Quantum signatures must be added or modified immediately, and the development team must immediately discuss and choose to change the signature!
Starting in 2024, the Department of Commerce and the Department of Homeland Security may begin to publish approved algorithms that are easily cracked by quantum computers and are ready to be phased out on an annual basis.
National Security Memorandum Order No. 8, a document particularly relevant to the anti-quantum computer cracking algorithm PQC
Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems | The White House community-systems/
The latest “Quantum Computer Development Status” report from the German BSI in August 2023 has this picture on page 61. This picture and the description on page 61 make it very clear:
ECC256 is the easiest to crack. When ECC256 is cracked, even RSA1024 is temporarily safe.
Elliptic Curve Signature ECC,
It is the easiest algorithm to be cracked by quantum computers!
If the pqc signature is replaced, what if the length of the signature is 40 times (dilithium), 200 times (hash), or 2000 times? How much is the efficiency reduced? Should we increase the block capacity? How much increase?
This is not a matter to be discussed, but something to be done immediately.
I’m from China. The Chinese government is constantly copying encrypted data and waiting for the quantum computer to reach a certain qubit to crack the data!
I think the zcash community is humble enough to listen and I would appreciate it if someone could relay to the founders and development team that I do not hold any zcash.
Here are some things cloudflare does