<div dir="auto"><div><br><br><div class="gmail_quote gmail_quote_container"><div dir="ltr" class="gmail_attr">On Wed, Nov 19, 2025, 5:08 PM Keith Henson via extropy-chat <<a href="mailto:extropy-chat@lists.extropy.org">extropy-chat@lists.extropy.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">I don't know how the SWIFT network is secured. Long ago, it was DES,<br>
but John Gilmore built a cracking machine and showed how easy it was<br>
to brute force crack. I think they went to triple DES which is 56 x 3<br>
bits. If quantum computers can crack the SWIFT network (I don't<br>
know), I think that would be a much larger problem than Bitcoin.<br>
<br>
Anyone know?<br></blockquote></div></div><div dir="auto"><br></div><div dir="auto">The problem is less in the symmetric cipher's like DES (and now AES) and moreso in the key exchange and digital signature algorithms which are primarily RSA, Elliptic Curve and Diffie-Hellman. (You may enjoy my presentation if you are interested to understand how these algorithms work and what they are used for: <a href="https://youtu.be/mSMQ-xowqAg">https://youtu.be/mSMQ-xowqAg</a> )</div><div dir="auto"><br></div><div dir="auto">These three algorithms are instrumental to all transport security protocols (SSL, TLS, SSH) which are the basis of HTTPS, SFTP, VPNs, etc. </div><div dir="auto"><br></div><div dir="auto">Due to the fact that all these constructions are based around mathematical groups they all fall to Shor's algorithm and quantum computers. But this is a particular quirk of history, the simplest asymmetric encryption algorithms were based on mathematical groups, and were invented in the 60s and 70s, but they don't have to be. New constructions, for example, based on lattices were invented in the 90s and don't use groups and hence are not vulnerable to Shor's algorithm.</div><div dir="auto"><br></div><div dir="auto">So you are right this affects much more than cryptocurrency. Practically all secure communications protocols on the Internet are vulnerable. More worrisome: of someone, such as a hacker or government actor recorded any communication based on these protocols, once a large scale quantum computer is created, all these historical messages can be exposed.</div><div dir="auto"><br></div><div dir="auto">If you have a credit card with an expiry date that is after a large scale quantum computer is invented, and it was used in the past over a secure connection that was recorded, then it can be determined determined in the future just as a cryptocurrency wallet could be exposed by a quantum computer.</div><div dir="auto"><br></div><div dir="auto">There are already browsers and servers using new TLS standards and cryptographic protocols that incorporate post-quantum-secure algorithms into the key exchange and/or digital signatures. Signal and iMessage reportedly already use it:</div><div dir="auto"><br></div><div dir="auto"><a href="https://blog.cloudflare.com/pq-2024/">https://blog.cloudflare.com/pq-2024/</a></div><div dir="auto"><br></div><div dir="auto">Jason </div><div dir="auto"><br></div><div dir="auto"><br></div><div dir="auto"><div class="gmail_quote gmail_quote_container"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
<br>
On Wed, Nov 19, 2025 at 5:27 AM Adrian Tymes via extropy-chat<br>
<<a href="mailto:extropy-chat@lists.extropy.org" target="_blank" rel="noreferrer">extropy-chat@lists.extropy.org</a>> wrote:<br>
><br>
> On Wed, Nov 19, 2025 at 8:15 AM John Clark <<a href="mailto:johnkclark@gmail.com" target="_blank" rel="noreferrer">johnkclark@gmail.com</a>> wrote:<br>
> > On Tue, Nov 18, 2025 at 10:49 AM Adrian Tymes via extropy-chat <<a href="mailto:extropy-chat@lists.extropy.org" target="_blank" rel="noreferrer">extropy-chat@lists.extropy.org</a>> wrote:<br>
> >>> >> Nobody can pinpoint the exact day a quantum computer capable of running Shor’s algorithm will become operational,<br>
> >><br>
> >> > And I am not. The sequence of events is:<br>
> >> * That computer comes out.<br>
> >> * Sell your Bitcoins at this point.<br>
> ><br>
> > And at that point the price of bitcoin would have already dropped by at least 95%, probably more.<br>
><br>
> No panic before this point, therefore, no 95% drop.<br>
><br>
> >> > * The public demo of the algorithm is run.<br>
> >> * Then there might be a panic.<br>
> \><br>
> > Might?!<br>
><br>
> Might,<br>
><br>
> >> > The panic won't happen until the public demo of the algorithm,<br>
> ><br>
> > The panic will happen as soon as the smart money realizes that such a demonstration is imminent, so for your strategy to work you would need to be smarter than the smart money. Are you that smart?<br>
><br>
> The smart money itself won't initiate the panic, by definition.<br>
> That's a small percentage of the investors.<br>
><br>
> _______________________________________________<br>
> extropy-chat mailing list<br>
> <a href="mailto:extropy-chat@lists.extropy.org" target="_blank" rel="noreferrer">extropy-chat@lists.extropy.org</a><br>
> <a href="http://lists.extropy.org/mailman/listinfo.cgi/extropy-chat" rel="noreferrer noreferrer" target="_blank">http://lists.extropy.org/mailman/listinfo.cgi/extropy-chat</a><br>
<br>
_______________________________________________<br>
extropy-chat mailing list<br>
<a href="mailto:extropy-chat@lists.extropy.org" target="_blank" rel="noreferrer">extropy-chat@lists.extropy.org</a><br>
<a href="http://lists.extropy.org/mailman/listinfo.cgi/extropy-chat" rel="noreferrer noreferrer" target="_blank">http://lists.extropy.org/mailman/listinfo.cgi/extropy-chat</a><br>
</blockquote></div></div></div>