Encryption and hashing are two different things. Lots of hashing is quantum resistant. Ever wonder why bitcoin public keys are hashed into addresses?
Discussion
part of the purpose of doing that is the public key of a UTXO is not revealed until it's spent, this requires a different signature construction where you find the key by verifying the signature against the txid (hash) rather than having the key and verifying it validates against the signature (like bip-340 schnorr signatures)
essentially this means the cat is out of the bag before anyone knows who had the bag
Because your public key isn’t revealed until you spend, quantum computers can’t just hack away at your public key at their leisure. If your transaction will be in the next block, there’s a time limit on finding the private key.
Fair point,
But the claim of quantum computing is what would take the current (best) super computer thousands of years to brute force, qubits can do in mere seconds.
If it takes #bitcoin 10 mins to first confirmation…that is a lot of seconds gone by.
Thanks for the reply! I came across this article and read it: https://www.thesslstore.com/blog/difference-encryption-hashing-salting/
From my IT Director days I understand the concepts and the theory that hashing is quantum resistant. I suppose that’s because the hashing is comparing authenticity vs actual data?
However like the article points out, even Google broke SHA-1
Theoretically SHA-2(56) is significantly less hackable…but if “256 bit encryption” becomes vulnerable via Quantum Computing, why wouldn’t 256 bit hashing also be vulnerable?