gtag('config', 'G-0PFHD683JR');
Price Prediction

Today’s penetration, crack tomorrow? How to provide safe quantity tools Blockchain

Abstract and 1. Introduction

2. Context

2.1. Quantitative computing as a threat to encryption

2.2. Current methods of quantum safe encryption

2.3. Blockchain and Lacchain Blockchain

3. Blockchain technology vulnerability with quantum computing

4. A suggestion for the quantum Blockchain network

5. Implementation and 5.1 generation and distribution of quantum entropy

5.2. Generating post -quarter certificates

5.3. Capitalization of communication between the contract using a quantum safe encryption

5.4. Signing transactions using post -quarter switches

5.5. Check the Signature Series after a quarter

6. The following conclusions and steps, recognition, and references

3 weaknesses in Blockchain technology with the appearance of quantum computing

The appearance of quantum computing is a new model in which digital technologies will bear both challenges and opportunities. Threats will appear in a variety of shapes, especially when strong quantum computers are able to break many important encryption algorithms currently used. Blockchain, as a technique that is strongly dependent on encryption, is not safe from these threats. As mentioned in [67]It is worth exploring Blockchain technology and quantum computing in the following four areas.

• Digital signatures are one of the most important components of Blockchain technology. Bitcoin and Ethereum uses the ECC Curriculum encryption (ECC), especially ECDSA signatures on the SECP256K1 curve. Others, like Eosio, use the NIST SECP256R1 curve. NIST recommends replacing ECDSA and RSA signatures due to the effect of the Shor algorithm on these plans [68].

• Online communication depends on protocols such as http. Safety of contact in HTTPs occurs within the SSL/TLS staple. TLS supports one time generation (which is not quantitatively safe) with the aers for similar encryption and many insecure algorithms for exchange and authentication, such as RSA, DH, ECDH, ECDSA and DSA. This means that all Internet connections, including transactions and messages sent between applications and contract in Blockchain, will not be safe when strong quantum computers become completely operating.

• Mining ban: Blockchain networks that use work proof, as the consensus mechanism depends on finding non -issues. Quantum computers will be able to find these other issues technically faster using a GROVER algorithm [69]. However, this does not pose a major threat to the security of Blockchain networks because the solution will be easy as increasing the difficulty of compensation for the quantum advantage. In networks with consensus protocols that do not enhance the competition between the contract, such as proving the composition used in Lacchain Blockchain, this threat will not be present.

In addition, retail functions are constantly developing to increase security. For example, if the quantum computers evolve to the degree of threat to SA-2, the Sha-3 has already been unified as a substitute that provides a higher level of safety in NIST Standard Fips202 [70].

4 Suggestion of the quantum Blockchain network

As a result of this high -level analysis, it becomes clear that the threat networks facing threat networks in relation to quantum computers are mainly linked to the weak digital signatures of Blockchain transactions and weak keys used in peer communication to the network over the network. The solution that we propose does not require modification of algorithms used by the Internet or Blockchain, but it creates a layer at the top that provides quantitative safety. This solution consists of:

• Capture of the contract using post -Quantum X.509 to create TLS tunnels. As part of the plane mobility, the “post -X.509” contract is issued, from the Lacchain Certificate (CA), an extension of the X.509 certificate using the V3 extension specifications that allow the merged of new fields into accreditation data, such as the encrypted algorithms represented. In our case, these supplementary algorithms [71]. Using these certificates, the contract can create safe communications after the post -quarter that envelops data sharing via the communications protocol, which is determined by the Blockchain network. The coated data are the transactions that are broadcast by the author and blocks produced by the productive or audited contract.

• Signing transactions with a post -quarter signing with the normal signature specified in the Blockchain protocol and the creation of verification mechanisms on the chain. Our solution consists of enabling the second layer encryption scheme that allows the contract that broadcasts the transactions-the contract-to sign the signature of the post-verified quarter. This is in addition to the signing of ECDSA, which comes by default with Blockchain protocol. If the ECDSA signature has become hacked by a quantum computer, integrity is preserved by post -quarter signature. We take advantage of the post -Quantum keys associated with post -Quantum x.509 certificates for this.

For each of the packaging and the signing of transactions, we rely on entropy accredited amount to create the keys to maximum safety.

One can argue that by the time when large quantum computers are able to break the current encryption ready, Blockchain protocols will upgrade the encryption into safe algorithms after a quarter. However, given that the Blockchain networks are the notebook of a changeable professor, the “penetration today, tomorrow” base urges us to protect it now.

For example, the university can start issuing digital diplomas today and record evidence with its digital signature (ECC or RSA) in Blockchain. However, at 5, 10 or 15 years, when the quantitative computer can break this signature and discover the private key, all the previously released digital diplomas will be hacked, where the source personality can be penetrated. Moreover, there is no way to see if a person has a quantum computer with the ability to impersonate the personality of others and steal his origins without discovering them. The same logical basis can be applied to the release of a bond or the issuance of a digital currency to the Central Bank (CBDC) by the central bank.

Authors:

(1) M. Allende, IDB – Inter -MARICAN Development Bank, 1300 New York Ave, Washington DC, Usa and Lacchain – Global Alliance to develop Blockchain Environmental System in LAC;

(2) D. LOUPEZ Leon, IDB – Inter -MARICAN Development Bank, 1300 New York Ave, Washington DC, Usa and Lacchain – Global Alliance to develop the environmental Blockchain system in LAC;

(3) S. Ceron, IDB – Inter -MARICAN Development Bank, 1300 New York Ave, Washington DC, Usa and Lacchain – Global Alliance to develop Blockchain Environmental System in LAC;

(4) A. Leal, IDB – Inter -MARICAN Development Bank, 1300 New York Ave, Washington DC, USA and Lacchain – Global Alliance for Blockchain Environmental System in LAC;

(5) A. Pareja, IDB – Development Bank between Americans, 1300 New York Ave, Washington, USA, USA and Lacchain – Global Alliance for Blockchain Environmental Development in LAC;

(6) M. Da Silva, IDB – Inter -MARICAN Development Bank, 1300 New York Ave, Washington DC, Usa and Lacchain – Global Alliance to develop Blockchain Environmental System in LAC;

(7) A. Pardo, IDB – The Development Bank between America, 1300 New York Ave, Washington, USA, USA and Lacchain – Global Alliance for the Blockchain Environmental System in LAC;

(8) D. Jones, Cambridge Quantum Computing – Cambridge, United Kingdom;

(9) DJ World, Cambridge Quantum Computing – Cambridge, UK;

(10) B. Merriman, Cambridge Quantum Computing – Cambridge, United Kingdom;

(11) J. Gilmore, Cambridge Quantum Computing – Cambridge, United Kingdom;

(12) N. Kitchener, Cambridge Quantum Computing – Cambridge, United Kingdom;

(13) SE Venegas-ANDRACA, Tecnologico de Monerrey, Escuela de igenieria y Centias. Monterrey, NL Mexico.


Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button