The Solana Basis introduced on December 16 a collaboration with the corporate Mission Eleven to organize the community towards the dangers that quantum computing may introduce sooner or later.
Mission Eleven is an organization and laboratory specialised within the intersection between quantum computing and cryptography, with a main deal with safety for digital property.
As a part of the work with the Solana Basis, Mission Eleven deployed a post-quantum signature system on a take a look at community (testnet) from Solana“demonstrating that end-to-end quantum-resistant transactions are sensible and scalable.”
Because of this Mission Eleven tailored all the strategy of a transaction (from the signature made by the consumer to its validation on the community) to make use of cryptographic algorithms designed to withstand quantum laptop assaults.
By doing it in a testnetdemonstrated that these companies can combine with out slowing down the velocity, affirmation or skill to scale the community.
Moreover, the Mission Eleven crew reported that very same day that it led a complete danger evaluation on how advances in quantum computing may impression Solana’s core infrastructure.
That analysis concerned consumer wallets, the safety of the validators, and the long-term cryptographic assumptions that assist the community.
Our mission is to guard the world’s digital property from quantum danger.
Alex Pruden, CEO of Mission Eleven.
Why does quantum computing pose a danger to Solana and different networks?
Solana, like different networks resembling Bitcoin or Ethereum, makes use of elliptic curve cryptography (ECC) in its community.
In that sense, CriptoNoticias reported that, given the degrees of Bitcoin and Ethereum constructions, the latter has extra complexities in relation to defending your self of an alleged quantum assault.
Within the particular case of Solana, it makes use of the ECC variant often called Ed25519 within the digital signatures of the transactions. This cryptographic scheme is a mathematical methodology that enables confirm the authenticity of a transaction with out revealing the consumer’s non-public key.
In a theoretical state of affairs and with sufficiently superior quantum computer systems, algorithms like Shor’s may break the sort of cryptography.
In sensible phrases, a quantum attacker may derive a non-public key from a public key already uncovered on the community. With that non-public key, it will be doable to signal faux transactions and switch funds with out authorization from the rightful proprietor.
Nonetheless, that circumstance nonetheless appears distant.
Lastly, this initiative joins one other already present one, which proposes in Solana to make use of a signature system with hash capabilities for transactions, which might be proof against quantum assaults, as reported by CriptoNoticias.

