a459e85
2021-05-24
Nice
Google Aims for Commercial Quantum Computer by 2029, What Would That Do to Bitcoin?<blockquote>谷歌的目标是到2029年实现商用量子计算机,这对比特币会有什么影响?</blockquote>
免责声明:上述内容仅代表发帖人个人观点,不构成本平台的任何投资建议。
分享至
微信
复制链接
精彩评论
我们需要你的真知灼见来填补这片空白
打开APP,发表看法
APP内打开
发表看法
1
{"i18n":{"language":"zh_CN"},"detailType":1,"isChannel":false,"data":{"magic":2,"id":131983039,"tweetId":"131983039","gmtCreate":1621821552221,"gmtModify":1634186356298,"author":{"id":3581929369056499,"idStr":"3581929369056499","authorId":3581929369056499,"authorIdStr":"3581929369056499","name":"a459e85","avatar":"https://community-static.tradeup.com/news/default-avatar.jpg","vip":1,"userType":1,"introduction":"","boolIsFan":false,"boolIsHead":false,"crmLevel":11,"crmLevelSwitch":0,"individualDisplayBadges":[],"fanSize":4,"starInvestorFlag":false},"themes":[],"images":[],"coverImages":[],"extraTitle":"","html":"<html><head></head><body><p>Nice</p></body></html>","htmlText":"<html><head></head><body><p>Nice</p></body></html>","text":"Nice","highlighted":1,"essential":1,"paper":1,"likeSize":1,"commentSize":0,"repostSize":0,"favoriteSize":0,"link":"https://laohu8.com/post/131983039","repostId":1113416958,"repostType":4,"repost":{"id":"1113416958","kind":"news","pubTimestamp":1621821265,"share":"https://www.laohu8.com/m/news/1113416958?lang=zh_CN&edition=full","pubTime":"2021-05-24 09:54","market":"us","language":"en","title":"Google Aims for Commercial Quantum Computer by 2029, What Would That Do to Bitcoin?<blockquote>谷歌的目标是到2029年实现商用量子计算机,这对比特币会有什么影响?</blockquote>","url":"https://stock-news.laohu8.com/highlight/detail?id=1113416958","media":"Mish Talk","summary":"Let's explore quantum computing, problems it might solve, and what it will do to current security pr","content":"<p> <b>Let's explore quantum computing, problems it might solve, and what it will do to current security protocols and blockchain.</b> <b>What is a Quantum Computer?</b></p><p><blockquote><b>让我们探索量子计算,它可能解决的问题,以及它将对当前的安全协议和区块链产生什么影响。</b><b>什么是量子计算机?</b></blockquote></p><p> The New Scientist answers the questionWhat is a Quantum Computer?</p><p><blockquote>《新科学家》回答了这个问题什么是量子计算机?</blockquote></p><p> Classical computers, which include smartphones and laptops, encode information in binary “bits” that can either be 0s or 1s. In aquantum computer, the basic unit of memory is a quantum bit or qubit.For instance, eight bits is enough for a classical computer to represent any number between 0 and 255. But eight qubits is enough for a quantum computer to represent every number between 0 and 255 at the same time. A few hundred entangled qubits would be enough to represent more numbers than there are atoms in the universe. <i>In situations where there are a large number of possible combinations, quantum computers can consider them simultaneously. Examples include trying to find the prime factors of a very large number or the best route between two places</i>. That last paragraph above exposes the problem for not just Bitcoin security but virtually all public-private key password encryption.</p><p><blockquote>包括智能手机和笔记本电脑在内的经典计算机以二进制“位”对信息进行编码,二进制“位”可以是0或1。在量子计算机中,存储器的基本单位是一个量子位或量子位。例如,对于经典计算机来说,八位足以表示0到255之间的任何数字。但八个量子比特足以让量子计算机同时表示0到255之间的每个数字。几百个纠缠量子位就足以代表比宇宙中原子还多的数字。<i>在存在大量可能组合的情况下,量子计算机可以同时考虑它们。例子包括试图找到一个非常大的数字的质因数或两个地方之间的最佳路线</i>上面最后一段不仅暴露了比特币安全问题,而且暴露了几乎所有公钥-私钥密码加密问题。</blockquote></p><p> <b>How Can 7 Bits Represent So Much?</b></p><p><blockquote><b>7位怎么能代表这么多?</b></blockquote></p><p> Technology reviewdescribes superposition.</p><p><blockquote>技术评论描述叠加。</blockquote></p><p> <i>Qubits can represent numerous possible combinations of 1 and 0 at the same time. This ability to simultaneously be in multiple states is called superposition.</i>To put qubits into superposition, researchers manipulate them using precision lasers or microwave beams.Researchers can generate pairs of qubits that are “entangled,” which means the two members of a pair exist in a single quantum state. Changing the state of one of the qubits will instantaneously change the state of the other one in a predictable way. This happens even if they are separated by very long distances. <i>Nobody really knows quite how or why entanglement works. It even baffled Einstein, who famously described it as “spooky action at a distance.” But it’s key to the power of quantum computers</i>. It takes supercooled computers and vacuum chambers to keep qubits stable long enough to perform a complex calculation.</p><p><blockquote><i>量子位可以同时表示1和0的多种可能组合。这种同时处于多种状态的能力被称为叠加。</i>为了将量子位叠加,研究人员使用精密激光或微波束来操纵它们。