Debunking - Regarding the supercomputing threat mentioned by Google, today's claims are truly incredible!

Two Logics ——————

First:

The cryptographic algorithms used by Bitcoin mainly include 2 types: Elliptic Curve Digital Signature Algorithm (ECDSA) and SHA256 hash algorithm. Among them, ECDSA is mainly used for generating private keys and public keys; SHA256 is mainly used for generating wallet addresses from public keys, as well as for the proof of work (PoW) during mining.

Quantum computers pose a threat to the security of ECDSA. In 1994, the Shor algorithm was designed specifically for factoring. A sufficiently powerful quantum computer (hardware) combined with the Shor algorithm (software) can break private keys from public keys.

Of course, the process of cracking by quantum computers also takes a considerable amount of time, and the development of quantum computers is not always smooth; their initial performance is not that powerful.

Even if quantum computers become powerful enough, there are ways to protect your Bitcoin: use a one-time Bitcoin address each time.

How smart is Satoshi Nakamoto?

When designing Bitcoin, the public key was not directly used as the receiving address. The Bitcoin public key and its corresponding address are hashed using SHA256, and currently, there is no effective algorithm to crack SHA256.

For example: if Zhang San needs to transfer 1BTC to Li Si, and Zhang San's wallet address has 3BTC, he can set the change address to a brand new Bitcoin address that he controls the private key for when making the transfer. This way, during the transfer, 1BTC goes to Li Si's address, and the change of 2BTC goes to Zhang San's new address.

When querying this transaction on a blockchain explorer, one can see Zhang San's outgoing address and corresponding public key, Li Si's address, and the new change address. Since the outgoing address is discarded after use and contains no BTC, even if the public key is seen, it doesn't matter if the private key is cracked using a quantum computer.

As for the exposed Li Si's receiving address and the new change address, due to the lack of effective algorithms to crack SHA256, a quantum computer cannot derive the public key from the address, so it is safe.

Secondly:

As quantum computers advance, cryptographic algorithms will also continue to progress!!!