The financial world resisting quantum computing: That is the scenario in which the US Committee on Equities and Value is a committee. (sec) I want to start a building.
The agency presented it on September 3rd Post-Quantum Financial Infrastructure Framework (Weathered Financial Infrastructure Frame, PQFIF), a plan to predict traditional encryption algorithms Stop being safe for quantum computingaffects both Bitcoin, international banking and digital security.
According to the SEC:
“The US digital asset ecosystem, built on current cryptographic standards, faces existential threats due to the rapid advances in quantum computing. Quantum computers associated with encryption can protect billions of dollars in assets, breaking the fundamental security that creates catastrophic losses for investors, and complete confidence in the market.
Scientific Financial Infrastructure Framework, Sec.
Tourists’ Bitcoin, Ethereum, and digital assets
When cryptographically active, the document explains the mechanisms (understood as simulations or tests) used to protect the management system of cryptographic assets, including institutional wallets for Bitcoin, Ethereum and Stubcoin.
Two major measures were adopted in the process.
- Alternate ECDSA algorithms with ML-DSA in facility wallets to resist quantum attacks.
- Implementation of “Quantum Incision Wrapper in API Blockchain.” Maintains compatibility with public and private networks.
SEC’s proposal is Exchange current algorithms to protect trading companiesas ECDSA does with Bitcoin, it is vulnerable to Quantum. Instead, the SEC adopted the ML-DSA algorithm developed by the National Institute of Standards and Technology (NIST).
The NIST approved algorithm known for Post Itikkun is designed Resisting quantum computer attacks It could break encryption in the future.
This means that when it comes to the implementation of “quantum safety wrappers” in APIs (application programming interfaces) used by cryptocurrency networks Add a protection layer With communication channels between applications and networks.
In this way, the blockchain can resist the attacks of quantum computers. The key to this approach is that it is maintained, according to the SEC. Compatible with both public networks such as Bitcoin Ethereumas well as private networks It is used in institutional financial environments.
Like SEC, the outcome of that mechanism is “100% of cryptographically active transactions” For quantum threats, security measures implementing them will result in an additional delay of just 8 milliseconds.
How was the anti-cheyton migration implemented?
The SEC explained a pilot plan to transfer the cryptographic effects stored in facility wallets to quantum resistance addresses.
The pilot plan was carried out at a global investment bank that was forced to comply with quantum resistance standards around 2030, with global investment banks in 40 countries (it is understood as a drill).
Some of the detected issues are Dependency on old systemsconflicting regulations in 12 jurisdictions and the need to ensure operational continuity without interruption in market schedules.
The plan was divided into three phases.
- Discovery and Evaluation (6 weeks): Infrastructure scans, risk analysis, and migration plan generation.
- Pilot Implementation (12 weeks): Testing trading platforms and customer portals with hybrid key deployment and safety module updates.
- Full deployment (18 months): Migrating banking systems, customer applications, file storage.
The results of the listed scenario are “A migration completed 8 months before the deadline: 22% savings over the initial budget, 5% improvement in performance, 100% regulatory compliance across all jurisdictions.”
Risks and temporary horizons
The SEC plan also addresses cases where quantum computers may be displayed with the ability to break current encryption.
Based on the Global Risk Institute’s Quantum Threat Timeline report updated for 2025, our forecasts are:
- 2034: 17% to 34% There may be a computer that can break RSA-2048 in 24 hours.
- 2044: The probability increases to about 79%.
The report shows these predictions They are uncertain and are subject to unpredictable scientific advancements. Some experts suggest that deadlines could be shorter, while others think they are too optimistic.
The weak points of traditional finances
Finally, the document Lists key areas of traditional financial infrastructure They rely on algorithms such as RSA and elliptic curves (ECC), both of which are vulnerable to quantum attacks.
Online payment CatWalks used by RSA and ECC to verify merchant qualifications.
- An online banking platform that relies on encryption of login processes and transactions.
- An ECC-based mobile application for authenticating users.
- Interbank transfer systems such as Swift and the Federal Reserve.
- Credit card processing and debit card processing.
It is happening that the SEC must immediately begin an orderly, orderly transition process towards post-national standards.
(tagstotranslate)Quantum Computing