Why Nostr? What is Njump?
2024-12-01 03:14:27
in reply to

Nic on Nostr: From GPT: The ability of quantum computing to potentially crack a Bitcoin private key ...

From GPT:

The ability of quantum computing to potentially crack a Bitcoin private key is tied to how public keys are exposed during Bitcoin transactions. Here's how this works:

Public Key Exposure in Bitcoin Transactions

Receiving Bitcoin: When someone receives Bitcoin to their wallet, only the Bitcoin address is exposed. This address is derived from a hash of the public key, specifically through SHA-256 followed by RIPEMD-160. Hash functions are resistant to quantum attacks with current quantum algorithms, making it computationally infeasible for a quantum computer to reverse-engineer the public key or private key from the address.

Sending Bitcoin: When a transaction is made to send Bitcoin, the public key is included in the transaction for verification purposes. This exposure of the public key is critical because it opens up the possibility for a quantum computer to attempt to derive the private key.


Quantum Computing and Cryptographic Vulnerabilities

Bitcoin's security relies on the elliptic curve digital signature algorithm (ECDSA). ECDSA is secure against classical computers but vulnerable to quantum computers due to Shor's algorithm.

Shor's Algorithm: A sufficiently powerful quantum computer can efficiently solve the discrete logarithm problem, which underpins the security of ECDSA. If the public key is exposed, Shor's algorithm can calculate the corresponding private key.


Why Sending Bitcoin Makes Keys Vulnerable

1. Exposing the Public Key: When Bitcoin is sent, the public key is revealed in the transaction data.


2. Quantum Attack Feasibility: With the public key exposed, a quantum computer can attempt to use Shor's algorithm to calculate the private key.


3. Time Sensitivity: For the quantum attack to succeed, it must be executed quickly, ideally before the transaction is confirmed and miners move the Bitcoin to a new address.



Why Only Receiving Bitcoin is Safer

If the Bitcoin is only received and never spent, the public key remains hidden. Since quantum computers cannot reverse the hash functions (SHA-256 and RIPEMD-160) efficiently, the private key cannot be derived from the Bitcoin address alone.

Key Takeaway

Bitcoin's vulnerability to quantum attacks lies in the exposure of public keys during transactions. By not sending Bitcoin, the public key remains hidden, preserving the security of the private key against quantum computing attacks.
Author Public Key
npub134u08yp6rdcgcamfdcra9aysvhne9wpssft8ntm9qvfu95erxdcqx9qjkm