I'm willing to pay out up to 2 Bitcoin to people or individuals who help me with a project.
The end goal is to identify (time) the exact moment (day/month/year) when a quantum computer successfully breaks a ECDSA public key on secp256k curve, in other words breaks the same kind of cryptography that secures many Bitcoins.
I need this information with 99.% accuracy for this reason, but not urgently. I need the info just days before it happens or so.
To start. I'm willing to open a faucet where people will submit info about quantum computing for example what research facilities there are, what people work there their dox etc.
In reward the users will be paid Bitcoins. Open to suggestions.
its been broken by the NSA and china for several years now. When can I expect payment?
Justin Bell
interesting idea, but you gonna get scammed so hard unless you actually understand the subject. and worse of it there will be conflicting information flowing in and entirely possible the most unlikely sounding is the correct one.
Nathan Bell
Yes I know pls send coin sir
John Sullivan
Why not just do it yourself. Lookup how many qubits IBM's quantum computer currently has. Lookup how many qubits are needed to crack RSA. Make your own projection.
Joshua Butler
I realize the thing about false information. I'm thinking about building some basic corpus of data and have a faucet where people click is this information true/false and based on their knowledge they get payout.
Luis Wilson
It's on an exponential growth curve so small deviations in calculation will lead to massive differences in time deltas. You might as well be trying to guess the exact time of the singularity.
Henry Wright
I'm well versed in neural networks and ai. Dev time is not the problem for me, so isn't the money. Although I'm not too rich.
Jaxson Murphy
what's stopping anyone knowledgeable on the subject to fill the test 100 times and give you different answers (basically worthless guesswork) altho within margin of error?
Luis Roberts
Here's a brainlet rundown so you don't have to pay big money for things any idiot should be able to google.
ECDSA works on the hidden subgroup problem (en.wikipedia.org/wiki/Hidden_subgroup_problem) which itself builds on the "integer factorization" and "discrete logarithmic factorization" problems. These algorithms can be assumed to be safe since neither problem can be solved in a reasonable timeframe (exponential runtime in the number of bits)
A polynomial solution exists (Shor's Algorithm en.wikipedia.org/wiki/Shor's_algorithm) although you need a quantum computer to implement it. First quantum computer implementations already successfully factorized 15 (5x3), the smallest non-trivial problem in the set.
The first time a big number is solved for by a quantum computer will be big news, and you'll definitely hear about it in time. Quantum computation will (probably) remain a very specialized field only available to governments or universitites. The odds of someone attacking you specifically are very slim.
If you want futureproofing you can just use an algorithm not based on a hidden subgroup problem and be "quantum resistant" right now. The signatures are just 50x as large then.
Christopher Scott
he probably wants to dump all his crypto a day before the new breaks and full blown panic crashes the markets. maybe even shorting.
Charles Adams
I know they factored 5*3. I need to know how it relates to solving the P = nQ on curve.
Sorry I'm brainlet in this area.
Also post your addresses guyse.
Liam Torres
i don't usually just curious what you have in mind 178kkoKMUN3dgi41JpfCENdLwZo7SU3h4K
Gavin Taylor
sadly they are not exactly very vocal on the current state of their quantum machines, so it's hard to tell how far exactly they are.
I'm not aware of an exact qbits-per-bit-of-data number required to break an X-bit key cipher, but I'd guess less or equal than 1:1, and I remember Dwave (?) rolling out a 256 qbit computer sometime last year.
Will post address once my btc wallet is done updating block indices in 2515AD
Bentley Walker
Also post the guess when it happens. Date month year. If true u get your bux.
I know. Fortunately the time is on my side. It could take decades at that time i could have fully trained prediction neural network and a fairly accurate prediction.
Logan Peterson
OP have you seen the Bitcoin Supercollider yet?
Christopher Ward
Yes I know the super collider, but afaik they are not solving ecdsa pubkeys but colliding the whole thing including the RIPEMD160 hash.
