget elementor-widget-heading\" data-id=\"82e6413\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>What is Quantum Computing?<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d31e8f elementor-widget elementor-widget-text-editor\" data-id=\"2d31e8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<em>Quantum computing<\/em>\u00a0is the area of study focused on developing computer technology based on the principles of quantum theory. The quantum computer, following the laws of quantum physics, would gain enormous processing power through the ability to be in multiple states, and to perform tasks using all possible permutations simultaneously [5].<em>Quantum computing<\/em>\u00a0is the area of study focused on developing computer technology based on the principles of quantum theory. The quantum computer, following the laws of quantum physics, would gain enormous processing power through the ability to be in multiple states, and to perform tasks using all possible permutations simultaneously [5].\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c70ffe elementor-widget elementor-widget-heading\" data-id=\"5c70ffe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>A Comparison of Classical and Quantum Computing<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7e5b09 elementor-widget elementor-widget-text-editor\" data-id=\"f7e5b09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tClassical computing relies, at its ultimate level, on principles expressed by Boolean algebra. Data must be processed in an exclusive binary state at any point in time or bits. While the time that each transistor or capacitor need be either in 0 or 1 before switching states is now measurable in billionths of a second, there is still a limit as to how quickly these devices can be made to switch state. As we progress to smaller and faster circuits, we begin to reach the physical limits of materials and the threshold for classical laws of physics to apply. Beyond this, the quantum world takes over. In a quantum computer, a number of elemental particles such as electrons or photons can be used with either their\u00a0<em>charge\u00a0<\/em>or\u00a0<em>polarization\u00a0<\/em>acting as a representation of 0 and\/or 1. Each of these particles is known as a quantum bit, or\u00a0<em>qubit<\/em>, the nature and behavior of these particles form the basis of quantum computing [5].\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee33f52 elementor-widget elementor-widget-heading\" data-id=\"ee33f52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h3><strong>Quantum Superposition and Entanglement<\/strong><\/h3><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fc472a elementor-widget elementor-widget-text-editor\" data-id=\"4fc472a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe two most relevant aspects of quantum physics are the principles of\u00a0<em>superposition\u00a0<\/em>and\u00a0<em>entanglement<\/em>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d53232e elementor-widget elementor-widget-text-editor\" data-id=\"d53232e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<em>Superposition<\/em>: Think of a qubit as an electron in a magnetic field. The electron&#8217;s spin may be either in alignment with the field, which is known as a spin-up state, or opposite to the field, which is known as a spin-down state. According to quantum law, the particle enters a superposition of states, in which it behaves as if it were in both states simultaneously. Each qubit utilized could take a superposition of both 0 and 1.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f2357e elementor-widget elementor-widget-text-editor\" data-id=\"6f2357e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<em>Entanglement:<\/em>\u00a0Particles that have interacted at some point retain a type of connection and can be entangled with each other in pairs, in a process known as\u00a0<em>correlation<\/em>. Knowing the spin state of one entangled particle &#8211; up or down &#8211; allows one to know that the spin of its mate is in the opposite direction. Quantum entanglement allows qubits that are separated by incredible distances to interact with each other instantaneously (not limited to the speed of light). No matter how great the distance between the correlated particles, they will remain entangled as long as they are isolated. Taken together, quantum superposition and entanglement create an enormously enhanced computing power. Where a 2-bit register in an ordinary computer can store only one of four binary configurations (00, 01, 10, or 11) at any given time, a 2-qubit register in a quantum computer can store all four numbers\u00a0<em>simultaneously<\/em>, because each qubit represents two values. If more qubits are added, the increased capacity is expanded exponentially [5].\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-567769d elementor-widget elementor-widget-heading\" data-id=\"567769d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>Difficulties with Quantum Computers<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb07e7a elementor-widget elementor-widget-text-editor\" data-id=\"eb07e7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>Interference<\/strong>\u00a0&#8211; During the computation phase of a quantum calculation, the slightest disturbance in a quantum system (say a stray photon or wave of EM radiation) causes the quantum computation to collapse, a process known as\u00a0<em>de-coherence<\/em>. A quantum computer must be totally isolated from all external interference during the computation phase.