{"id":613,"date":"2025-08-05T13:32:23","date_gmt":"2025-08-05T13:32:23","guid":{"rendered":"https:\/\/kie.ue.poznan.pl\/en\/?p=613"},"modified":"2025-08-05T13:42:13","modified_gmt":"2025-08-05T13:42:13","slug":"cryptocurrency-security-in-the-era-of-big-data-and-quantum-computing","status":"publish","type":"post","link":"https:\/\/kie.ue.poznan.pl\/en\/news\/cryptocurrency-security-in-the-era-of-big-data-and-quantum-computing\/","title":{"rendered":"Cryptocurrency Security in the Era of Big Data and Quantum Computing Development"},"content":{"rendered":"<p>An article by our researchers on the threats to cryptocurrency wallet security in the age of Big Data analytics and quantum computing addresses timely and important issues related to the protection of digital assets. Drawing on real-world cases like the well-known attack on Wintermute, which exploited flaws in the Profanity tool (used for generating so-called \u201cvanity addresses\u201d), the authors demonstrate how even minor weaknesses in random number generation can lead to private key compromise. <!--more--><\/p>\n<p>Cryptocurrency wallets are a crucial component of any blockchain system \u2013 they manage private keys and facilitate interaction with the network, allowing users to securely store and transfer digital assets. The article focuses on Ethereum wallets and explains how their security is based on elliptic curve cryptography (SECP256K1) and the Keccak-256 hash function. However, the authors examine whether advanced technologies \u2013 such as Big Data and quantum computing \u2013 may pose risks to these foundations.<\/p>\n<p>The article employs Google BigQuery, a cloud-based analytics tool, to process large volumes of blockchain data. The goal was to detect potentially vulnerable addresses and assess the effectiveness of brute-force attacks using GPU-based parallel processing.<\/p>\n<p>A particularly compelling aspect of the publication is its analysis of quantum computing threats. The use of Grover\u2019s algorithm \u2013 which theoretically halves the time needed to break a key \u2013 shows that this technology may significantly change the relationship between the level of security and the effectiveness of attacks in the future. Although practical implementation is currently limited by several factors (e.g., the lack of powerful and stable quantum computers, and the challenges of implementing cryptographic functions), the threat is no longer purely theoretical.<\/p>\n<p>The study emphasizes that while Ethereum\u2019s address space remains secure under today\u2019s computational capabilities, technological progress demands constant vigilance, analysis, and adaptation of security mechanisms. This is a vital contribution to the discussion about the future of cryptocurrencies in an era of computation on an unprecedented scale. <\/p>\n<p>The paper entitled &#8220;<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-94193-1_15\" target=\"_blank\">Cryptocurrency Wallet Security in the Era of Big Data and Quantum Computing: Brute Force Attacks and Blockchain Analysis with Google BigQuery<\/a>&#8221; was presented at the <a href=\"https:\/\/kie.ue.poznan.pl\/en\/news\/bis-2025-conference-ai-driven-business-transformation\/\">BIS 2025<\/a> conference. Authors of the publication: <a href=\"https:\/\/kie.ue.poznan.pl\/en\/topic\/patryk-szreder\/\">Patryk Szreder<\/a>, <a href=\"https:\/\/kie.ue.poznan.pl\/en\/piotr-stolarski\/\">Dr. Piotr Stolarski<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An article by our researchers on the threats to cryptocurrency wallet security in the age of Big Data analytics and quantum computing addresses timely and important issues related to the protection of digital assets. Drawing on real-world cases like the well-known attack on Wintermute, which exploited flaws in the Profanity tool (used for generating so-called \u201cvanity addresses\u201d), the authors demonstrate how even minor weaknesses in random number generation can lead <a href=\"https:\/\/kie.ue.poznan.pl\/en\/news\/cryptocurrency-security-in-the-era-of-big-data-and-quantum-computing\/\" class=\"read-more\">&#8230; Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":614,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[21,268,8,26,226,267,266,4,225],"class_list":["post-613","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-big-data","tag-bigquery","tag-blockchain","tag-cryptocurrencies","tag-cybersecurity","tag-ethereum","tag-patryk-szreder","tag-piotr-stolarski","tag-quantum-computing"],"_links":{"self":[{"href":"https:\/\/kie.ue.poznan.pl\/en\/wp-json\/wp\/v2\/posts\/613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kie.ue.poznan.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kie.ue.poznan.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kie.ue.poznan.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kie.ue.poznan.pl\/en\/wp-json\/wp\/v2\/comments?post=613"}],"version-history":[{"count":0,"href":"https:\/\/kie.ue.poznan.pl\/en\/wp-json\/wp\/v2\/posts\/613\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kie.ue.poznan.pl\/en\/wp-json\/wp\/v2\/media\/614"}],"wp:attachment":[{"href":"https:\/\/kie.ue.poznan.pl\/en\/wp-json\/wp\/v2\/media?parent=613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kie.ue.poznan.pl\/en\/wp-json\/wp\/v2\/categories?post=613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kie.ue.poznan.pl\/en\/wp-json\/wp\/v2\/tags?post=613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}