The post John Lilic: Quantum computing threatens cryptography by 2030 appeared on BitcoinEthereumNews.com. John Lilic: Quantum computing threatens cryptography The post John Lilic: Quantum computing threatens cryptography by 2030 appeared on BitcoinEthereumNews.com. John Lilic: Quantum computing threatens cryptography

John Lilic: Quantum computing threatens cryptography by 2030



Quantum computing poses a significant threat to current cryptographic systems. Classical cryptography systems are vulnerable in a post-quantum world. The quantum ecosystem is more dynamic than previously thought, impacting finance.

Key Takeaways

  • Quantum computing poses a significant threat to current cryptographic systems.
  • Classical cryptography systems are vulnerable in a post-quantum world.
  • The quantum ecosystem is more dynamic than previously thought, impacting finance.
  • Capital investment and government support are crucial for quantum computing advancement.
  • Quantum advancements may threaten cryptographic systems by 2030.
  • Quantum computers can brute force private keys faster than classical computers.
  • Quantum computing represents a fundamental shift in controlling reality at a microscopic level.
  • Quantum theory is the most successful physical theory, explaining many phenomena.
  • Efficient number factoring by quantum computing is crucial for cryptography.
  • The interconnectedness of investment, policy, and technology is vital for quantum computing.
  • Quantum computing can undermine current cryptographic practices.
  • The timeline for quantum advancements is converging around 2030.
  • Quantum computing’s impact on cryptography necessitates urgent industry preparation.
  • Quantum computers’ processing power differs significantly from classical computers.
  • Quantum computing’s control over reality has foundational significance.

Guest intro

John Lilic serves as Executive Director of the Telos Foundation. He spent six years at ConsenSys as an early employee building the Ethereum ecosystem, including enterprise partnerships with Microsoft and the Enterprise Ethereum Alliance. An early Bitcoin and Ethereum adopter, he later advised Polygon during its rise as a key scaling solution.

The vulnerability of classical cryptography in a post-quantum world

  • — John Lilic

  • Cryptographic systems face critical vulnerabilities due to quantum computing advancements.
  • Quantum computing challenges existing cryptographic practices and security assumptions.
  • — John Lilic

  • Understanding quantum computing’s implications is crucial for cryptographic security.
  • The classical cryptography community is aware of these vulnerabilities and is working on solutions.
  • — John Lilic

  • Quantum advancements necessitate a reevaluation of cryptographic security measures.

The dynamic nature of the quantum ecosystem

  • — John Lilic

  • Quantum computing’s relevance in finance is more immediate than anticipated.
  • The ecosystem’s dynamism reflects a shift in perspective on quantum computing.
  • Quantum computing’s potential is reshaping the financial landscape.
  • — John Lilic

  • The evolving quantum ecosystem requires adaptive strategies in finance.
  • Quantum computing’s impact on finance underscores its dynamic nature.
  • Understanding quantum computing’s potential is crucial for financial innovation.

The role of capital investment and government support in quantum computing

  • — John Lilic

  • Investment and policy are interconnected in driving quantum computing advancements.
  • — John Lilic

  • Big tech companies and startups play a significant role in the quantum ecosystem.
  • The private sector’s dynamism accelerates quantum computing advancements.
  • — John Lilic

  • Government support is vital for fostering quantum computing innovation.
  • Investment in quantum computing is essential for technological progress.

The timeline for quantum advancements and cryptographic threats

  • — John Lilic

  • The convergence of quantum roadmaps highlights potential cryptographic threats.
  • — John Lilic

  • The timeline emphasizes the urgency for cryptographic security measures.
  • Quantum advancements could undermine elliptic curve cryptography by 2030.
  • Understanding the timeline is crucial for preparing cryptographic defenses.
  • The potential impact of quantum computing on cryptography necessitates proactive measures.
  • The crypto industry must prepare for quantum-induced security challenges.

Quantum computing’s threat to cryptographic security

  • — John Lilic

  • Quantum computing challenges the comfort of current cryptographic practices.
  • — John Lilic

  • Quantum advancements could enable malicious actors to access private keys.
  • The threat underscores the need for quantum-resistant cryptographic solutions.
  • Quantum computing’s potential impact on crypto is significant.
  • Understanding quantum computing’s threat is crucial for cryptographic security.
  • The crypto industry must address quantum-induced vulnerabilities.

