Original article by Odaily Planet Daily (Azuma) Recently, the threat of quantum computing to cryptocurrencies has once again become a focus of discussion on the internet. This renewed interest stems from several key figures in the quantum computing and cryptocurrency industries publishing new predictions regarding the development of quantum computing and its potential capabilities. First, on November 13th, Scott Aaronson, a leading figure in quantum computing and director of the Center for Quantum Information at the University of Texas, stated in an article: "I now believe that before the next US presidential election, we may have a fault-tolerant quantum computer capable of running Shor's algorithm..." Then, on November 19, Ethereum co-founder Vitalik Buterin also spoke at the Devconnect conference in Buenos Aires, stating that elliptic curve cryptography (ECC) could be cracked by quantum computing before the 2028 US presidential election, and urged Ethereum to upgrade to quantum-resistant algorithms within four years. What is the quantum threat? Before interpreting Scott and Vitalik's predictions, we need to briefly explain what the "quantum threat" is. In short, the quantum threat to cryptocurrencies refers to the possibility that sufficiently powerful quantum computers in the future could break the cryptographic foundations that protect current cryptocurrencies, potentially destroying their security model. Currently, the security of almost all cryptocurrencies (such as Bitcoin and Ethereum) relies on a technology called "asymmetric encryption," the two most crucial components of which are the "private key" and the "public key": Private key: kept secret by the user and used to sign transactions and prove your ownership of assets; Public key: Generated from the private key, it can be made public and used as part of a wallet address or address. The cornerstone of cryptocurrency security lies in the fact that it is currently computationally infeasible to derive the private key from the public key. However, quantum computing may utilize the principles of quantum mechanics to significantly accelerate the process of solving certain mathematical problems by running specific algorithms (such as Shor's algorithm mentioned earlier), which is precisely the weakness of asymmetric encryption. Let's continue explaining what Shor's algorithm is. We won't delve into the overly mathematical details here, but in short, the essence of Shor's algorithm lies in its ability to transform a mathematical problem that is "almost unsolvable" on a classical computer into a "relatively easy-to-solve" periodic search problem on a quantum computer. This could potentially threaten the existing "private key-public key" cryptographic system used in cryptocurrencies. To give a more easily understandable example, you can easily turn a basket of strawberries (class private key) into jam (analogous to public key), but obviously you can't reverse the jam back into strawberries. However, if a cheat code suddenly appears (analogous to quantum computing), it may be possible to achieve this in a convenient way (analogous to Shor's algorithm). Has the foundation of cryptocurrency been shaken? If that's the case, then isn't cryptocurrency doomed? Don't panic. The quantum threat objectively exists, but the problem isn't that urgent. There are two main reasons for this. First, there's still time before a real threat arrives; second, cryptocurrencies can be upgraded to implement anti-quantum algorithms. First of all, even if Scott's prediction comes true before the 2028 election, it does not mean that the security of cryptocurrencies will be truly threatened; Vitalik's statement is not saying that the foundation of Bitcoin and Ethereum will be shaken, but only pointing out a theoretical risk that exists in the long term. Dragonfly Managing Partner Haseeb explained that there's no need to panic about the new timeline for quantum computing. Running Shor's algorithm is not the same as cracking a real 256-bit elliptic curve key (ECC key). You can use Shor's algorithm to crack a single number—that's impressive enough—but factoring a number with hundreds of digits requires a much larger scale of computation and engineering capabilities… This is something to be taken seriously, but it's not something that's urgent. Cryptocurrency security expert MASTR provides a clearer mathematical answer: cracking the Elliptic Curve Signature (ECDSA) currently used by cryptocurrencies such as Bitcoin and Ethereum requires approximately 2,300 logical qubits, 10¹² to 10¹³ quantum operations, and millions or even hundreds of millions of physical qubits after error correction; however, currently implemented quantum computing only has 100-400 noisy qubits, and the error rate is too high and the coherence time is too short—still at least four orders of magnitude away from the requirements for cracking the former. As for the second point, cryptographers in the industry are also developing new post-quantum cryptography (PQC) algorithms that can resist quantum computing attacks, and mainstream blockchains have already prepared for this. Back in March of last year, Vitalik wrote an article titled "What if a quantum attack came tomorrow? How would Ethereum solve the problem?", in which he mentioned the defensive effects of Winternitz signatures, STARKs, and other technologies against quantum threats, and even envisioned how Ethereum could be upgraded in an emergency. Compared to Ethereum, Bitcoin may be less flexible in implementing upgrades, but the community has already proposed several potential algorithm upgrade solutions, such as Dilithium, Falcon, and SPHINCS+. Recently, with the increasing discussion surrounding this topic, Bitcoin OG Adam Back has also stated that post-quantum era cryptographic standards could be implemented long before a substantial quantum computing threat emerges. In short, the quantum threat is like a "master key" hanging in the distance, theoretically capable of unlocking all current blockchains. However, the lock makers have already begun researching new locks that this master key cannot open, and are preparing to replace all the locks on all the doors before the master key is finished. This is the objective reality regarding the quantum threat. We cannot ignore its progress, but there is no need to panic blindly because of