Who we are 01 What we do 02 Case studies 03 Blog 04 Contact 05 Clients & Awards 06
Get started
About Clients & Awards
LANGA Galaxy IT
Technical and Strategic Digital Transformation 23 Apr 2024

Quantum Computing and Blockchain: why only ZK-STARK can save us

By LANGA Studios · 3 min read
Technical and Strategic Digital Transformation|4 min lettura|Silver

Introduction The arrival of commercial quantum computing is no longer a remote possibility, but a matter of time. Giants like Google, IBM and Alibaba are already demonstrating applied quantum computing capabilities that, if further developed, will put at risk all the cryptographic security on which blockchain is founded. Bitcoin, Ethereum and most public chains use elliptic algorithms and hash functions that an advanced quantum computer could break in minutes. We’re not talking about theory.We’re talking about an existential threat to Web3. The only truly solid path today, at post-quantum and already available level, is represented by ZK-STARK, developed by StarkWare and already implemented on StarkNet. The real risk: classical cryptography vs quantum algorithms A sufficiently powerful quantum computer, using Shor’s algorithm, can: Break ECDSA, the signature scheme used by Bitcoin and Ethereum. Derive private keys from already exposed public keys (e.g. in signed transactions). Make current security based on secp256k1 elliptic curves useless. Similarly, Grover’s algorithm drastically reduces the complexity to attack hash functions (e.g. SHA-256), which today are considered resistant. The false security of “marketing” solutions Many Layer 2s like Polygon or hybrid ZK solutions try to position themselves as quantum computing resistant futures. However: They still use underlying elliptic signatures. They depend on trusted setup or vulnerable cryptographic systems. They focus more on marketing than on a true post-quantum architecture. The real answer: ZK-STARK ZK-STARK (Zero-Knowledge Scalable Transparent Argument of Knowledge) is the only proven, scalable and post-quantum-safe technology.Here’s why: Transparent: doesn’t require trusted setup, unlike ZK-SNARK. No backdoors. Post-quantum: based on hash functions and on arithmetic operations resistant to quantum attacks. Scalable: extremely fast verifications and compatibility with high transaction density systems. Already operational: implemented on StarkNet,...

Back to blog 23 Apr 2024
Related
LANGA Studios
Premium digital studio for luxury brands in Seoul: where K-culture meets Italian craftsmanship
LANGA Studios
Luxury digital agency in Miami: Italian precision for the Americas’ gateway
LANGA Studios
Luxury eCommerce development: building online stores that match your brand standards
PA
6
Parco Naturalistico
Landscape documentation
N.
2
N.A.
Events / Branding / Shooting
A' Design Award and Competition
BA
5
Barone
eCommerce
PI
9
Piccolo Lago
Food photography / Campaign imagery
FI
6
Fiorentini SpA
Industrial photography
SA
4
SAFIM SpA
Industrial photography
Your story?
Contact us
Have a project
in mind?

Let's analyze the feasibility together. Talk to us with no commitment or log in to your account.

Contact us LANGA Account
Write to us directly
Dal nostro obiettivo
Fotografia
Altri nostri feed
Fotografia
Fotografia
Fotografia
Fotografia
Fotografia
Fotografia
Fotografia
Fotografia
LANGA Studios
Reels
Your story
Want to be here?
Tell us.

Every project we create competes in international awards. We're not beginners: we're digital artists with 15 years of experience. The outcome also depends on the synergy with your team.

Silver

Premium eNews

Hai già un Account LANGA? Forse hai già accesso a questo contenuto Premium.

Accedi al tuo Account Non hai ancora il livello? Upgrade a Silver

Non hai ancora un Account? Registrati gratis

Contenuto premium di LANGA Galaxy

powered by easy LANGA eNews