The processing power of quantum computers

  • — John Lilic

  • Quantum computing’s processing power differs significantly from classical computing.
  • — John Lilic

  • Quantum computing’s efficiency poses a threat to cryptographic practices.
  • Understanding quantum computing’s processing power is crucial for security.
  • The efficiency of quantum computing highlights its potential advantages.
  • Quantum computing’s impact on cryptography necessitates adaptive strategies.
  • The crypto industry must prepare for quantum-induced processing challenges.

Quantum computing’s control over reality

  • — John Lilic

  • Quantum computing offers control over reality at its most fundamental level.
  • — John Lilic

  • Understanding quantum mechanics is crucial for grasping quantum computing’s potential.
  • Quantum computing’s foundational significance impacts technological advancement.
  • The shift in control underscores quantum computing’s transformative potential.
  • Quantum computing’s impact on reality highlights its technological significance.
  • The crypto industry must adapt to quantum-induced shifts in technology.

The significance of quantum theory

  • — John Lilic

  • Quantum theory’s success underscores its significance in scientific understanding.
  • — John Lilic

  • Understanding quantum theory is crucial for grasping its technological implications.
  • Quantum theory’s applications impact future technological advancements.
  • The success of quantum theory highlights its foundational significance.
  • Quantum theory’s impact on technology underscores its importance.
  • The crypto industry must consider quantum theory’s implications for innovation.

Quantum computing’s impact on number factoring

  • — John Lilic

  • Efficient number factoring by quantum computing impacts cryptographic security.
  • — John Lilic

  • Understanding number factoring is crucial for cryptographic practices.
  • Quantum computing’s efficiency highlights its potential advantages in cryptography.
  • The impact on number factoring underscores quantum computing’s significance.
  • Quantum computing’s potential in cryptography necessitates adaptive strategies.
  • The crypto industry must prepare for quantum-induced challenges in cryptography.

Quantum computing poses a significant threat to current cryptographic systems. Classical cryptography systems are vulnerable in a post-quantum world. The quantum ecosystem is more dynamic than previously thought, impacting finance.

Key Takeaways

  • Quantum computing poses a significant threat to current cryptographic systems.
  • Classical cryptography systems are vulnerable in a post-quantum world.
  • The quantum ecosystem is more dynamic than previously thought, impacting finance.
  • Capital investment and government support are crucial for quantum computing advancement.
  • Quantum advancements may threaten cryptographic systems by 2030.
  • Quantum computers can brute force private keys faster than classical computers.
  • Quantum computing represents a fundamental shift in controlling reality at a microscopic level.
  • Quantum theory is the most successful physical theory, explaining many phenomena.
  • Efficient number factoring by quantum computing is crucial for cryptography.
  • The interconnectedness of investment, policy, and technology is vital for quantum computing.
  • Quantum computing can undermine current cryptographic practices.
  • The timeline for quantum advancements is converging around 2030.
  • Quantum computing’s impact on cryptography necessitates urgent industry preparation.
  • Quantum computers’ processing power differs significantly from classical computers.
  • Quantum computing’s control over reality has foundational significance.

Guest intro

John Lilic serves as Executive Director of the Telos Foundation. He spent six years at ConsenSys as an early employee building the Ethereum ecosystem, including enterprise partnerships with Microsoft and the Enterprise Ethereum Alliance. An early Bitcoin and Ethereum adopter, he later advised Polygon during its rise as a key scaling solution.

The vulnerability of classical cryptography in a post-quantum world

  • — John Lilic

  • Cryptographic systems face critical vulnerabilities due to quantum computing advancements.
  • Quantum computing challenges existing cryptographic practices and security assumptions.
  • — John Lilic

  • Understanding quantum computing’s implications is crucial for cryptographic security.
  • The classical cryptography community is aware of these vulnerabilities and is working on solutions.
  • — John Lilic

  • Quantum advancements necessitate a reevaluation of cryptographic security measures.