研究人员可以生成“纠缠”的量子比特对,这意味着一对中的两个成员存在于单个量子态中。改变其中一个量子位的状态会以可预测的方式瞬间改变另一个量子位的状态。即使它们相隔很远,也会发生这种情况。<i>没有人真正知道纠缠是如何或为什么起作用的。这甚至让爱因斯坦感到困惑,他将其描述为“远处的幽灵般的动作”。但这是量子计算机强大的关键</i>需要过冷的计算机和真空室来保持量子位稳定足够长的时间来执行复杂的计算。</blockquote></p><p> The potential is immense.</p><p><blockquote>潜力是巨大的。</blockquote></p><p> Airbus, for instance, is using them to help calculate the most fuel-efficient ascent and descent paths for aircraft. And Volkswagen has unveiled a service that calculates the optimal routes for buses and taxis in cities in order to minimize congestion. <b>Google's Aim</b></p><p><blockquote>例如,空中客车公司正在使用它们来帮助计算飞机最省油的上升和下降路径。大众汽车推出了一项服务,可以计算城市中公交车和出租车的最佳路线,以最大限度地减少拥堵。<b>谷歌的目标</b></blockquote></p><p> The Wall Street Journal reportsGoogle Aims for Commercial-Grade Quantum Computer by 2029</p><p><blockquote>《华尔街日报》报道谷歌的目标是到2029年推出商业级量子计算机</blockquote></p><p> Alphabet Inc.’s Google plans to spend several billion dollars to build a quantum computer by 2029 that can perform large-scale business and scientific calculations without errors, said Hartmut Neven, a distinguished scientist at Google who oversees the company’s Quantum AI program. The company recently opened an expanded California-based campus focused on the effort, he said.“We are at this inflection point,” said Dr. Neven, who has been researching quantum computing at Google since 2006. “We now have the important components in hand that make us confident. We know how to execute the road map.”Google is interested in many potential uses for the technology, such as building more energy-efficient batteries, creating a new process of making fertilizer that emits less carbon dioxide and speeding up training for machine-learning, a branch of artificial intelligence, Dr. Neven said. <i>For those and other use cases, Google says it will need to build a 1-million-qubit machine capable of performing reliable calculations without errors. Its current systems have less than 100 qubits</i>. <b>What About Bitcoin?</b></p><p><blockquote>Alphabet公司旗下的谷歌计划在2029年之前斥资数十亿美元建造一台量子计算机,该计算机可以毫无错误地执行大规模商业和科学计算,谷歌负责监督该公司量子人工智能项目的杰出科学家Hartmut Neven表示。他说,该公司最近在加州开设了一个扩建的园区,专注于这项工作。“我们正处于这个拐点,”自2006年以来一直在谷歌研究量子计算的内文博士说。“我们现在有了让我们充满信心的重要组件。我们知道如何执行路线图。”内文博士说,谷歌对这项技术的许多潜在用途很感兴趣,例如制造更节能的电池,创造一种二氧化碳排放量更少的肥料制造新工艺,以及加快人工智能的一个分支机器学习的训练。<i>对于这些和其他用例,谷歌表示,它需要构建一台100万量子位的机器,能够执行可靠的计算而不会出错。它目前的系统只有不到100个量子位</i>.<b>那比特币呢?</b></blockquote></p><p> Deloitte discussesQuantum Computers and the Bitcoin Blockchain.</p><p><blockquote>德勤讨论量子计算机和比特币区块链。</blockquote></p><p></p><p> Since Google announced that it achieved quantum supremacy there has been an increasing number of articles on the web predicting the demise of currently used cryptography in general, and Bitcoin in particular. The goal of this article is to present a balanced view regarding the risks that quantum computers pose to Bitcoin.All known (classical) algorithms to derive the private key from the public key require an astronomical amount of time to perform such a computation and are therefore not practical. However, in 1994, the mathematician Peter Shor published a quantum algorithm that can break the security assumption of the most common algorithms of asymmetric cryptography. This means that anyone with a sufficiently large quantum computer could use this algorithm to derive a private key from its corresponding public key, and thus, falsify any digital signature.The prerequisite of being “quantum safe” is that the public key associated with this address is not public. But as we explained above, the moment you want to transfer coins from such a “safe” address, you also reveal the public key, making the address vulnerable. From that moment until your transaction is “mined”, an attacker who possesses a quantum computer gets a window of opportunity to steal your coins.In such an attack, the adversary will first derive your private key from the public key and then initiate a competing transaction to their own address. They will try to get priority over the original transaction by offering a higher mining fee.In the Bitcoin blockchain it currently takes about 10 minutes for transactions to be mined (unless the network is congested which has happened frequently in the past). As long as it takes a quantum computer longer to derive the private key of a specific public key then the network should be safe against a quantum attack. Current scientific estimations predict that a quantum computer will take about 8 hours to break an RSA key, and some specific calculations predict that a Bitcoin signature could be hacked within 30 minutes. There's much more to the article including some advice for Bitcoin holders about public keys that needs to be addressed now.