Original article by Odaily Planet Daily (Azuma) Recently, the threat of quantum computing to cryptocurrencies has once again become a focus of discussion on the internet. This renewed interest stems from several key figures in the quantum computing and cryptocurrency industries publishing new predictions regarding the development of quantum computing and its potential capabilities. First, on November 13th, Scott Aaronson, a leading figure in quantum computing and director of the Center for Quantum Information at the University of Texas, stated in an article: "I now believe that before the next US presidential election, we may have a fault-tolerant quantum computer capable of running Shor's algorithm..." Then, on November 19, Ethereum co-founder Vitalik Buterin also spoke at the Devconnect conference in Buenos Aires, stating that elliptic curve cryptography (ECC) could be cracked by quantum computing before the 2028 US presidential election, and urged Ethereum to upgrade to quantum-resistant algorithms within four years. What is the quantum threat? Before interpreting Scott and Vitalik's predictions, we need to briefly explain what the "quantum threat" is. In short, the quantum threat to cryptocurrencies refers to the possibility that sufficiently powerful quantum computers in the future could break the cryptographic foundations that protect current cryptocurrencies, potentially destroying their security model. Currently, the security of almost all cryptocurrencies (such as Bitcoin and Ethereum) relies on a technology called "asymmetric encryption," the two most crucial components of which are the "private key" and the "public key": Private key: kept secret by the user and used to sign transactions and prove your ownership of assets; Public key: Generated from the private key, it can be made public and used as part of a wallet address or address. The cornerstone of cryptocurrency security lies in the fact that it is currently computationally infeasible to derive the private key from the public key. However, quantum computing may utilize the principles of quantum mechanics to significantly accelerate the process of solving certain mathematical problems by running specific algorithms (such as Shor's algorithm mentioned earlier), which is precisely the weakness of asymmetric encryption. Let's continue explaining what Shor's algorithm is. We won't delve into the overly mathematical details here, but in short, the essence of Shor's algorithm lies in its ability to transform a mathematical problem that is "almost unsolvable" on a classical computer into a "relatively easy-to-solve" periodic search problem on a quantum computer. This could potentially threaten the existing "private key-public key" cryptographic system used in cryptocurrencies. To give a more easily understandable example, you can easily turn a basket of strawberries (class private key) into jam (analogous to public key), but obviously you can't reverse the jam back into strawberries. However, if a cheat code suddenly appears (analogous to quantum computing), it may be possible to achieve this in a convenient way (analogous to Shor's algorithm). Has the foundation of cryptocurrency been shaken? If that's the case, then isn't cryptocurrency doomed? Don't panic. The quantum threat objectively exists, but the problem isn't that urgent. There are two main reasons for this. First, there's still time before a real threat arrives; second, cryptocurrencies can be upgraded to implement anti-quantum algorithms. First of all, even if Scott's prediction comes true before the 2028 election, it does not mean that the security of cryptocurrencies will be truly threatened; Vitalik's statement is not saying that the foundation of Bitcoin and Ethereum will be shaken, but only pointing out a theoretical risk that exists in the long term. Dragonfly Managing Partner Haseeb explained that there's no need to panic about the new timeline for quantum computing. Running Shor's algorithm is not the same as cracking a real 256-bit elliptic curve key (ECC key). You can use Shor's algorithm to crack a single number—that's impressive enough—but factoring a number with hundreds of digits requires a much larger scale of computation and engineering capabilities… This is something to be taken seriously, but it's not something that's urgent. Cryptocurrency security expert MASTR provides a clearer mathematical answer: cracking the Elliptic Curve Signature (ECDSA) currently used by cryptocurrencies such as Bitcoin and Ethereum requires approximately 2,300 logical qubits, 10¹² to 10¹³ quantum operations, and millions or even hundreds of millions of physical qubits after error correction; however, currently implemented quantum computing only has 100-400 noisy qubits, and the error rate is too high and the coherence time is too short—still at least four orders of magnitude away from the requirements for cracking the former. As for the second point, cryptographers in the industry are also developing new post-quantum cryptography (PQC) algorithms that can resist quantum computing attacks, and mainstream blockchains have already prepared for this. Back in March of last year, Vitalik wrote an article titled "What if a quantum attack came tomorrow? How would Ethereum solve the problem?", in which he mentioned the defensive effects of Winternitz signatures, STARKs, and other technologies against quantum threats, and even envisioned how Ethereum could be upgraded in an emergency. Compared to Ethereum, Bitcoin may be less flexible in implementing upgrades, but the community has already proposed several potential algorithm upgrade solutions, such as Dilithium, Falcon, and SPHINCS+. Recently, with the increasing discussion surrounding this topic, Bitcoin OG Adam Back has also stated that post-quantum era cryptographic standards could be implemented long before a substantial quantum computing threat emerges. In short, the quantum threat is like a "master key" hanging in the distance, theoretically capable of unlocking all current blockchains. However, the lock makers have already begun researching new locks that this master key cannot open, and are preparing to replace all the locks on all the doors before the master key is finished. This is the objective reality regarding the quantum threat. We cannot ignore its progress, but there is no need to panic blindly because of