(I believe this query will likely be blocked for being not particular, so assist me edit it, thanks)
(I’ll current Information [1] and Information [2] which is able to assist manage my concepts earlier than my query)
Information [1]: (the next info is widespread sense)
One attainable assault is: (reproducing the phrases within the weblog braiins)
…public keys are revealed when transactions are broadcasted to the
mempool, even BEFORE they get added to the blockchain.If an attacker might reverse the signature and get the related
non-public key throughout this window earlier than the transaction will get included
on-chain, they might then broadcast a higher-fee transaction sending
the cash to themselves as an alternative.
Information [2]: (the troublesome a part of the query will begin right here)
The paper A Survey on Numerous Assaults in Bitcoin and Cryptocurrency describes 7 assaults:
A. Denial-of-service Assault
B. Double Spending Assault
C. Sybil Assault
D. Eclipse Assault
E. Egocentric mining Assault
F. Fork after Withholding Assault
G. Block Withholding Assault
I lastly arrive to my query:
Utilizing a quantum laptop to interrupt SHA-256/ECDSA:
Are there different tips to tug off a 51% assault all through any of the (A-G) methods?
(I’ve tried to seek out any not widespreadly diffuse data, like
For instance 1: In Eclipse assault, the IP deal with of sufferer particular person is blocked or redirected in the direction of a competitor. IPsec makes use of SHA. So I believe it’s attainable to discover a vulnerability this fashion, however I don’t know how.
For instance 2: It’s written within the paper Off-Path TCP Exploits of the Blended IPID Task:
“TCP connections DoS assault is especially relevant to compromising purposes secured by encrypted site visitors, e.g., HTTPS and SSH”.
I’ve tried to guess which quantum assault to sha256 is ready to assault bitcoin, however I’m not a pc scientist so please ANY info is wellcome)