it.Original article by Odaily Planet Daily (Azuma) Recently, the threat of quantum computing to cryptocurrencies has once again become a focus of discussion on the internet. This renewed interest stems from several key figures in the quantum computing and cryptocurrency industries publishing new predictions regarding the development of quantum computing and its potential capabilities. First, on November 13th, Scott Aaronson, a leading figure in quantum computing and director of the Center for Quantum Information at the University of Texas, stated in an article: "I now believe that before the next US presidential election, we may have a fault-tolerant quantum computer capable of running Shor's algorithm..." Then, on November 19, Ethereum co-founder Vitalik Buterin also spoke at the Devconnect conference in Buenos Aires, stating that elliptic curve cryptography (ECC) could be cracked by quantum computing before the 2028 US presidential election, and urged Ethereum to upgrade to quantum-resistant algorithms within four years. What is the quantum threat? Before interpreting Scott and Vitalik's predictions, we need to briefly explain what the "quantum threat" is. In short, the quantum threat to cryptocurrencies refers to the possibility that sufficiently powerful quantum computers in the future could break the cryptographic foundations that protect current cryptocurrencies, potentially destroying their security model. Currently, the security of almost all cryptocurrencies (such as Bitcoin and Ethereum) relies on a technology called "asymmetric encryption," the two most crucial components of which are the "private key" and the "public key": Private key: kept secret by the user and used to sign transactions and prove your ownership of assets; Public key: Generated from the private key, it can be made public and used as part of a wallet address or address. The cornerstone of cryptocurrency security lies in the fact that it is currently computationally infeasible to derive the private key from the public key. However, quantum computing may utilize the principles of quantum mechanics to significantly accelerate the process of solving certain mathematical problems by running specific algorithms (such as Shor's algorithm mentioned earlier), which is precisely the weakness of asymmetric encryption. Let's continue explaining what Shor's algorithm is. We won't delve into the overly mathematical details here, but in short, the essence of Shor's algorithm lies in its ability to transform a mathematical problem that is "almost unsolvable" on a classical computer into a "relatively easy-to-solve" periodic search problem on a quantum computer. This could potentially threaten the existing "private key-public key" cryptographic system used in cryptocurrencies. To give a more easily understandable example, you can easily turn a basket of strawberries (class private key) into jam (analogous to public key), but obviously you can't reverse the jam back into strawberries. However, if a cheat code suddenly appears (analogous to quantum computing), it may be possible to achieve this in a convenient way (analogous to Shor's algorithm). Has the foundation of cryptocurrency been shaken? If that's the case, then isn't cryptocurrency doomed? Don't panic. The quantum threat objectively exists, but the problem isn't that urgent. There are two main reasons for this. First, there's still time before a real threat arrives; second, cryptocurrencies can be upgraded to implement anti-quantum algorithms. First of all, even if Scott's prediction comes true before the 2028 election, it does not mean that the security of cryptocurrencies will be truly threatened; Vitalik's statement is not saying that the foundation of Bitcoin and Ethereum will be shaken, but only pointing out a theoretical risk that exists in the long term. Dragonfly Managing Partner Haseeb explained that there's no need to panic about the new timeline for quantum computing. Running Shor's algorithm is not the same as cracking a real 256-bit elliptic curve key (ECC key). You can use Shor's algorithm to crack a single number—that's impressive enough—but factoring a number with hundreds of digits requires a much larger scale of computation and engineering capabilities… This is something to be taken seriously, but it's not something that's urgent. Cryptocurrency security expert MASTR provides a clearer mathematical answer: cracking the Elliptic Curve Signature (ECDSA) currently used by cryptocurrencies such as Bitcoin and Ethereum requires approximately 2,300 logical qubits, 10¹² to 10¹³ quantum operations, and millions or even hundreds of millions of physical qubits after error correction; however, currently implemented quantum computing only has 100-400 noisy qubits, and the error rate is too high and the coherence time is too short—still at least four orders of magnitude away from the requirements for cracking the former. As for the second point, cryptographers in the industry are also developing new post-quantum cryptography (PQC) algorithms that can resist quantum computing attacks, and mainstream blockchains have already prepared for this. Back in March of last year, Vitalik wrote an article titled "What if a quantum attack came tomorrow? How would Ethereum solve the problem?", in which he mentioned the defensive effects of Winternitz signatures, STARKs, and other technologies against quantum threats, and even envisioned how Ethereum could be upgraded in an emergency. Compared to Ethereum, Bitcoin may be less flexible in implementing upgrades, but the community has already proposed several potential algorithm upgrade solutions, such as Dilithium, Falcon, and SPHINCS+. Recently, with the increasing discussion surrounding this topic, Bitcoin OG Adam Back has also stated that post-quantum era cryptographic standards could be implemented long before a substantial quantum computing threat emerges. In short, the quantum threat is like a "master key" hanging in the distance, theoretically capable of unlocking all current blockchains. However, the lock makers have already begun researching new locks that this master key cannot open, and are preparing to replace all the locks on all the doors before the master key is finished. This is the objective reality regarding the quantum threat. We cannot ignore its progress, but there is no need to panic blindly because of it.