</p><p><blockquote>自从谷歌宣布它实现了量子霸权以来,网络上越来越多的文章预测当前使用的密码学,特别是比特币的消亡。本文的目标是就量子计算机给比特币带来的风险提出一个平衡的观点。从公钥导出私钥的所有已知(经典)算法都需要天文数字的时间来执行这样的计算,因此是不实用的。然而,在1994年,数学家Peter Shor发表了一种量子算法,可以打破非对称密码学最常见算法的安全性假设。这意味着任何拥有足够大的量子计算机的人都可以使用这种算法从其相应的公钥中导出私钥,从而伪造任何数字签名。“量子安全”的前提是与这个地址关联的公钥不公开。但正如我们上面解释的,当你想从这样一个“安全”的地址转移硬币时,你也暴露了公钥,使地址容易受到攻击。从那一刻起,直到你的交易被“挖掘”,拥有量子计算机的攻击者就有机会窃取你的硬币。在这种攻击中,对手将首先从公钥中导出您的私钥,然后向他们自己的地址发起竞争事务。他们将试图通过提供更高的挖矿费来获得相对于原始交易的优先权。在比特币区块链,目前挖掘交易大约需要10分钟(除非网络拥塞,这在过去经常发生)。只要量子计算机需要更长的时间来导出特定公钥的私钥,那么网络就应该是安全的,不会受到量子攻击。目前的科学估计预测,一台量子计算机大约需要8个小时才能破解一个RSA密钥,一些具体的计算预测,一个比特币签名可以在30分钟内被黑。这篇文章还有更多内容,包括给比特币持有者一些关于公钥的建议,这些建议现在需要解决。</blockquote></p><p> But if quantum computers ever become fast enough, the security of the entire blockchain will melt down.</p><p><blockquote>但如果量子计算机变得足够快,整个区块链的安全性将会崩溃。</blockquote></p><p> Deloitte notes the only solution is ‘post-quantum cryptography’ to build robust and future-proof blockchain applications.</p><p><blockquote>德勤指出,唯一的解决方案是“后量子加密”,以构建健壮且经得起未来考验的区块链应用程序。</blockquote></p><p> That caution applies not only to Bitcoin but to any existing application that uses public-private keys.</p><p><blockquote>这种谨慎不仅适用于比特币,也适用于任何使用公私钥的现有应用程序。</blockquote></p><p> <b>How Does This Work?</b></p><p><blockquote><b>这是如何工作的?</b></blockquote></p><p> <img src=\"https://static.tigerbbs.com/8caf2b59c1d52a65584fc84154f89c93\" tg-width=\"572\" tg-height=\"525\"><b>Post Quantum Cryptography</b></p><p><blockquote><b>后量子密码</b></blockquote></p><p> Wikipedia has an excellent discussion ofPost-quantum cryptography</p><p><blockquote>维基百科有一个关于后量子密码学的精彩讨论</blockquote></p><p> One of the simple proposed solutions is to double the key size but there are practical considerations.</p><p><blockquote>提出的简单解决方案之一是将密钥大小加倍,但有实际的考虑。</blockquote></p><p> <i>A practical consideration on a choice among post-quantum cryptographic algorithms is the effort required to send public keys over the internet</i>.The Open Quantum Safe project was started in late 2016 and has the goal of developing and prototyping quantum-resistant cryptography. It aims to integrate current post-quantum schemes in one library. The Open Quantum Safe project currently supports 6 algorithms.</p><p><blockquote><i>在后量子密码算法中进行选择的一个实际考虑是通过互联网发送公钥所需的努力</i>开放量子安全项目于2016年底启动,目标是开发和原型化抗量子密码学。它旨在将当前的后量子方案集成到一个库中。开放量子保险箱项目目前支持6种算法。</blockquote></p><p> Beyond that,Forward Secrecy allows the use of one-time keys, generated at random.</p><p><blockquote>除此之外,前向保密允许使用随机生成的一次性密钥。</blockquote></p><p> Forward secrecy protects data on the transport layer of a network that uses common SSL/TLS protocols, including OpenSSL, when its long-term secret keys are compromised, as with the Heartbleed security bug. If forward secrecy is used, encrypted communications and sessions recorded in the past cannot be retrieved and decrypted should long-term secret keys or passwords be compromised in the future, even if the adversary actively interfered, for example via a man-in-the-middle attack.The value of forward secrecy is that it protects past communication. This reduces the motivation for attackers to compromise keys. For instance, if an attacker learns a long-term key, but the compromise is detected and the long-term key is revoked and updated, relatively little information is leaked in a forward secure system. Things may not be quite as simple as simply saying double the key size.</p><p><blockquote>前向保密保护使用常见SSL/TLS协议(包括OpenSSL)的网络传输层上的数据,当其长期密钥被泄露时,就像Heartbleed安全漏洞一样。如果使用前向保密,则如果将来长期密钥或密码被泄露,即使对手主动干扰,例如通过中间人攻击,也无法检索和解密过去记录的加密通信和会话。前向保密的价值在于它保护了过去的通信。这降低了攻击者危害密钥的动机。例如,如果攻击者获知长期密钥,但检测到危害并且长期密钥被撤销和更新,则在前向安全系统中相对较少的信息被泄露。事情可能不像简单地说加倍密钥大小那么简单。</blockquote></p><p></p>","source":"lsy1620736834627","collect":0,"html":"<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=utf-8\" />\n<meta name=\"viewport\" content=\"width=device-width,initial-scale=1.0,minimum-scale=1.0,maximum-scale=1.0,user-scalable=no\"/>\n<meta name=\"format-detection\" content=\"telephone=no,email=no,address=no\" />\n<title>Google Aims for Commercial Quantum Computer by 2029, What Would That Do to Bitcoin?<blockquote>谷歌的目标是到2029年实现商用量子计算机,这对比特币会有什么影响?