The dynamic nature of the quantum ecosystem

  • — John Lilic

  • Quantum computing’s relevance in finance is more immediate than anticipated.
  • The ecosystem’s dynamism reflects a shift in perspective on quantum computing.
  • Quantum computing’s potential is reshaping the financial landscape.
  • — John Lilic

  • The evolving quantum ecosystem requires adaptive strategies in finance.
  • Quantum computing’s impact on finance underscores its dynamic nature.
  • Understanding quantum computing’s potential is crucial for financial innovation.

The role of capital investment and government support in quantum computing

  • — John Lilic

  • Investment and policy are interconnected in driving quantum computing advancements.
  • — John Lilic

  • Big tech companies and startups play a significant role in the quantum ecosystem.
  • The private sector’s dynamism accelerates quantum computing advancements.
  • — John Lilic

  • Government support is vital for fostering quantum computing innovation.
  • Investment in quantum computing is essential for technological progress.

The timeline for quantum advancements and cryptographic threats

  • — John Lilic

  • The convergence of quantum roadmaps highlights potential cryptographic threats.
  • — John Lilic

  • The timeline emphasizes the urgency for cryptographic security measures.
  • Quantum advancements could undermine elliptic curve cryptography by 2030.
  • Understanding the timeline is crucial for preparing cryptographic defenses.
  • The potential impact of quantum computing on cryptography necessitates proactive measures.
  • The crypto industry must prepare for quantum-induced security challenges.

Quantum computing’s threat to cryptographic security

  • — John Lilic

  • Quantum computing challenges the comfort of current cryptographic practices.
  • — John Lilic

  • Quantum advancements could enable malicious actors to access private keys.
  • The threat underscores the need for quantum-resistant cryptographic solutions.
  • Quantum computing’s potential impact on crypto is significant.
  • Understanding quantum computing’s threat is crucial for cryptographic security.
  • The crypto industry must address quantum-induced vulnerabilities.

The processing power of quantum computers

  • — John Lilic

  • Quantum computing’s processing power differs significantly from classical computing.
  • — John Lilic

  • Quantum computing’s efficiency poses a threat to cryptographic practices.
  • Understanding quantum computing’s processing power is crucial for security.
  • The efficiency of quantum computing highlights its potential advantages.
  • Quantum computing’s impact on cryptography necessitates adaptive strategies.
  • The crypto industry must prepare for quantum-induced processing challenges.

Quantum computing’s control over reality

  • — John Lilic

  • Quantum computing offers control over reality at its most fundamental level.
  • — John Lilic

  • Understanding quantum mechanics is crucial for grasping quantum computing’s potential.
  • Quantum computing’s foundational significance impacts technological advancement.
  • The shift in control underscores quantum computing’s transformative potential.
  • Quantum computing’s impact on reality highlights its technological significance.
  • The crypto industry must adapt to quantum-induced shifts in technology.

The significance of quantum theory

  • — John Lilic

  • Quantum theory’s success underscores its significance in scientific understanding.
  • — John Lilic

  • Understanding quantum theory is crucial for grasping its technological implications.
  • Quantum theory’s applications impact future technological advancements.
  • The success of quantum theory highlights its foundational significance.
  • Quantum theory’s impact on technology underscores its importance.
  • The crypto industry must consider quantum theory’s implications for innovation.

Quantum computing’s impact on number factoring

  • — John Lilic

  • Efficient number factoring by quantum computing impacts cryptographic security.
  • — John Lilic

  • Understanding number factoring is crucial for cryptographic practices.
  • Quantum computing’s efficiency highlights its potential advantages in cryptography.
  • The impact on number factoring underscores quantum computing’s significance.
  • Quantum computing’s potential in cryptography necessitates adaptive strategies.
  • The crypto industry must prepare for quantum-induced challenges in cryptography.