it.Original article by Odaily Planet Daily (Azuma) Recently, the threat of quantum computing to cryptocurrencies has once again become a focus of discussion on the internet. This renewed interest stems from several key figures in the quantum computing and cryptocurrency industries publishing new predictions regarding the development of quantum computing and its potential capabilities. First, on November 13th, Scott Aaronson, a leading figure in quantum computing and director of the Center for Quantum Information at the University of Texas, stated in an article: "I now believe that before the next US presidential election, we may have a fault-tolerant quantum computer capable of running Shor's algorithm..." Then, on November 19, Ethereum co-founder Vitalik Buterin also spoke at the Devconnect conference in Buenos Aires, stating that elliptic curve cryptography (ECC) could be cracked by quantum computing before the 2028 US presidential election, and urged Ethereum to upgrade to quantum-resistant algorithms within four years. What is the quantum threat? Before interpreting Scott and Vitalik's predictions, we need to briefly explain what the "quantum threat" is. In short, the quantum threat to cryptocurrencies refers to the possibility that sufficiently powerful quantum computers in the future could break the cryptographic foundations that protect current cryptocurrencies, potentially destroying their security model. Currently, the security of almost all cryptocurrencies (such as Bitcoin and Ethereum) relies on a technology called "asymmetric encryption," the two most crucial components of which are the "private key" and the "public key": Private key: kept secret by the user and used to sign transactions and prove your ownership of assets; Public key: Generated from the private key, it can be made public and used as part of a wallet address or address. The cornerstone of cryptocurrency security lies in the fact that it is currently computationally infeasible to derive the private key from the public key. However, quantum computing may utilize the principles of quantum mechanics to significantly accelerate the process of solving certain mathematical problems by running specific algorithms (such as Shor's algorithm mentioned earlier), which is precisely the weakness of asymmetric encryption. Let's continue explaining what Shor's algorithm is. We won't delve into the overly mathematical details here, but in short, the essence of Shor's algorithm lies in its ability to transform a mathematical problem that is "almost unsolvable" on a classical computer into a "relatively easy-to-solve" periodic search problem on a quantum computer. This could potentially threaten the existing "private key-public key" cryptographic system used in cryptocurrencies. To give a more easily understandable example, you can easily turn a basket of strawberries (class private key) into jam (analogous to public key), but obviously you can't reverse the jam back into strawberries. However, if a cheat code suddenly appears (analogous to quantum computing), it may be possible to achieve this in a convenient way (analogous to Shor's algorithm). Has the foundation of cryptocurrency been shaken? If that's the case, then isn't cryptocurrency doomed? Don't panic. The quantum threat objectively exists, but the problem isn't that urgent. There are two main reasons for this. First, there's still time before a real threat arrives; second, cryptocurrencies can be upgraded to implement anti-quantum algorithms. First of all, even if Scott's prediction comes true before the 2028 election, it does not mean that the security of cryptocurrencies will be truly threatened; Vitalik's statement is not saying that the foundation of Bitcoin and Ethereum will be shaken, but only pointing out a theoretical risk that exists in the long term. Dragonfly Managing Partner Haseeb explained that there's no need to panic about the new timeline for quantum computing. Running Shor's algorithm is not the same as cracking a real 256-bit elliptic curve key (ECC key). You can use Shor's algorithm to crack a single number—that's impressive enough—but factoring a number with hundreds of digits requires a much larger scale of computation and engineering capabilities… This is something to be taken seriously, but it's not something that's urgent. Cryptocurrency security expert MASTR provides a clearer mathematical answer: cracking the Elliptic Curve Signature (ECDSA) currently used by cryptocurrencies such as Bitcoin and Ethereum requires approximately 2,300 logical qubits, 10¹² to 10¹³ quantum operations, and millions or even hundreds of millions of physical qubits after error correction; however, currently implemented quantum computing only has 100-400 noisy qubits, and the error rate is too high and the coherence time is too short—still at least four orders of magnitude away from the requirements for cracking the former. As for the second point, cryptographers in the industry are also developing new post-quantum cryptography (PQC) algorithms that can resist quantum computing attacks, and mainstream blockchains have already prepared for this. Back in March of last year, Vitalik wrote an article titled "What if a quantum attack came tomorrow? How would Ethereum solve the problem?", in which he mentioned the defensive effects of Winternitz signatures, STARKs, and other technologies against quantum threats, and even envisioned how Ethereum could be upgraded in an emergency. Compared to Ethereum, Bitcoin may be less flexible in implementing upgrades, but the community has already proposed several potential algorithm upgrade solutions, such as Dilithium, Falcon, and SPHINCS+. Recently, with the increasing discussion surrounding this topic, Bitcoin OG Adam Back has also stated that post-quantum era cryptographic standards could be implemented long before a substantial quantum computing threat emerges. In short, the quantum threat is like a "master key" hanging in the distance, theoretically capable of unlocking all current blockchains. However, the lock makers have already begun researching new locks that this master key cannot open, and are preparing to replace all the locks on all the doors before the master key is finished. This is the objective reality regarding the quantum threat. We cannot ignore its progress, but there is no need to panic blindly because of it.