</blockquote></title>\n<style type=\"text/css\">\na,abbr,acronym,address,applet,article,aside,audio,b,big,blockquote,body,canvas,caption,center,cite,code,dd,del,details,dfn,div,dl,dt,\nem,embed,fieldset,figcaption,figure,footer,form,h1,h2,h3,h4,h5,h6,header,hgroup,html,i,iframe,img,ins,kbd,label,legend,li,mark,menu,nav,\nobject,ol,output,p,pre,q,ruby,s,samp,section,small,span,strike,strong,sub,summary,sup,table,tbody,td,tfoot,th,thead,time,tr,tt,u,ul,var,video{ font:inherit;margin:0;padding:0;vertical-align:baseline;border:0 }\nbody{ font-size:16px; line-height:1.5; color:#999; background:transparent; }\n.wrapper{ overflow:hidden;word-break:break-all;padding:10px; }\nh1,h2{ font-weight:normal; line-height:1.35; margin-bottom:.6em; }\nh3,h4,h5,h6{ line-height:1.35; margin-bottom:1em; }\nh1{ font-size:24px; }\nh2{ font-size:20px; }\nh3{ font-size:18px; }\nh4{ font-size:16px; }\nh5{ font-size:14px; }\nh6{ font-size:12px; }\np,ul,ol,blockquote,dl,table{ margin:1.2em 0; }\nul,ol{ margin-left:2em; }\nul{ list-style:disc; }\nol{ list-style:decimal; }\nli,li p{ margin:10px 0;}\nimg{ max-width:100%;display:block;margin:0 auto 1em; }\nblockquote{ color:#B5B2B1; border-left:3px solid #aaa; padding:1em; }\nstrong,b{font-weight:bold;}\nem,i{font-style:italic;}\ntable{ width:100%;border-collapse:collapse;border-spacing:1px;margin:1em 0;font-size:.9em; }\nth,td{ padding:5px;text-align:left;border:1px solid #aaa; }\nth{ font-weight:bold;background:#5d5d5d; }\n.symbol-link{font-weight:bold;}\n/* header{ border-bottom:1px solid #494756; } */\n.title{ margin:0 0 8px;line-height:1.3;color:#ddd; }\n.meta {color:#5e5c6d;font-size:13px;margin:0 0 .5em; }\na{text-decoration:none; color:#2a4b87;}\n.meta .head { display: inline-block; overflow: hidden}\n.head .h-thumb { width: 30px; height: 30px; margin: 0; padding: 0; border-radius: 50%; float: left;}\n.head .h-content { margin: 0; padding: 0 0 0 9px; float: left;}\n.head .h-name {font-size: 13px; color: #eee; margin: 0;}\n.head .h-time {font-size: 12.5px; color: #7E829C; margin: 0;}\n.small {font-size: 12.5px; display: inline-block; transform: scale(0.9); -webkit-transform: scale(0.9); transform-origin: left; -webkit-transform-origin: left;}\n.smaller {font-size: 12.5px; display: inline-block; transform: scale(0.8); -webkit-transform: scale(0.8); transform-origin: left; -webkit-transform-origin: left;}\n.bt-text {font-size: 12px;margin: 1.5em 0 0 0}\n.bt-text p {margin: 0}\n</style>\n</head>\n<body>\n<div class=\"wrapper\">\n<header>\n<h2 class=\"title\">\nGoogle Aims for Commercial Quantum Computer by 2029, What Would That Do to Bitcoin?<blockquote>谷歌的目标是到2029年实现商用量子计算机,这对比特币会有什么影响?</blockquote>\n</h2>\n<h4 class=\"meta\">\n<p class=\"head\">\n<strong class=\"h-name small\">Mish Talk</strong><span class=\"h-time small\">2021-05-24 09:54</span>\n</p>\n</h4>\n</header>\n<article>\n<p> <b>Let's explore quantum computing, problems it might solve, and what it will do to current security protocols and blockchain.</b> <b>What is a Quantum Computer?</b></p><p><blockquote><b>让我们探索量子计算,它可能解决的问题,以及它将对当前的安全协议和区块链产生什么影响。</b><b>什么是量子计算机?</b></blockquote></p><p> The New Scientist answers the questionWhat is a Quantum Computer?</p><p><blockquote>《新科学家》回答了这个问题什么是量子计算机?</blockquote></p><p> Classical computers, which include smartphones and laptops, encode information in binary “bits” that can either be 0s or 1s. In aquantum computer, the basic unit of memory is a quantum bit or qubit.For instance, eight bits is enough for a classical computer to represent any number between 0 and 255. But eight qubits is enough for a quantum computer to represent every number between 0 and 255 at the same time. A few hundred entangled qubits would be enough to represent more numbers than there are atoms in the universe. <i>In situations where there are a large number of possible combinations, quantum computers can consider them simultaneously. Examples include trying to find the prime factors of a very large number or the best route between two places</i>. That last paragraph above exposes the problem for not just Bitcoin security but virtually all public-private key password encryption.</p><p><blockquote>包括智能手机和笔记本电脑在内的经典计算机以二进制“位”对信息进行编码,二进制“位”可以是0或1。在量子计算机中,存储器的基本单位是一个量子位或量子位。例如,对于经典计算机来说,八位足以表示0到255之间的任何数字。但八个量子比特足以让量子计算机同时表示0到255之间的每个数字。几百个纠缠量子位就足以代表比宇宙中原子还多的数字。<i>在存在大量可能组合的情况下,量子计算机可以同时考虑它们。例子包括试图找到一个非常大的数字的质因数或两个地方之间的最佳路线</i>上面最后一段不仅暴露了比特币安全问题,而且暴露了几乎所有公钥-私钥密码加密问题。</blockquote></p><p> <b>How Can 7 Bits Represent So Much?</b></p><p><blockquote><b>7位怎么能代表这么多?</b></blockquote></p><p> Technology reviewdescribes superposition.</p><p><blockquote>技术评论描述叠加。</blockquote></p><p> <i>Qubits can represent numerous possible combinations of 1 and 0 at the same time. This ability to simultaneously be in multiple states is called superposition.