The quantum threat theory has resurfaced, making it possible for cryptocurrencies to go to zero?

2025/11/21 14:00

Original article by Odaily Planet Daily (Azuma)

Recently, the threat of quantum computing to cryptocurrencies has once again become a focus of discussion on the internet. This renewed interest stems from several key figures in the quantum computing and cryptocurrency industries publishing new predictions regarding the development of quantum computing and its potential capabilities.

First, on November 13th, Scott Aaronson, a leading figure in quantum computing and director of the Center for Quantum Information at the University of Texas, stated in an article: "I now believe that before the next US presidential election, we may have a fault-tolerant quantum computer capable of running Shor's algorithm..."

Then, on November 19, Ethereum co-founder Vitalik Buterin also spoke at the Devconnect conference in Buenos Aires, stating that elliptic curve cryptography (ECC) could be cracked by quantum computing before the 2028 US presidential election, and urged Ethereum to upgrade to quantum-resistant algorithms within four years.

What is the quantum threat?

Before interpreting Scott and Vitalik's predictions, we need to briefly explain what the "quantum threat" is.

In short, the quantum threat to cryptocurrencies refers to the possibility that sufficiently powerful quantum computers in the future could break the cryptographic foundations that protect current cryptocurrencies, potentially destroying their security model.

Currently, the security of almost all cryptocurrencies (such as Bitcoin and Ethereum) relies on a technology called "asymmetric encryption," the two most crucial components of which are the "private key" and the "public key":

  • Private key: kept secret by the user and used to sign transactions and prove your ownership of assets;
  • Public key: Generated from the private key, it can be made public and used as part of a wallet address or address.