The quantum threat theory has resurfaced, making it possible for cryptocurrencies to go to zero?

2025/11/21 14:00

Original article by Odaily Planet Daily (Azuma)

Recently, the threat of quantum computing to cryptocurrencies has once again become a focus of discussion on the internet. This renewed interest stems from several key figures in the quantum computing and cryptocurrency industries publishing new predictions regarding the development of quantum computing and its potential capabilities.

First, on November 13th, Scott Aaronson, a leading figure in quantum computing and director of the Center for Quantum Information at the University of Texas, stated in an article: "I now believe that before the next US presidential election, we may have a fault-tolerant quantum computer capable of running Shor's algorithm..."

Then, on November 19, Ethereum co-founder Vitalik Buterin also spoke at the Devconnect conference in Buenos Aires, stating that elliptic curve cryptography (ECC) could be cracked by quantum computing before the 2028 US presidential election, and urged Ethereum to upgrade to quantum-resistant algorithms within four years.

What is the quantum threat?

Before interpreting Scott and Vitalik's predictions, we need to briefly explain what the "quantum threat" is.

In short, the quantum threat to cryptocurrencies refers to the possibility that sufficiently powerful quantum computers in the future could break the cryptographic foundations that protect current cryptocurrencies, potentially destroying their security model.

Currently, the security of almost all cryptocurrencies (such as Bitcoin and Ethereum) relies on a technology called "asymmetric encryption," the two most crucial components of which are the "private key" and the "public key":

  • Private key: kept secret by the user and used to sign transactions and prove your ownership of assets;
  • Public key: Generated from the private key, it can be made public and used as part of a wallet address or address.

The cornerstone of cryptocurrency security lies in the fact that it is currently computationally infeasible to derive the private key from the public key. However, quantum computing may utilize the principles of quantum mechanics to significantly accelerate the process of solving certain mathematical problems by running specific algorithms (such as Shor's algorithm mentioned earlier), which is precisely the weakness of asymmetric encryption.

Let's continue explaining what Shor's algorithm is. We won't delve into the overly mathematical details here, but in short, the essence of Shor's algorithm lies in its ability to transform a mathematical problem that is "almost unsolvable" on a classical computer into a "relatively easy-to-solve" periodic search problem on a quantum computer. This could potentially threaten the existing "private key-public key" cryptographic system used in cryptocurrencies.

To give a more easily understandable example, you can easily turn a basket of strawberries (class private key) into jam (analogous to public key), but obviously you can't reverse the jam back into strawberries. However, if a cheat code suddenly appears (analogous to quantum computing), it may be possible to achieve this in a convenient way (analogous to Shor's algorithm).

Has the foundation of cryptocurrency been shaken?

If that's the case, then isn't cryptocurrency doomed?

Don't panic. The quantum threat objectively exists, but the problem isn't that urgent. There are two main reasons for this. First, there's still time before a real threat arrives; second, cryptocurrencies can be upgraded to implement anti-quantum algorithms.