</i>To put qubits into superposition, researchers manipulate them using precision lasers or microwave beams.Researchers can generate pairs of qubits that are “entangled,” which means the two members of a pair exist in a single quantum state. Changing the state of one of the qubits will instantaneously change the state of the other one in a predictable way. This happens even if they are separated by very long distances. <i>Nobody really knows quite how or why entanglement works. It even baffled Einstein, who famously described it as “spooky action at a distance.” But it’s key to the power of quantum computers</i>. It takes supercooled computers and vacuum chambers to keep qubits stable long enough to perform a complex calculation.</p><p><blockquote><i>量子位可以同时表示1和0的多种可能组合。这种同时处于多种状态的能力被称为叠加。</i>为了将量子位叠加,研究人员使用精密激光或微波束来操纵它们。研究人员可以生成“纠缠”的量子比特对,这意味着一对中的两个成员存在于单个量子态中。改变其中一个量子位的状态会以可预测的方式瞬间改变另一个量子位的状态。即使它们相隔很远,也会发生这种情况。<i>没有人真正知道纠缠是如何或为什么起作用的。这甚至让爱因斯坦感到困惑,他将其描述为“远处的幽灵般的动作”。但这是量子计算机强大的关键</i>需要过冷的计算机和真空室来保持量子位稳定足够长的时间来执行复杂的计算。</blockquote></p><p> The potential is immense.</p><p><blockquote>潜力是巨大的。</blockquote></p><p> Airbus, for instance, is using them to help calculate the most fuel-efficient ascent and descent paths for aircraft. And Volkswagen has unveiled a service that calculates the optimal routes for buses and taxis in cities in order to minimize congestion. <b>Google's Aim</b></p><p><blockquote>例如,空中客车公司正在使用它们来帮助计算飞机最省油的上升和下降路径。大众汽车推出了一项服务,可以计算城市中公交车和出租车的最佳路线,以最大限度地减少拥堵。<b>谷歌的目标</b></blockquote></p><p> The Wall Street Journal reportsGoogle Aims for Commercial-Grade Quantum Computer by 2029</p><p><blockquote>《华尔街日报》报道谷歌的目标是到2029年推出商业级量子计算机</blockquote></p><p> Alphabet Inc.’s Google plans to spend several billion dollars to build a quantum computer by 2029 that can perform large-scale business and scientific calculations without errors, said Hartmut Neven, a distinguished scientist at Google who oversees the company’s Quantum AI program. The company recently opened an expanded California-based campus focused on the effort, he said.“We are at this inflection point,” said Dr. Neven, who has been researching quantum computing at Google since 2006. “We now have the important components in hand that make us confident. We know how to execute the road map.”Google is interested in many potential uses for the technology, such as building more energy-efficient batteries, creating a new process of making fertilizer that emits less carbon dioxide and speeding up training for machine-learning, a branch of artificial intelligence, Dr. Neven said. <i>For those and other use cases, Google says it will need to build a 1-million-qubit machine capable of performing reliable calculations without errors. Its current systems have less than 100 qubits</i>. <b>What About Bitcoin?</b></p><p><blockquote>Alphabet公司旗下的谷歌计划在2029年之前斥资数十亿美元建造一台量子计算机,该计算机可以毫无错误地执行大规模商业和科学计算,谷歌负责监督该公司量子人工智能项目的杰出科学家Hartmut Neven表示。他说,该公司最近在加州开设了一个扩建的园区,专注于这项工作。“我们正处于这个拐点,”自2006年以来一直在谷歌研究量子计算的内文博士说。“我们现在有了让我们充满信心的重要组件。我们知道如何执行路线图。”内文博士说,谷歌对这项技术的许多潜在用途很感兴趣,例如制造更节能的电池,创造一种二氧化碳排放量更少的肥料制造新工艺,以及加快人工智能的一个分支机器学习的训练。<i>对于这些和其他用例,谷歌表示,它需要构建一台100万量子位的机器,能够执行可靠的计算而不会出错。它目前的系统只有不到100个量子位</i>.<b>那比特币呢?</b></blockquote></p><p> Deloitte discussesQuantum Computers and the Bitcoin Blockchain.</p><p><blockquote>德勤讨论量子计算机和比特币区块链。</blockquote></p><p></p><p> Since Google announced that it achieved quantum supremacy there has been an increasing number of articles on the web predicting the demise of currently used cryptography in general, and Bitcoin in particular. The goal of this article is to present a balanced view regarding the risks that quantum computers pose to Bitcoin.All known (classical) algorithms to derive the private key from the public key require an astronomical amount of time to perform such a computation and are therefore not practical. However, in 1994, the mathematician Peter Shor published a quantum algorithm that can break the security assumption of the most common algorithms of asymmetric cryptography. This means that anyone with a sufficiently large quantum computer could use this algorithm to derive a private key from its corresponding public key, and thus, falsify any digital signature.The prerequisite of being “quantum safe” is that the public key associated with this address is not public. But as we explained above, the moment you want to transfer coins from such a “safe” address, you also reveal the public key, making the address vulnerable. From that moment until your transaction is “mined”, an attacker who