<\/li>\n \t<li><strong>Error correction<\/strong>\u00a0&#8211; Given the nature of quantum computing, error correction is ultra-critical &#8211; even a single error in a calculation can cause the validity of the entire computation to collapse.<\/li>\n \t<li><strong>Output observance<\/strong>\u00a0&#8211; Closely related to the above two, retrieving output data after a quantum calculation is complete risks corrupting the data.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47c13aa elementor-widget elementor-widget-heading\" data-id=\"47c13aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>What is Quantum Supremacy?<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-451a700 elementor-widget elementor-widget-text-editor\" data-id=\"451a700\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAccording to the\u00a0<em>Financial Times<\/em>, Google claims to have successfully built the world\u2019s most powerful quantum computer [7]. What that means, according to Google\u2019s researchers, is that calculations that normally take more than 10,000 years to perform, its computer was able to do in about\u00a0<em>200 seconds<\/em>, and potentially mean Blockchain, and the encryption that underpins it, could be broken.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-661e6cc elementor-widget elementor-widget-text-editor\" data-id=\"661e6cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAsymmetric cryptography used in crypto relies on key pairs, namely a private and public key. Public keys can be calculated from their private counterpart, but<em>\u00a0not<\/em>\u00a0the other way around. This is due to the impossibility of certain mathematical problems. Quantum computers are more efficient in accomplishing this by magnitudes, and if the calculation is done the other way then the whole scheme breaks [3].\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a0ed49 elementor-widget elementor-widget-text-editor\" data-id=\"6a0ed49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIt would appear Google is still some way away from building a quantum computer that could be a threat to Blockchain cryptography or other encryption.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2669485 elementor-widget elementor-widget-text-editor\" data-id=\"2669485\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n&#8220;Google&#8217;s supercomputer currently has 53 qubits,&#8221; said Dragos Ilie, a quantum computing and encryption researcher at Imperial College London.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd40430 elementor-widget elementor-widget-text-editor\" data-id=\"cd40430\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t&#8220;In order to have any effect on bitcoin or most other financial systems it would take at least about 1500 qubits and the system must allow for the entanglement of all of them,&#8221; Ilie said.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7865c52 elementor-widget elementor-widget-text-editor\" data-id=\"7865c52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMeanwhile, scaling quantum computers is &#8220;a huge challenge,&#8221; according to Ilie [1].\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3facc2 elementor-widget elementor-widget-text-editor\" data-id=\"a3facc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBlockchain networks including Bitcoin\u2019s architecture relies on two algorithms: Elliptic Curve Digital Signature Algorithm (ECDSA) for digital signatures and SHA-256 as a hash function. A quantum computer could use Shor\u2019s algorithm [8] to get your private from your public key, but the most optimistic scientific estimates say that even if this were possible, it won\u2019t happen during this decade.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b29ed2 elementor-widget elementor-widget-text-editor\" data-id=\"4b29ed2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n\u201cA 160 bit elliptic curve cryptographic key could be broken on a quantum computer using around\u00a0<em>1000 qubits<\/em>\u00a0while factoring the security-wise equivalent 1024 bit RSA modulus would require about\u00a0<em>2000 qubits<\/em>\u201d. By comparison, Google&#8217;s measly 53 qubits are still no match for this kind of cryptography. According to research paper on the matter published by Cornell University.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d32eac7 elementor-widget elementor-widget-text-editor\" data-id=\"d32eac7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBut that isn\u2019t to say that there\u2019s no cause for alarm. While the native encryption algorithms used by Blockchain\u2019s applications are safe for now, the fact is that the rate of advancements in quantum technology is increasing, and that could, in time, pose a threat. &#8220;We expect their computational power will continue to grow at a double exponential rate,&#8221; Google researchers.