Importance of Hashing Algorithms and Why should we Ask Ourselves if Cryptography and Encryption are Safe from the latest development of Quantum Computers

View this thread on: d.buzz | hive.blog | peakd.com | ecency.com
·@steemitguide·
0.000 HBD
Importance of Hashing Algorithms and Why should we Ask Ourselves if Cryptography and Encryption are Safe from the latest development of Quantum Computers
# Rise of Quantum Computers

https://www.wired.com/images_blogs/wiredscience/2013/08/d-wave011.jpg

Quantum computers would be exceptionally fast at a few specific tasks, 
but it appears that for most problems they would outclass today’s computers
only modestly. 
This realization may lead to a new fundamental physical principle

<img src="https://www.steemimg.com/images/2016/10/14/quantum-computing-breakthrough-computer-programdc9a1.jpg" alt="quantum-computing-breakthrough-computer-programdc9a1.jpg" border="0">
____
**Some Question we need to ask Ourselves** 

*Suppose such a Quantum Computer were constructed tomorrow - what would this mean for Cryptocurrencies like Bitcoin?*

*How close we are to Quantum Computers that could crack Cryptography?*
____
Well, as for now we can assume that Quantum Computer are not going to pose any threat's when it comes to Cryptology & Encryption, where high data processing power may have the ability to breach and manipulate information by solving algorithmic hashes to manipulate a blockchain.

**We should be aware that recent advances in the field should make us worry about future-proofing systems being built today to protect critical infrastructure that will be in service for perhaps decades.**

It's not just about Cryptocurrencies, but Online security is at risk because Quantum Computers are so powerful that they can put an end to outdated Encryption, through brute force of computing power. Banks, Governments and pretty much everything we interact on the World Wide Web, should have some sort of Security Protocol based on Encryption, so please get rid of the idea that data can be 100% safe from Hacks.

<iframe width="560" height="315" src="https://www.youtube.com/embed/T2DXrs0OpHU" frameborder="0" allowfullscreen></iframe>

# Cryptocurrency Protection Against Quantum Computing
Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true for the most popular public-key algorithms, which can be efficiently broken by a sufficiently large quantum computer. 

The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the **Elliptic-curve discrete Alogarithm** problem. All of these problems can be easily solved on a sufficiently powerful quantum computer 

**Basically, ECDSA is compromised, But Hashing isn't.** With a quantum computer, you could easily deduce the private key corresponding to a public key. If you only have an address, which is a hashed public key, the private key is safe. Anyway, to spend a transaction, you need to send the public key. At that point you are vulnerable, but the attack is not straightforward.

# Quantum Computers are made up of devices called Qubits. Researchers expect that some chemistry simulations and machine-learning problems can be taken on with just hundreds or thousands of Qubits. Cracking a Cryptographic key of the kind used commonly today would require hundreds of millions of Qubits.

<img src="https://www.steemimg.com/images/2016/10/14/201011_qubit_vs_bit45bc8.jpg" alt="201011_qubit_vs_bit45bc8.jpg" border="0">

IBM has announced to release a 5-qubit Quantum Computer to the general public [Source](https://cointelegraph.com/news/the-arrival-of-quantum-computing-threat-to-bitcoin)

So it will take reasonable amount of time for Quantum Computing to Develop to a stage where it could solve any Encryption Protocol but Did you know that the NSA outlines the switch for NSS (National Security Systems) from Suite B cryptography to the CNSA (Commercial National Security Algorithm Suite). Just to prepare themselves from Quantum computers.

_____
**Please be aware that there is already a number of interesting Quantum resistant public key algorithms have been proposed**. However the NSA expects that NIST will play a leading role in the effort to develop a widely accepted, standardized set of quantum resistant algorithms alongside the general public. 
_____

<iframe width="560" height="315" src="https://www.youtube.com/embed/GSIDS_lvRv4" frameborder="0" allowfullscreen></iframe>

*Please Watch this Educational Video Above, this is somehow related to Steemit Keys*

<img src="https://www.steemimg.com/images/2016/10/14/steemitkeys86e0f.png" alt="steemitkeys86e0f.png" border="0" />

We already have Symmetric-key algorithms which are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a simple transformation to go between the two keys.

The NSA remarked that “The **AES-256 and SHA-384 algorithms are symmetric**, and believed to be safe from attack by a large quantum computer.