The cornerstone of cryptocurrency security lies in the fact that it is currently computationally infeasible to derive the private key from the public key. However, quantum computing may utilize the principles of quantum mechanics to significantly accelerate the process of solving certain mathematical problems by running specific algorithms (such as Shor's algorithm mentioned earlier), which is precisely the weakness of asymmetric encryption.

Let's continue explaining what Shor's algorithm is. We won't delve into the overly mathematical details here, but in short, the essence of Shor's algorithm lies in its ability to transform a mathematical problem that is "almost unsolvable" on a classical computer into a "relatively easy-to-solve" periodic search problem on a quantum computer. This could potentially threaten the existing "private key-public key" cryptographic system used in cryptocurrencies.

To give a more easily understandable example, you can easily turn a basket of strawberries (class private key) into jam (analogous to public key), but obviously you can't reverse the jam back into strawberries. However, if a cheat code suddenly appears (analogous to quantum computing), it may be possible to achieve this in a convenient way (analogous to Shor's algorithm).

Has the foundation of cryptocurrency been shaken?

If that's the case, then isn't cryptocurrency doomed?

Don't panic. The quantum threat objectively exists, but the problem isn't that urgent. There are two main reasons for this. First, there's still time before a real threat arrives; second, cryptocurrencies can be upgraded to implement anti-quantum algorithms.

First of all, even if Scott's prediction comes true before the 2028 election, it does not mean that the security of cryptocurrencies will be truly threatened; Vitalik's statement is not saying that the foundation of Bitcoin and Ethereum will be shaken, but only pointing out a theoretical risk that exists in the long term.

Dragonfly Managing Partner Haseeb explained that there's no need to panic about the new timeline for quantum computing. Running Shor's algorithm is not the same as cracking a real 256-bit elliptic curve key (ECC key). You can use Shor's algorithm to crack a single number—that's impressive enough—but factoring a number with hundreds of digits requires a much larger scale of computation and engineering capabilities… This is something to be taken seriously, but it's not something that's urgent.

Cryptocurrency security expert MASTR provides a clearer mathematical answer: cracking the Elliptic Curve Signature (ECDSA) currently used by cryptocurrencies such as Bitcoin and Ethereum requires approximately 2,300 logical qubits, 10¹² to 10¹³ quantum operations, and millions or even hundreds of millions of physical qubits after error correction; however, currently implemented quantum computing only has 100-400 noisy qubits, and the error rate is too high and the coherence time is too short—still at least four orders of magnitude away from the requirements for cracking the former.

As for the second point, cryptographers in the industry are also developing new post-quantum cryptography (PQC) algorithms that can resist quantum computing attacks, and mainstream blockchains have already prepared for this.

Back in March of last year, Vitalik wrote an article titled "What if a quantum attack came tomorrow? How would Ethereum solve the problem?", in which he mentioned the defensive effects of Winternitz signatures, STARKs, and other technologies against quantum threats, and even envisioned how Ethereum could be upgraded in an emergency.

Compared to Ethereum, Bitcoin may be less flexible in implementing upgrades, but the community has already proposed several potential algorithm upgrade solutions, such as Dilithium, Falcon, and SPHINCS+. Recently, with the increasing discussion surrounding this topic, Bitcoin OG Adam Back has also stated that post-quantum era cryptographic standards could be implemented long before a substantial quantum computing threat emerges.

In short, the quantum threat is like a "master key" hanging in the distance, theoretically capable of unlocking all current blockchains. However, the lock makers have already begun researching new locks that this master key cannot open, and are preparing to replace all the locks on all the doors before the master key is finished.