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd87b0e elementor-widget elementor-widget-heading\" data-id=\"fd87b0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>Quantum Cryptography?<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5dd1a7b elementor-widget elementor-widget-text-editor\" data-id=\"5dd1a7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<em>Quantum cryptography<\/em>\u00a0uses physics to develop a cryptosystem completely secure against being compromised without knowledge of the sender or the receiver of the messages. The word\u00a0<em>quantum<\/em>\u00a0itself refers to the most fundamental behavior of the smallest particles of matter and energy.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-daa530f elementor-widget elementor-widget-text-editor\" data-id=\"daa530f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tQuantum cryptography is different from traditional cryptographic systems in that it relies more on\u00a0<em>physics<\/em>, rather than mathematics, as a key aspect of its security model.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16dcfb2 elementor-widget elementor-widget-text-editor\" data-id=\"16dcfb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEssentially, quantum cryptography is based on the usage of individual particles\/waves of light (photon) and their intrinsic quantum properties to develop an unbreakable cryptosystem (<em>because it is impossible to measure the quantum state of any system without disturbing that system<\/em>.)\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b4b510 elementor-widget elementor-widget-text-editor\" data-id=\"4b4b510\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tQuantum cryptography uses photons to transmit a key. Once the key is transmitted, coding and encoding using the normal secret-key method can take place. But how does a photon become a key? How do you attach information to a photon&#8217;s spin?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7d6d8f elementor-widget elementor-widget-text-editor\" data-id=\"f7d6d8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis is where\u00a0<strong>binary code<\/strong>\u00a0comes into play. Each type of a photon&#8217;s spin represents one piece of information &#8212; usually a 1 or a 0, for binary code. This code uses strings of 1s and 0s to create a coherent message. For example, 11100100110 could correspond with h-e-l-l-o. So a binary code can be assigned to each photon &#8212; for example, a photon that has a\u00a0<strong>vertical spin ( | )<\/strong>\u00a0can be assigned a 1.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bc5e05 elementor-widget elementor-widget-text-editor\" data-id=\"3bc5e05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\u201cIf you build it correctly, no hacker can hack the system. The question is what it means to build it correctly,\u201d said physicist Renato Renner from the Institute of Theoretical Physics in Zurich.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d128c83 elementor-widget elementor-widget-text-editor\" data-id=\"d128c83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nRegular, non-quantum encryption can work in a variety of ways but generally a message is scrambled and can only be unscrambled using a secret key. The trick is to make sure that whomever you\u2019re trying to hide your communication from doesn\u2019t get their hands on your secret key. Cracking the private key in a modern crypto system would generally require figuring out the factors of a number that is the product of two insanely huge prime numbers.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41d9895 elementor-widget elementor-widget-text-editor\" data-id=\"41d9895\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe numbers are chosen to be so large that, with the given processing power of computers, it would take longer than the lifetime of the universe for an algorithm to factor their product.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f6bfbf elementor-widget elementor-widget-text-editor\" data-id=\"6f6bfbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEncryption techniques have their vulnerabilities. Certain products \u2013 called weak keys \u2013 happen to be easier to factor than others. Also, Moore\u2019s Law continually ups the processing power of our computers. Even more importantly, mathematicians are constantly developing new algorithms that allow for easier factorization.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54d9c6f elementor-widget elementor-widget-text-editor\" data-id=\"54d9c6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tQuantum cryptography avoids all these issues. Here, the key is encrypted into a series of photons that get passed between two parties trying to share secret information. The Heisenberg Uncertainty Principle dictates that an adversary can\u2019t look at these photons without changing or destroying them.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3dd6780 elementor-widget elementor-widget-text-editor\" data-id=\"3dd6780\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\u201cIn this case, it doesn\u2019t matter what technology the adversary has, they\u2019ll never be able to break the laws of physics,\u201d said physicist Richard Hughes of Los Alamos National Laboratory in New Mexico, who works on quantum cryptography [6].