possesses a quantum computer gets a window of opportunity to steal your coins.In such an attack, the adversary will first derive your private key from the public key and then initiate a competing transaction to their own address. They will try to get priority over the original transaction by offering a higher mining fee.In the Bitcoin blockchain it currently takes about 10 minutes for transactions to be mined (unless the network is congested which has happened frequently in the past). As long as it takes a quantum computer longer to derive the private key of a specific public key then the network should be safe against a quantum attack. Current scientific estimations predict that a quantum computer will take about 8 hours to break an RSA key, and some specific calculations predict that a Bitcoin signature could be hacked within 30 minutes. There's much more to the article including some advice for Bitcoin holders about public keys that needs to be addressed now.</p><p><blockquote>自从谷歌宣布它实现了量子霸权以来,网络上越来越多的文章预测当前使用的密码学,特别是比特币的消亡。本文的目标是就量子计算机给比特币带来的风险提出一个平衡的观点。从公钥导出私钥的所有已知(经典)算法都需要天文数字的时间来执行这样的计算,因此是不实用的。然而,在1994年,数学家Peter Shor发表了一种量子算法,可以打破非对称密码学最常见算法的安全性假设。这意味着任何拥有足够大的量子计算机的人都可以使用这种算法从其相应的公钥中导出私钥,从而伪造任何数字签名。“量子安全”的前提是与这个地址关联的公钥不公开。但正如我们上面解释的,当你想从这样一个“安全”的地址转移硬币时,你也暴露了公钥,使地址容易受到攻击。从那一刻起,直到你的交易被“挖掘”,拥有量子计算机的攻击者就有机会窃取你的硬币。在这种攻击中,对手将首先从公钥中导出您的私钥,然后向他们自己的地址发起竞争事务。他们将试图通过提供更高的挖矿费来获得相对于原始交易的优先权。在比特币区块链,目前挖掘交易大约需要10分钟(除非网络拥塞,这在过去经常发生)。只要量子计算机需要更长的时间来导出特定公钥的私钥,那么网络就应该是安全的,不会受到量子攻击。目前的科学估计预测,一台量子计算机大约需要8个小时才能破解一个RSA密钥,一些具体的计算预测,一个比特币签名可以在30分钟内被黑。这篇文章还有更多内容,包括给比特币持有者一些关于公钥的建议,这些建议现在需要解决。</blockquote></p><p> But if quantum computers ever become fast enough, the security of the entire blockchain will melt down.</p><p><blockquote>但如果量子计算机变得足够快,整个区块链的安全性将会崩溃。</blockquote></p><p> Deloitte notes the only solution is ‘post-quantum cryptography’ to build robust and future-proof blockchain applications.</p><p><blockquote>德勤指出,唯一的解决方案是“后量子加密”,以构建健壮且经得起未来考验的区块链应用程序。</blockquote></p><p> That caution applies not only to Bitcoin but to any existing application that uses public-private keys.</p><p><blockquote>这种谨慎不仅适用于比特币,也适用于任何使用公私钥的现有应用程序。</blockquote></p><p> <b>How Does This Work?</b></p><p><blockquote><b>这是如何工作的?</b></blockquote></p><p> <img src=\"https://static.tigerbbs.com/8caf2b59c1d52a65584fc84154f89c93\" tg-width=\"572\" tg-height=\"525\"><b>Post Quantum Cryptography</b></p><p><blockquote><b>后量子密码</b></blockquote></p><p> Wikipedia has an excellent discussion ofPost-quantum cryptography</p><p><blockquote>维基百科有一个关于后量子密码学的精彩讨论</blockquote></p><p> One of the simple proposed solutions is to double the key size but there are practical considerations.</p><p><blockquote>提出的简单解决方案之一是将密钥大小加倍,但有实际的考虑。</blockquote></p><p> <i>A practical consideration on a choice among post-quantum cryptographic algorithms is the effort required to send public keys over the internet</i>.The Open Quantum Safe project was started in late 2016 and has the goal of developing and prototyping quantum-resistant cryptography. It aims to integrate current post-quantum schemes in one library. The Open Quantum Safe project currently supports 6 algorithms.</p><p><blockquote><i>在后量子密码算法中进行选择的一个实际考虑是通过互联网发送公钥所需的努力</i>开放量子安全项目于2016年底启动,目标是开发和原型化抗量子密码学。它旨在将当前的后量子方案集成到一个库中。开放量子保险箱项目目前支持6种算法。</blockquote></p><p> Beyond that,Forward Secrecy allows the use of one-time keys, generated at random.</p><p><blockquote>除此之外,前向保密允许使用随机生成的一次性密钥。</blockquote></p><p> Forward secrecy protects data on the transport layer of a network that uses common SSL/TLS protocols, including OpenSSL, when its long-term secret keys are compromised, as with the Heartbleed security bug. If forward secrecy is used, encrypted communications and sessions recorded in the past cannot be retrieved and decrypted should long-term secret keys or passwords be compromised in the future, even if the adversary actively interfered, for example via a man-in-the-middle attack.The value of forward secrecy is that it protects past communication. This reduces the motivation for attackers to compromise keys. For instance, if an attacker learns a long-term key, but the compromise is detected and the long-term key is revoked and updated, relatively little information is leaked in a forward secure system. Things may not be quite as simple as simply saying double the key size.</p><p><blockquote>前向保密保护使用常见SSL/TLS协议(包括OpenSSL)的网络传输层上的数据,当其长期密钥被泄露时,就像Heartbleed安全漏洞一样。如果使用前向保密,则如果将来长期密钥或密码被泄露,即使对手主动干扰,例如通过中间人攻击,也无法检索和解密过去记录的加密通信和会话。前向保密的价值在于它保护了过去的通信。这降低了攻击者危害密钥的动机。