First of all, even if Scott's prediction comes true before the 2028 election, it does not mean that the security of cryptocurrencies will be truly threatened; Vitalik's statement is not saying that the foundation of Bitcoin and Ethereum will be shaken, but only pointing out a theoretical risk that exists in the long term.

Dragonfly Managing Partner Haseeb explained that there's no need to panic about the new timeline for quantum computing. Running Shor's algorithm is not the same as cracking a real 256-bit elliptic curve key (ECC key). You can use Shor's algorithm to crack a single number—that's impressive enough—but factoring a number with hundreds of digits requires a much larger scale of computation and engineering capabilities… This is something to be taken seriously, but it's not something that's urgent.

Cryptocurrency security expert MASTR provides a clearer mathematical answer: cracking the Elliptic Curve Signature (ECDSA) currently used by cryptocurrencies such as Bitcoin and Ethereum requires approximately 2,300 logical qubits, 10¹² to 10¹³ quantum operations, and millions or even hundreds of millions of physical qubits after error correction; however, currently implemented quantum computing only has 100-400 noisy qubits, and the error rate is too high and the coherence time is too short—still at least four orders of magnitude away from the requirements for cracking the former.

As for the second point, cryptographers in the industry are also developing new post-quantum cryptography (PQC) algorithms that can resist quantum computing attacks, and mainstream blockchains have already prepared for this.

Back in March of last year, Vitalik wrote an article titled "What if a quantum attack came tomorrow? How would Ethereum solve the problem?", in which he mentioned the defensive effects of Winternitz signatures, STARKs, and other technologies against quantum threats, and even envisioned how Ethereum could be upgraded in an emergency.

Compared to Ethereum, Bitcoin may be less flexible in implementing upgrades, but the community has already proposed several potential algorithm upgrade solutions, such as Dilithium, Falcon, and SPHINCS+. Recently, with the increasing discussion surrounding this topic, Bitcoin OG Adam Back has also stated that post-quantum era cryptographic standards could be implemented long before a substantial quantum computing threat emerges.

In short, the quantum threat is like a "master key" hanging in the distance, theoretically capable of unlocking all current blockchains. However, the lock makers have already begun researching new locks that this master key cannot open, and are preparing to replace all the locks on all the doors before the master key is finished.

This is the objective reality regarding the quantum threat. We cannot ignore its progress, but there is no need to panic blindly because of it.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Understanding the Ethereum Interoperability Layer (EIL): Bridging L2 Fragmentation and Building a Seamless Cross-Chain Experience

Understanding the Ethereum Interoperability Layer (EIL): Bridging L2 Fragmentation and Building a Seamless Cross-Chain Experience