\n\n&nbsp;\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e49228 elementor-widget elementor-widget-text-editor\" data-id=\"2e49228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>References:<\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d1ed6b elementor-widget elementor-widget-text-editor\" data-id=\"4d1ed6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t[1] https:\/\/www.forbes.com\/sites\/billybambrough\/2019\/10\/02\/could-google-be-about-to-break-bitcoin\/#1d78c5373329\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ad8909 elementor-widget elementor-widget-text-editor\" data-id=\"2ad8909\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t[2] https:\/\/decrypt.co\/9642\/what-google-quantum-computer-means-for-bitcoin\/\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0eb786d elementor-widget elementor-widget-text-editor\" data-id=\"0eb786d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t[3] https:\/\/www.coindesk.com\/how-should-crypto-prepare-for-googles-quantum-supremacy?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf590fd elementor-widget elementor-widget-text-editor\" data-id=\"cf590fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t[4] https:\/\/www.ccn.com\/google-quantum-bitcoin\/\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8252c08 elementor-widget elementor-widget-text-editor\" data-id=\"8252c08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t[5] https:\/\/www.linkedin.com\/pulse\/20140503185010-246665791-quantum-computing\/\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43b26e1 elementor-widget elementor-widget-text-editor\" data-id=\"43b26e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t[6] https:\/\/www.linkedin.com\/pulse\/20140608053056-246665791-understanding-quantum-cryptography\/\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a41f3b elementor-widget elementor-widget-text-editor\" data-id=\"1a41f3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t[7] https:\/\/ai.googleblog.com\/2019\/10\/quantum-supremacy-using-programmable.html\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-756de05 elementor-widget elementor-widget-text-editor\" data-id=\"756de05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t[8] https:\/\/qudev.phys.ethz.ch\/static\/content\/QSIT15\/Shors%20Algorithm.pdf\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The quantum computer, following the laws of quantum physics, would gain enormous processing power through the ability to be in multiple states, and to perform tasks using all possible permutations simultaneously. &nbsp;While the native encryption algorithms used by Blockchain&rsquo;s applications are safe for now, the fact is that the rate of advancements in quantum technology is increasing, and that could, in time, pose a threat.&nbsp;The biggest danger to Blockchain networks from quantum computing is its ability to break traditional encryption.<\/p>\n","protected":false},"author":543,"featured_media":3282,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[192],"tags":[98],"ppma_author":[3205],"class_list":["post-2182","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fintech","tag-blockchain"],"authors":[{"term_id":3205,"user_id":543,"is_guest":0,"slug":"ahmed-banafa","display_name":"Ahmed Banafa","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_a3912711-a0db-437b-a2c1-df173aaae2d5-150x150.png","user_url":"http:\/\/www.sjsu.edu","last_name":"Banafa","first_name":"Ahmed","job_title":"","description":"<a href=\"https:\/\/www.linkedin.com\/in\/ahmedbanafa\/\">Prof. Ahmed Banafa<\/a>, Faculty at San Jose State University<b>,<\/b>\u00a0has extensive research work with focus on IoT, Blockchain, cybersecurity and AI. He served as an instructor at well-known universities and colleges. He is the recipient of several awards, including Distinguished Tenured Staff Award, Instructor of the year and Certificate of Honor from the City and County of San Francisco.\u00a0He was named as No.1 tech voice to follow, technology fortune teller and influencer by LinkedIn in 2018, featured in Forbes, IEEE-IoT and MIT Technology Review, with frequent appearances on ABC, CBS, NBC, BBC, <a><\/a>and Fox TV and Radio stations. He is a member of MIT Technology Review Global Panel.\u00a0He is the author of the book \u201c<a href=\"https:\/\/www.amazon.com\/Secure-Smart-Internet-Things-Iot\/dp\/8770220301\/\"><i>Secure and Smart Internet of Things (IoT) using Blockchain and Artificial Intelligence (AI)<\/i><\/a><i>\u201d.<\/i>"}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/543"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=2182"}],"version-history":[{"count":6,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2182\/revisions"}],"predecessor-version":[{"id":35737,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2182\/revisions\/35737"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3282"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=2182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=2182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=2182"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}