例如,如果攻击者获知长期密钥,但检测到危害并且长期密钥被撤销和更新,则在前向安全系统中相对较少的信息被泄露。事情可能不像简单地说加倍密钥大小那么简单。</blockquote></p><p></p>\n<div class=\"bt-text\">\n\n\n<p> 来源:<a href=\"https://mishtalk.com/economics/google-aims-for-commercial-quantum-computer-by-2029-what-would-that-do-to-bitcoin\">Mish Talk</a></p>\n<p>为提升您的阅读体验,我们对本页面进行了排版优化</p>\n\n\n</div>\n</article>\n</div>\n</body>\n</html>\n","type":0,"thumbnail":"","relate_stocks":{"GOOGL":"谷歌A","GOOG":"谷歌"},"source_url":"https://mishtalk.com/economics/google-aims-for-commercial-quantum-computer-by-2029-what-would-that-do-to-bitcoin","is_english":true,"share_image_url":"https://static.laohu8.com/e9f99090a1c2ed51c021029395664489","article_id":"1113416958","content_text":"Let's explore quantum computing, problems it might solve, and what it will do to current security protocols and blockchain.\n\nWhat is a Quantum Computer?\nThe New Scientist answers the questionWhat is a Quantum Computer?\n\n Classical computers, which include smartphones and laptops, encode information in binary “bits” that can either be 0s or 1s. In aquantum computer, the basic unit of memory is a quantum bit or qubit.For instance, eight bits is enough for a classical computer to represent any number between 0 and 255. But eight qubits is enough for a quantum computer to represent every number between 0 and 255 at the same time. A few hundred entangled qubits would be enough to represent more numbers than there are atoms in the universe.\n In situations where there are a large number of possible combinations, quantum computers can consider them simultaneously. Examples include trying to find the prime factors of a very large number or the best route between two places.\n\nThat last paragraph above exposes the problem for not just Bitcoin security but virtually all public-private key password encryption.\nHow Can 7 Bits Represent So Much?\nTechnology reviewdescribes superposition.\n\nQubits can represent numerous possible combinations of 1 and 0 at the same time. This ability to simultaneously be in multiple states is called superposition.To put qubits into superposition, researchers manipulate them using precision lasers or microwave beams.Researchers can generate pairs of qubits that are “entangled,” which means the two members of a pair exist in a single quantum state. Changing the state of one of the qubits will instantaneously change the state of the other one in a predictable way. This happens even if they are separated by very long distances.\n Nobody really knows quite how or why entanglement works. It even baffled Einstein, who famously described it as “spooky action at a distance.” But it’s key to the power of quantum computers.\n\nIt takes supercooled computers and vacuum chambers to keep qubits stable long enough to perform a complex calculation.\nThe potential is immense.\n\n Airbus, for instance, is using them to help calculate the most fuel-efficient ascent and descent paths for aircraft. And Volkswagen has unveiled a service that calculates the optimal routes for buses and taxis in cities in order to minimize congestion.\n\nGoogle's Aim\nThe Wall Street Journal reportsGoogle Aims for Commercial-Grade Quantum Computer by 2029\n\n Alphabet Inc.’s Google plans to spend several billion dollars to build a quantum computer by 2029 that can perform large-scale business and scientific calculations without errors, said Hartmut Neven, a distinguished scientist at Google who oversees the company’s Quantum AI program. The company recently opened an expanded California-based campus focused on the effort, he said.“We are at this inflection point,” said Dr. Neven, who has been researching quantum computing at Google since 2006. “We now have the important components in hand that make us confident. We know how to execute the road map.”Google is interested in many potential uses for the technology, such as building more energy-efficient batteries, creating a new process of making fertilizer that emits less carbon dioxide and speeding up training for machine-learning, a branch of artificial intelligence, Dr. Neven said.\n For those and other use cases, Google says it will need to build a 1-million-qubit machine capable of performing reliable calculations without errors. Its current systems have less than 100 qubits.\n\nWhat About Bitcoin?\nDeloitte discussesQuantum Computers and the Bitcoin Blockchain.