BMIC Glossary

What Is Shor's Algorithm?

Definition: A quantum algorithm discovered by Peter Shor in 1994 that can factor large integers and solve discrete logarithm problems exponentially faster than any known classical algorithm.

Shor's algorithm is the primary reason quantum computers threaten cryptocurrency. Every major blockchain — Bitcoin, Ethereum, Solana — relies on the mathematical difficulty of factoring large numbers or solving elliptic curve discrete logarithms. Classical computers need billions of years to crack these problems. A sufficiently powerful quantum computer running Shor's algorithm could do it in hours.

The algorithm works by exploiting quantum superposition to test many possible factors simultaneously. When applied to the elliptic curve cryptography (ECDSA) used by most blockchains, it can derive private keys from public keys — giving an attacker full control of any wallet whose public key has been exposed on-chain.

Why it matters for crypto: Every Bitcoin transaction exposes the sender's public key. Once quantum computers reach approximately 4,000 error-corrected logical qubits, Shor's algorithm could crack Bitcoin's secp256k1 curve in under 24 hours. IBM targets 100,000 qubits by 2033.

How BMIC addresses this: BMIC uses CRYSTALS-Kyber lattice-based encryption, which is resistant to Shor's algorithm. The security of Kyber is based on the Learning With Errors (LWE) problem — a mathematical problem that remains hard for both classical and quantum computers.

Frequently Asked Questions

Can Shor's algorithm break Bitcoin?

Yes. Shor's algorithm can derive Bitcoin private keys from public keys using quantum computing. A quantum computer with approximately 4,000 logical qubits could crack Bitcoin's ECDSA encryption.

When will Shor's algorithm become a real threat?

Most experts estimate between 2030-2035, when quantum computers reach sufficient qubit counts with adequate error correction. IBM targets 100,000 qubits by 2033.

What cryptography is resistant to Shor's algorithm?

Lattice-based cryptography like CRYSTALS-Kyber (used by BMIC), hash-based signatures like SPHINCS+, and code-based cryptography are all resistant to Shor's algorithm.

Related Terms

Protect Your Crypto With Quantum Security

BMIC is the only presale built with NIST-standard post-quantum cryptography. Join 186+ media-featured presale.

Join BMIC Presale
Compare 50 Tokens Quantum Crypto Guide Best Crypto Presale Top 10 Quantum Cryptos