Loading more articles…

You’ve reached the end


Add us on Google

`;
}

function createMobileArticle(article) {
const displayDate = getDisplayDate(article);
const editorSlug = article.editor ? article.editor.toLowerCase().replace(/\s+/g, ‘-‘) : ”;
const captionHtml = article.imageCaption ? `

${article.imageCaption}

` : ”;
const authorHtml = article.isPressRelease ? ” : `
`;

return `


${captionHtml}

${article.subheadline ? `

${article.subheadline}

` : ”}

${createSocialShare()}

${authorHtml}
${displayDate}

${article.content}

`;
}

function createDesktopArticle(article, sidebarAdHtml) {
const editorSlug = article.editor ? article.editor.toLowerCase().replace(/\s+/g, ‘-‘) : ”;
const displayDate = getDisplayDate(article);
const captionHtml = article.imageCaption ? `

${article.imageCaption}

` : ”;
const categoriesHtml = article.categories.map((cat, i) => {
const separator = i < article.categories.length – 1 ? ‘|‘ : ”;
return `${cat}${separator}`;
}).join(”);
const desktopAuthorHtml = article.isPressRelease ? ” : `
`;

return `

${categoriesHtml}

${article.subheadline ? `

${article.subheadline}

` : ”}

${desktopAuthorHtml}
${displayDate}
${createSocialShare()}

${captionHtml}

`;
}

function loadMoreArticles() {
if (isLoading || !hasMore) return;

isLoading = true;
loadingText.classList.remove(‘hidden’);

// Build form data for AJAX request
const formData = new FormData();
formData.append(‘action’, ‘cb_lovable_load_more’);
formData.append(‘current_post_id’, lastLoadedPostId);
formData.append(‘primary_cat_id’, primaryCatId);
formData.append(‘before_date’, lastLoadedDate);
formData.append(‘loaded_ids’, loadedPostIds.join(‘,’));

fetch(ajaxUrl, {
method: ‘POST’,
body: formData
})
.then(response => response.json())
.then(data => {
isLoading = false;
loadingText.classList.add(‘hidden’);

if (data.success && data.has_more && data.article) {
const article = data.article;
const sidebarAdHtml = data.sidebar_ad_html || ”;

// Check for duplicates
if (loadedPostIds.includes(article.id)) {
console.log(‘Duplicate article detected, skipping:’, article.id);
// Update pagination vars and try again
lastLoadedDate = article.publishDate;
loadMoreArticles();
return;
}

// Add to mobile container
mobileContainer.insertAdjacentHTML(‘beforeend’, createMobileArticle(article));

// Add to desktop container with fresh ad HTML
desktopContainer.insertAdjacentHTML(‘beforeend’, createDesktopArticle(article, sidebarAdHtml));

// Update tracking variables
loadedPostIds.push(article.id);
lastLoadedPostId = article.id;
lastLoadedDate = article.publishDate;

// Execute any inline scripts in the new content (for ads)
const newArticle = desktopContainer.querySelector(`article[data-article-id=”${article.id}”]`);
if (newArticle) {
const scripts = newArticle.querySelectorAll(‘script’);
scripts.forEach(script => {
const newScript = document.createElement(‘script’);
if (script.src) {
newScript.src = script.src;
} else {
newScript.textContent = script.textContent;
}
document.body.appendChild(newScript);
});
}

// Trigger Ad Inserter if available
if (typeof ai_check_and_insert_block === ‘function’) {
ai_check_and_insert_block();
}

// Trigger Google Publisher Tag refresh if available
if (typeof googletag !== ‘undefined’ && googletag.pubads) {
googletag.cmd.push(function() {
googletag.pubads().refresh();
});
}

} else if (data.success && !data.has_more) {
hasMore = false;
endText.classList.remove(‘hidden’);
} else if (!data.success) {
console.error(‘AJAX error:’, data.error);
hasMore = false;
endText.textContent=”Error loading more articles”;
endText.classList.remove(‘hidden’);
}
})
.catch(error => {
console.error(‘Fetch error:’, error);
isLoading = false;
loadingText.classList.add(‘hidden’);
hasMore = false;
endText.textContent=”Error loading more articles”;
endText.classList.remove(‘hidden’);
});
}

// Set up IntersectionObserver
const observer = new IntersectionObserver(function(entries) {
if (entries[0].isIntersecting) {
loadMoreArticles();
}
}, { threshold: 0.1 });

observer.observe(loadingTrigger);
})();

© Decentral Media and Crypto Briefing® 2026.

Source: https://cryptobriefing.com/john-lilic-quantum-computing-threatens-cryptography-by-2030-epicenter/

Market Opportunity
QUANTUM Logo
QUANTUM Price(QUANTUM)
$0.002952
$0.002952$0.002952
-2.21%
USD
QUANTUM (QUANTUM) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Tags: