Workflow
抗量子算法
icon
Search documents
GTC泽汇资本:4400亿美元比特币的防御与博弈
Xin Lang Cai Jing· 2026-02-23 13:58
2月23日,在加密技术与量子算力赛跑的当下,比特币网络正面临一场史无前例的生存考验。随着量子 计算技术的持续演进,预计有近700万枚比特币正暴露在潜在的破解风险之下。这其中不仅包含中本聪 持有的100万枚创始代币,更涉及总价值高达4400亿美元的市场存量。GTC泽汇资本认为,这不仅是一 场技术层面的抗衡,更是对比特币核心共识机制——"不可篡改性"的深度拷问。 然而,从维护网络整体价值的角度出发,另一种声音则愈发强烈。GTC泽汇资本观察到,部分开发者提 议对比特币进行软分叉,要求那些处于高风险状态的地址限期迁移至抗量子算法的新地址,否则将通过 技术手段废止其支出权限。这种主张认为,任由量子攻击者(即所谓的"技术掠夺者")掠夺早期休眠资 产,本质上是对网络长期参与者的财富剥夺。GTC泽汇资本认为,如何在保障资产所有权与预防技术性 洗牌之间找到平衡,将是未来几年社区治理的核心矛盾。 关于威胁爆发的时间窗口,虽然市场对于量子计算机何时能真正破解RSA-2048等加密算法尚存争议, 但近期一些科研成果显示,这一期限可能比预期更近。GTC泽汇资本表示,虽然目前尚无必要陷入恐 慌,但工程层面的防御方案必须提上日程。无论是升 ...
三未信安20250924
2025-09-26 02:29
Summary of Conference Call on Quantum Computing and Cryptography Industry Overview - The conference discusses the rapid development of quantum computing, with significant advancements from companies like Google, Microsoft, and IBM in chip development. Chinese institutions are also conducting related research, with commercial quantum computers expected to emerge within the next 5-10 years, posing a major threat to existing cryptographic systems [2][11]. Key Points and Arguments - **Threat to Current Cryptographic Systems**: Quantum computing poses threats to three main types of cryptographic systems: asymmetric encryption (e.g., RSA, ECC), symmetric encryption, and hash algorithms. Asymmetric encryption is the most vulnerable, while symmetric encryption's security strength is halved, and hash algorithms may see their security strength drop to 60-70% or even one-third [4][12]. - **Long Promotion Cycle for Quantum-resistant Algorithms**: The promotion cycle for quantum-resistant algorithms is lengthy due to significant differences from existing cryptographic mechanisms, affecting performance, key lengths, and message processing lengths. This necessitates the re-establishment of industry standards in sectors like finance and electricity [6]. - **NIST's Quantum-resistant Algorithm Standards**: The National Institute of Standards and Technology (NIST) has released multiple quantum-resistant algorithms, with plans for additional releases. This indicates ongoing research and the need for multiple algorithms to address potential risks [7][18]. - **Progress of Domestic and International Manufacturers**: Internationally, companies like Thales and Utimaco have launched hardware security modules (HSM) supporting quantum-resistant algorithms. Domestically, Sanwei Xinan has released a full range of quantum-resistant products, including chips and software development kits [8][10]. - **China's Push for Independent Cryptographic Systems**: China's initiative to develop its own cryptographic systems stems from security concerns over backdoors in widely used algorithms exposed by the Snowden incident. The goal is to complete 50% of system upgrades by the end of 2027, although full replacement of foreign technology will take longer [9]. - **Impact of Quantum Computing on Web 3.0**: The security of Web 3.0 relies on blockchain technology, which is vulnerable to quantum computing, particularly in public key algorithms that ensure identity and asset security. This vulnerability could lead to identity theft and asset loss [13]. - **Mitigating Quantum Threats to Blockchain**: Addressing quantum threats requires new quantum-resistant algorithms rather than merely increasing algorithm strength. Current quantum computing faces challenges in materials and error correction, which must be overcome for existing algorithms to remain effective [14][15]. Additional Important Insights - **Hardware Updates Required for Quantum Algorithms**: Transitioning to quantum-resistant algorithms necessitates hardware updates, as current systems cannot be simply upgraded through software. Pilot projects are underway to assess impacts and develop new standards [16]. - **Future Hardware Updates for New Standards**: Even after initial hardware updates, further updates may be required if new post-quantum standards emerge, as current algorithms may not guarantee long-term security [17]. - **Agility and Reconfigurability in Cryptographic Systems**: Future cryptographic systems should be designed for agility, allowing quick transitions between algorithms. This includes modular designs that enable component upgrades without complete hardware replacement [19][20]. This summary encapsulates the critical discussions and insights from the conference call, highlighting the evolving landscape of quantum computing and its implications for cryptography and security.