This is the objective reality regarding the quantum threat. We cannot ignore its progress, but there is no need to panic blindly because of it.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Bitcoin Rainbow chart predicts BTC price for October 1, 2025

Bitcoin Rainbow chart predicts BTC price for October 1, 2025

The post Bitcoin Rainbow chart predicts BTC price for October 1, 2025 appeared on BitcoinEthereumNews.com. The Bitcoin (BTC) Rainbow Chart has outlined potential price ranges for October 1, 2025, as the asset seeks to reclaim the $120,000 resistance. Throughout September, the maiden cryptocurrency has struggled to push past the $115,000 support zone. At press time, Bitcoin was trading at $115,950, up 0.15% in the past 24 hours and gaining a modest 0.5% over the past week. Bitcoin seven-day price chart. Source: Finbold Looking ahead to October 1, the Rainbow Chart projects that Bitcoin’s price could fall within a broad band of $36,628 to $409,726, depending on prevailing market sentiment. The Rainbow Chart, a long-term valuation model often used to track Bitcoin’s price cycles, is built as a logarithmic regression chart. It color-codes Bitcoin’s valuation bands, offering investors a simplified way to gauge whether the market is undervalued or overheated. Bitcoin price prediction  The lowest tier, labeled “Basically a Fire Sale,” spans from $36,628 to $47,947. Above that, the “BUY!” zone ranges from $47,947 to $64,777, while “Accumulate” covers $64,777 to $83,811. The “Still Cheap” band sets Bitcoin between $83,811 and $108,471, followed by the neutral “HODL!” zone at $108,471 to $142,332. Bitcoin Rainbow chart. Source: BlockhainCenter Cautionary levels emerge as prices climb higher. In this case, the “Is this a bubble?” range extends from $142,332 to $181,644, while “FOMO intensifies” lies between $181,644 and $233,215. On the other hand, the red zones, seen as overheated territory, start with “Sell. Seriously, SELL!” at $233,215 to $304,169 and peak with “Maximum Bubble Territory” from $304,169 to $409,726. With Bitcoin trading around $116,000 as of September 20, the Rainbow Chart suggests that by October 1, 2025, the asset will most likely fall within the “Still Cheap” or “HODL!” bands, implying a fair value between $83,811 and $142,332. This outlook indicates that despite Bitcoin’s strong gains, the model places…
Share
BitcoinEthereumNews2025/09/21 01:51
Token Unlock Wave Highlights Supply Overhang for Traders

Token Unlock Wave Highlights Supply Overhang for Traders

The post Token Unlock Wave Highlights Supply Overhang for Traders appeared on BitcoinEthereumNews.com. Altcoins 20 September 2025 | 04:17 Crypto traders are facing a steady drip of new supply this month, as project teams and early backers release fresh tokens into circulation. What looks like small percentages on paper is building into meaningful selling pressure across multiple ecosystems. Unlocks Becoming a Market Theme According to an analytics tracker, the past week alone saw millions of dollars’ worth of new coins enter the market from projects such as AltLayer, Blast, Avail, Venom, and Parti. AltLayer added roughly $3.5 million in tokens, while Blast introduced more than $2.3 million. In both cases, the amount represented less than 3% of circulating supply — yet the inflows still weighed heavily on trading sentiment. More Supply Ahead The trend is far from over. Another round of unlocks is scheduled for the week of September 22–28, with AltLayer once again leading the pack. By the time its next batch goes live, over 42% of its total supply will have been released. Other names, including KARRAT, XMW, and Yield Guild Games (YGG), will also add to the flow with their own token distributions. Unlocks matter because they create a constant overhang. Even if each release looks minor, stacked together week after week, they erode the balance between supply and demand. AltLayer’s back-to-back schedule makes this clear: the market isn’t just dealing with isolated events but with a pipeline of tokens waiting to be sold. Bigger Picture For traders, that means strategy has to adjust. Pricing these unlocks into positions becomes just as important as monitoring macro conditions or ETF inflows. While unlocks don’t guarantee downward pressure, the compounding effect is already a defining feature of September’s market — one that could shape trading dynamics well into the fourth quarter. The information provided in this article is for educational purposes only…
Share
BitcoinEthereumNews2025/09/20 09:22