Author: Pan Zhixiong Ethereum has successfully addressed the scaling issue over the past few years by deploying multiple Layer 2 solutions, such as Arbitrum, Optimism, and Base, resulting in reduced transaction costs and increased efficiency. However, this has led to a fragmented user experience: each L2 network acts like an isolated island, with users facing cumbersome steps, different bridging protocols, and complex asset and gas management when crossing chains. To address this pain point, the Ethereum core team recently proposed the Ethereum Interop Layer (EIL). To understand EIL, we first need to review its foundation—ERC-4337. ERC-4337 is an account abstraction standard proposed by Ethereum. It requires no changes to the underlying Ethereum protocol, implementing a new type of account structure—the smart account—simply by deploying smart contracts. This type of account not only supports advanced features such as social recovery, multisignature, and batch operations, but also allows for gas payments using ERC-20 tokens via smart contracts. However, despite the many technological innovations brought by ERC-4337, its adoption in practice remains limited. Fragmented user experience, difficulties in multi-chain collaboration, high gas costs, and ecosystem compatibility issues all restrict the widespread adoption of 4337. The EIL was developed to address these issues on top of ERC-4337. EIL is an additional multi-chain interoperability protocol built upon the ERC-4337 framework . It extends the single-chain account abstraction to multi-chain account interoperability, enabling a seamless experience across multiple L2 networks. Specifically, EIL implements two important innovations: one-signature multi-chain operations (bulk authorization) and a competitive funding mechanism for cross-chain liquidity providers (XLPs). The first innovation, bulk authorization , allows users to authorize multiple operations across multiple L2 networks with a single signature. Specifically, the wallet first constructs its own UserOperation on each relevant chain, then integrates these operations into a Merkle tree. Users only need to sign the root of the tree once. When a smart account on each chain verifies a received UserOperation, it only needs to verify that it belongs to the Merkle tree and that the signature is valid to execute the operation. This approach significantly simplifies the cross-chain operation process for users. The second innovation, the auction-based funding mechanism, introduces a role called Cross-chain Liquidity Provider (XLP). XLPs are responsible for providing asset transfer and gas payment services between different chains. When a user locks assets on the source chain and submits a cross-chain request, multiple XLPs can bid on the request through on-chain auction. The XLP that wins the bid provides a cross-chain asset transfer voucher, allowing the user to directly obtain funds and gas payments on the target chain to complete the required cross-chain operation. Only after the transaction is completed will the XLP claim the user's previously locked assets on the source chain. To ensure security and fairness, XLPs must be staked on the Ethereum mainnet (L1) and subject to a strict dispute arbitration mechanism. If an XLP violates the rules, the staked assets will be forfeited, thus ensuring its integrity through economic incentives . It's worth emphasizing that EIL doesn't require any changes to the consensus protocol of the Ethereum mainnet or L2 network during its implementation . All implementations are based on smart contracts and the existing ERC-4337 account abstraction framework. This design not only reduces the difficulty of implementation but also significantly reduces the security risks the chain itself may face. Of course, this design also shifts the pressure and complexity to the wallet and off-chain infrastructure . The wallet needs to support complex multi-chain transaction construction, one-signature multi-chain verification, interaction mechanisms with CrossChainPaymaster and XLP, and needs to provide a simple and user-friendly interface. The off-chain infrastructure, on the other hand, needs to build a robust auction market, monitor XLP fund flows in real time, and manage risks. Ultimately, EIL provides users with a single-chain-like experience. In the future, when users open EIL-enabled wallets, they will no longer need to frequently switch chains, manage cross-chain assets, or endure lengthy cross-chain waits and cumbersome procedures. All complex cross-chain details will be completed automatically outside the user's view, gradually unifying the user experience across the entire Ethereum L2 ecosystem and truly realizing the vision of multi-chain integration and seamless interoperability. EIL also opens up a whole new possibility for the entire Ethereum ecosystem: it not only solves the cross-chain user experience problem, but more importantly, it truly allows multiple L2 networks to "become one" in a secure, decentralized, and trustless way.
Share
PANews2025/11/21 14:00
Bitcoin 8% Gains Already Make September 2025 Its Second Best

Bitcoin 8% Gains Already Make September 2025 Its Second Best

The post Bitcoin 8% Gains Already Make September 2025 Its Second Best appeared on BitcoinEthereumNews.com. Key points: Bitcoin is bucking seasonality trends by adding 8%, making this September its best since 2012. September 2025 would need to see 20% upside to become Bitcoin’s strongest ever. BTC price volatility is at levels rarely seen before in an unusual bull cycle. Bitcoin (BTC) has gained more this September than any year since 2012, a new bull market record. Historical price data from CoinGlass and BiTBO confirms that at 8%, Bitcoin’s September 2025 upside is its second-best ever. Bitcoin avoiding “Rektember” with 8% gains September is traditionally Bitcoin’s weakest month, with average losses of around 8%. BTC/USD monthly returns (screenshot). Source: CoinGlass This year, the stakes are high for BTC price seasonality, as historical patterns demand the next bull market peak and other risk assets set repeated new all-time highs. While both gold and the S&P 500 are in price discovery, BTC/USD has coiled throughout September after setting new highs of its own the month prior. Even at “just” 8%, however, this September’s performance is currently enough to make it Bitcoin’s strongest in 13 years. The only time that the ninth month of the year was more profitable for Bitcoin bulls was in 2012, when BTC/USD gained about 19.8%. Last year, upside topped out at 7.3%. BTC/USD monthly returns. Source: BiTBO BTC price volatility vanishes The figures underscore a highly unusual bull market peak year for Bitcoin. Related: BTC ‘pricing in’ what’s coming: 5 things to know in Bitcoin this week Unlike previous bull markets, BTC price volatility has died off in 2025, against the expectations of longtime market participants based on prior performance. CoinGlass data shows volatility dropping to levels not seen in over a decade, with a particularly sharp drop from April onward. Bitcoin historical volatility (screenshot). Source: CoinGlass Onchain analytics firm Glassnode, meanwhile, highlights the…
Share
BitcoinEthereumNews2025/09/18 11:09