Research Article
A Blockchain Consensus Protocol Based on Quantum Attack Algorithm
Table 1
The potential threats of quantum computation on existing cryptography.
| | Crypto algorithm | Type | Complex math problem | Security threat |
| | AES | Symmetric | ā | In half | | SHA256 | Hash | ā | In half | | RSA | Asymmetric | Large integer factoring problem | Complete cracking | | ECDSA | Asymmetric | Elliptic curve function | Complete cracking | | DSA | Asymmetric | Discrete logarithm | Complete cracking |
|
|