Quantum Resistance
The ability of cryptographic systems to remain secure against attacks by quantum computers.
- Also known as
- post-quantum security
Quantum resistance refers to cryptographic designs believed to remain secure if large, fault-tolerant quantum computers become practical. Public-key schemes such as ECDSA and RSA would be vulnerable to Shor’s algorithm, while post-quantum schemes use different mathematical assumptions.
Bitcoin-like systems rely on both signatures and hash functions. Hash functions such as SHA-256 are affected differently by quantum algorithms and can often be strengthened by larger output sizes, while signature schemes may require more substantial upgrades.
Practical quantum resistance is as much an upgrade problem as a cryptography problem. Networks need standardized algorithms, wallet support, migration paths for old coins, and careful review before replacing battle-tested signature systems.
Related terms
4 linkedExplore connected entries beyond the alphabetical index.
Public Key
→A cryptographic identifier derived from a private key; used to verify signatures and derive addresses.
Private Key
→A cryptographic key used to sign blockchain transactions and derive public keys; ultimate proof of control over funds.
Address
→A public identifier used to receive cryptocurrency on a blockchain network.
Hash
→A fixed-size digest produced by a one-way function, used for data integrity, identifiers, signatures, and proof-of-work.
All terms and definitions may update as the Cryptionary improves.