\n\n Since Google announced that it achieved quantum supremacy there has been an increasing number of articles on the web predicting the demise of currently used cryptography in general, and Bitcoin in particular. The goal of this article is to present a balanced view regarding the risks that quantum computers pose to Bitcoin.All known (classical) algorithms to derive the private key from the public key require an astronomical amount of time to perform such a computation and are therefore not practical. However, in 1994, the mathematician Peter Shor published a quantum algorithm that can break the security assumption of the most common algorithms of asymmetric cryptography. This means that anyone with a sufficiently large quantum computer could use this algorithm to derive a private key from its corresponding public key, and thus, falsify any digital signature.The prerequisite of being “quantum safe” is that the public key associated with this address is not public. But as we explained above, the moment you want to transfer coins from such a “safe” address, you also reveal the public key, making the address vulnerable. From that moment until your transaction is “mined”, an attacker who possesses a quantum computer gets a window of opportunity to steal your coins.In such an attack, the adversary will first derive your private key from the public key and then initiate a competing transaction to their own address. They will try to get priority over the original transaction by offering a higher mining fee.In the Bitcoin blockchain it currently takes about 10 minutes for transactions to be mined (unless the network is congested which has happened frequently in the past). As long as it takes a quantum computer longer to derive the private key of a specific public key then the network should be safe against a quantum attack. Current scientific estimations predict that a quantum computer will take about 8 hours to break an RSA key, and some specific calculations predict that a Bitcoin signature could be hacked within 30 minutes.\n\nThere's much more to the article including some advice for Bitcoin holders about public keys that needs to be addressed now.\nBut if quantum computers ever become fast enough, the security of the entire blockchain will melt down.\nDeloitte notes the only solution is ‘post-quantum cryptography’ to build robust and future-proof blockchain applications.\nThat caution applies not only to Bitcoin but to any existing application that uses public-private keys.\nHow Does This Work?\nPost Quantum Cryptography\nWikipedia has an excellent discussion ofPost-quantum cryptography\nOne of the simple proposed solutions is to double the key size but there are practical considerations.\n\nA practical consideration on a choice among post-quantum cryptographic algorithms is the effort required to send public keys over the internet.The Open Quantum Safe project was started in late 2016 and has the goal of developing and prototyping quantum-resistant cryptography. It aims to integrate current post-quantum schemes in one library.\n\nThe Open Quantum Safe project currently supports 6 algorithms.\nBeyond that,Forward Secrecy allows the use of one-time keys, generated at random.\n\n Forward secrecy protects data on the transport layer of a network that uses common SSL/TLS protocols, including OpenSSL, when its long-term secret keys are compromised, as with the Heartbleed security bug. If forward secrecy is used, encrypted communications and sessions recorded in the past cannot be retrieved and decrypted should long-term secret keys or passwords be compromised in the future, even if the adversary actively interfered, for example via a man-in-the-middle attack.The value of forward secrecy is that it protects past communication. This reduces the motivation for attackers to compromise keys. For instance, if an attacker learns a long-term key, but the compromise is detected and the long-term key is revoked and updated, relatively little information is leaked in a forward secure system.\n\nThings may not be quite as simple as simply saying double the key size.","news_type":1,"symbols_score_info":{"GOOGL":0.9,"GOOG":0.9}},"isVote":1,"tweetType":1,"viewCount":3005,"commentLimit":10,"likeStatus":false,"favoriteStatus":false,"reportStatus":false,"symbols":[],"verified":2,"subType":0,"readableState":1,"langContent":"EN","currentLanguage":"EN","warmUpFlag":false,"orderFlag":false,"shareable":true,"causeOfNotShareable":"","featuresForAnalytics":[],"commentAndTweetFlag":false,"andRepostAutoSelectedFlag":false,"upFlag":false,"length":4,"xxTargetLangEnum":"ORIG"},"commentList":[],"isCommentEnd":true,"isTiger":false,"isWeiXinMini":false,"url":"/m/post/131983039"}
精彩评论