Quantum Claim on Bitcoin Proven to be Brute Force Attack
Severity: Low (Score: 18.8)
Sources: coinedition.com, Kucoin, Mexc
Summary
A recent claim of a quantum breakthrough in cracking Bitcoin's cryptography has been debunked. Analysts, including Checkmate, assert that the method used does not demonstrate any quantum advantage. Independent developer Yuval Adam replicated the results using random data instead of quantum output, successfully recovering the same keys. The original claim involved recovering a 15-bit elliptic curve key, which is significantly smaller than Bitcoin's standard 256-bit key. Adam's tests indicated that the process relies on classical brute-force techniques rather than quantum computation. The 15-bit key's limited combinations make it trivial for even basic computers to exhaust. The incident highlights the ongoing efforts in the quantum race, with companies like Google aiming for post-quantum cryptography by 2029. Despite the debunking, developers are preparing for potential quantum threats with proposals for quantum-resistant transaction formats. The overall impact on Bitcoin's security remains minimal, as the demonstration does not threaten its cryptographic integrity. Key Points: • Claim of quantum breakthrough in Bitcoin cryptography debunked as classical brute force. • Independent tests showed identical key recovery using random data, not quantum output. • The 15-bit key used in the claim is too small to pose a real threat to Bitcoin's security.
Key Entities
- Brute Force (attack_type)
- Bitcoin Prize (campaign)
- Project Eleven (campaign)
- pq.ethereum.org (domain)
- strawmap.org (domain)
- T1110 - Brute Force (mitre_attack)
- Bitcoin (platform)
- IBM Quantum Systems (platform)
- Ethereum (company)