<img src="https://www.steemimg.com/images/2016/10/14/types-of-encryptionc0217.jpg" alt="types-of-encryptionc0217.jpg" border="0">

**According to the NSA, the following Algorithms  aren't safe from Quantum Computers:**
- ECDH and ECDSA with NIST P-256
- SHA-256
- AES-128
- RSA with 2048-bit keys
- Diffie-Hellman with 2048-bit keys

https://i-msdn.sec.s-msft.com/dynimg/IC168364.gif

# Art of Hashing

Let's try to learn some basic important technological terms here, so you get the idea of what hashing is all about?
A Hash is basically a method for guessing the combination of a lock, by turning a random large number into a smaller number by taking certain actions. 

For example let's say you randomly pick a large number and pick the 1st, Middle and Last No. to try to solve the remaining numbers, keep in mind that computer have a much more complex way of solving calculation, the idea is that you decide the certain method of guessing until you get the answer.


<iframe width="560" height="315" src="https://www.youtube.com/embed/9mNgeTA13Gc" frameborder="0" allowfullscreen></iframe>

Let's Highlight SHA-256 Algorithm, The SHA (Secure Hash Algorithm) is one of a number of cryptographic hash functions. A cryptographic hash is like a signature for a text or a data file. SHA-256 algorithm generates an almost-unique, fixed size 256-bit (32-byte) hash. Hash is a one way function – it cannot be decrypted back.

https://pbs.twimg.com/media/Cs6G0OXUEAAjReC.png

**Here are some Cryptocurrency coins that use SHA256 Algorithm**

1. Bitcoin (BTC)
2. 21Coin (21)
3. Peercoin (PPC)
4. Namecoin (NMC)
5. Unobtanium (UNO)
6. Deutsche eMark (DEM)
7. Betacoin (BET)
8. Bytecoin (BTE)
9. Joulecoin (XJO)
10. Devcoin (DVC)

# Perhaps a Solution for Bitcoin?

A Bitcoin digital signature and its verification is one of the main key secrets behind the Bitcoin protocol.

<img src="https://www.steemimg.com/images/2016/10/14/digital_signature3f8fe.png" alt="digital_signature3f8fe.png" border="0">

It allows non-repudiation as it means the person who sent the message had to be in possession of the private key and so therefore owns the Bitcoins – anyone on the network can verify the transaction as a result.

*“So in other words, Bitcoin can’t adopt a quantum-resistant signature scheme at the moment if we want to scale beyond present capacity.”*

There are other options like. NTRU, McEliece, and even Fawkes signatures.

Especially Fawkes signatures are incredibly simple and works perfectly with Bitcoin except for the enforced delays – it’s based on a commitment chain.

Together with a secure timestamping mechanism that allows you to prove which message is the oldest – and that’s EXACTLY what Bitcoin is thanks to it’s blockchain! – Fawkes signatures are secure.

*My personal possible Solution, visit this source for more Information*
[Source](www.cl.cam.ac.uk/~rja14/Papers/fawkes.pdf‎)

# Conclusion

Rumors of bitcoin’s demise have been greatly exaggerated. According to a site tracking “bitcoin obituaries,” the media has proclaimed the seven-year-old cryptocurrency dead more than 100 times, yet a recent resurgence has led to a tripling in bitcoin’s price over the last year. It has survived price crashes, cyber heists and community infighting, but bitcoin’s biggest threat may still be lying dormant: quantum computers.

Cryptography is prevalent everywhere and is used for encrypting messages, emails as well as other forms of data. Banks use cryptography as well, although in a centralized manner.

Hence if quantum computers capable of breaking Bitcoin are indeed developed, they would also be a risk to banks and would have far reaching consequences. Which may also suggest our cryptography may be undefeated for a while even after the quantum computing era properly arrives, perhaps giving us enough time to update it. However, many computers and software in use today aren’t patched against even known security problems for which fixes are readily available. We can probably expect a considerable Quantum Security hangover even if the NSA does manage to come up with a quantum-resistant cryptography standard.

**Bitcoin is not Doomed nor are all Alt-coins, so ignore any Article which claims Quantum Computing will end all Cryptology and Encryption, this is nothing more than personal opinion.**

<img src="https://www.steemimg.com/images/2016/10/14/Dilbert-on-quantum-computing1d476.png" alt="Dilbert-on-quantum-computing1d476.png" border="0">

# Sources 

[Bitcoinmagazine.com: Bitcoin is not quantum safe and how we can Fix it When Needed](https://bitcoinmagazine.com/articles/bitcoin-is-not-quantum-safe-and-how-we-can-fix-1375242150)

[Makeuseof.com: Quantum Computer End Cryptography](http://www.makeuseof.com/tag/quantum-computers-end-cryptography/)

[Bitcointalk.org Discussion](https://bitcointalk.org/index.php?topic=153302.0)

[Singularityhub.com: Massive disruption quantum computing](http://singularityhub.com/2016/10/10/massive-disruption-quantum-computing/)
👍 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,