Mason Nelson
Quantum has the potential, combined with AI, to completely break what reality is. For example, I imagine the original GAN formulation can be run on a quantum computer to achieve global minima for any given problem.
Angel Rivera
if true lol, by the time you can confirm it btc will be worth next to nothing. :D
Justin Clark
11/11/18
3AAiKJ37GN7gb8B4RxzUeSMMAXP4BWZX1n
Gracias!
Robert Wilson
>i could have fully trained >prediction neural network and a fairly accurate predi what exactly do you intend to train that network with? The data of the last few quantum computers breaking stuff?
As far as I am aware, any of this is new developments, to which you will have an immensly hard time fitting a statistical model
Caleb Morris
addresses with unrevealed pub-keys are going to stay secure. For this reason the individual who guessed right is going to receive their reward.
What is Bitcoin gonna be worth in fiat is debatable.
Thanks for a guess, added to my guess payout file if correct you will get some reward.
Probably I will pay 1 Btc to user who guesses the closest date and 1 BTC to tousands of users for doing a research.
Ayden Ortiz
addresses with unrevealed public keys have zero btc on them lol. anything that has a balance is in plain sight.
Isaiah Cox
I mean the ec pubkeys not pubkey hashes. And they remain hidden till an address pays the first time.
Jordan Nelson
btw my guess is the following: btc and all it's forks will be quantum proofed long before it becomes a reality to public knowledge to attack them.
the signature scheme will be altered so that it becomes impossible to use shors at all. that will not effect the old sleeping addresses like satoshis and eventually someone will mine them if the owner doesn't show up.
Colton Nguyen
but when the address pays the remaining balance is transferred to a new address by default isn't it?
Christian Stewart
I feel you are correct. (although can't prove it) Quantum proof coins already exist and they use some schemes like XMSS or whatever.
yep the change goes to new fresh address in most wallets. So in effect the transaction is in quantum danger only in flight.
Assuming in the beginning they won't have their quantum beast turned on 24/7 cracking transactions in flight. so there is slight period in which we are safe even after the discovery.
But I ask for the specific moment when they crack the first pubkey.
Liam Cooper
I was thinking about this earlier, we have about 15 to 20 years with crypto. Until qcomputing takes over.
Jeremiah Watson
>Assuming in the beginning they won't have their quantum beast turned on 24/7 cracking transactions in flight. so there is slight period in which we are safe even after the discovery. that's entirely possible, but you can't underestimate the power of panic.
>But I ask for the specific moment when they crack the first pubkey. that's impossible to determine. anyone that says otherwise is lying. 10-20 years is my guess. but it's also almost every researchers guess also.
if you can get a more accurate guess where so much is random brain activity and sheer luck i salute you.
Dylan Lopez
Not possible at all to predict within a few dates of this. Anyone claiming they can is absolute bullshit OP. Keep your 2 bitcoins.
Here's a first step to finding out what you need to break it. Calculate out the number of qubits needed for such a computer to be able to brute force attack the encryption. If I recall correctly, we are only at the level of around 10 qubit quantum computers, and the computational power for qubits is exponential, where as for bits it is not. I would need to dig up an article if you want to read more about it
i have been thinking about this only the morons who keep reusing receiving addresses that they actually payed from are in real danger first hand. standard practice of how bitcoin wallets are handled is actually quiet resistant to this attack on the private key.
but once the quantum cryptography becomes fast enough to realtime attack transactions, oh boy... that's not expected in any time soon tho.
one easy way i can see out of this is is you first post the hash of your transaction (you keep the actual transaction secret) signed, and once it's incorporated into the blockchain it's impossible (or practically close enough) to alter the transaction with that tx id and impossible to reuse the private key. but then if the network rejects your transaction details you are cucked out of your coins (or would be vulnerable to subsequent q attack).
Carson Reed
I'm pretty sure it's going to be a crash landing, but its going to have *some* nonzero value.