Finally, we calculate the number of physical qubits required to break the 256-bit elliptic curve encryption of keys in the Bitcoin network within the small available time frame in which it would actually pose a threat to do so. It would require 317 × 106 physical qubits to break the encryption within one hour using the surface code, a code cycle time of 1 μs, a reaction time of 10 μs, and a physical gate error of 10-3. To instead break the encryption within one day, it would require 13 × 106 physical qubits.
Governments are back on their anti-encryption bullshit again. Between the U.S. Senate's "EARN IT" Act, the E.U.'s slew of anti-encryption proposals, and Australia's new anti-encryption law, it's become clear that the authoritarians in office view online privacy as a threat to their existence. Normally, when the governments increase their anti-privacy sabre-rattling, technologists start talking more…
B. Preneel. State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures, Seite 49-104. London, UK, Springer-Verlag, (1998)
S. Fluhrer, I. Mantin, und A. Shamir. SAC '01: Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography, Seite 1-24. London, UK, Springer-Verlag, (2001)
Y. Hanaoka, G. Hanaoka, J. Shikata, und H. Imai. Cryptology ePrint Archive, Report 2004/338, (2005)supersedes a previous version which is entitled as 'Identity-Based
Encryption with Non-Interactive Key Update'..
J. Camenisch, und E. Herreweghen. CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, Seite 21-30. New York, NY, USA, ACM, (2002)