As a researcher in this field, I’m watching quantum computing rapidly develop from a theoretical concept into working prototypes, and it’s bringing a critical question back into focus: could these future machines compromise the security of our current blockchains? The answer isn’t simple. While some of the fundamental technologies we rely on for wallet security and reaching consensus might be susceptible to attacks from quantum computers down the line, others appear much more resilient. Specifically, the hash-based tools used in proof-of-work systems and Merkle trees seem comparatively strong against these potential threats.
If you manage digital assets, create wallets, or maintain online systems, now is the time to prepare, not panic. Switching to new security methods will take years, so it’s important to understand what security measures you currently use, be able to quickly switch to different ones if needed, and create a plan for the future with quantum-resistant security. This will allow you to adapt smoothly instead of scrambling at the last minute.
This article cuts through the confusion surrounding quantum computing, explaining the real threats, what existing systems can withstand, and practical actions to take now to minimize risks – all without exaggeration or unnecessary alarm.
Quantum computing poses a long-term threat to current digital signatures like ECDSA, Ed25519, and others, as Shor’s algorithm could potentially break them. However, some technologies, including hash-based cryptography and Merkle trees, are more resistant, and Grover’s algorithm only offers a limited speed increase. The risk varies depending on how Bitcoin addresses are used – those that hide public keys are safer than those that reveal them directly. While new, quantum-resistant algorithms (like Kyber, Dilithium, and others) have been selected by NIST and are being standardized, it will still take years for them to be widely adopted. To prepare, it’s important to build flexible systems that can easily switch to new cryptography, avoid reusing addresses, plan for consolidating funds, and stay informed about when vendors will support these new standards. While an immediate crisis isn’t expected, preparing now will minimize future costs and protect against potential key compromises.
The Quantum Threat Model for Blockchains
Quantum computers speed up certain calculations by using principles called superposition and entanglement. When it comes to cryptography, two algorithms are particularly important:
- Shor’s algorithm threatens discrete logarithm and factoring problems—the foundation for ECDSA, Ed25519, Schnorr, RSA, and BLS signatures.
- Grover’s algorithm gives a quadratic speedup for brute-forcing symmetric keys and hashes. That halves the “effective” bits of security (e.g., 256-bit hash to roughly 128-bit search effort), which is still considered strong in practice with parameter adjustments.
As an analyst, I’m focused on the potential risks to blockchain security. Currently, signatures are vital for protecting funds and verifying identities on the network. However, a major concern is the potential arrival of a powerful, error-correcting quantum computer – what we call ‘Q-day’. If that happens, someone could potentially use a public key to calculate the associated private key and then create fraudulent signatures.
A key difference with signatures is that encrypted data’s “harvest now, decrypt later” risk doesn’t apply in the same way. While attackers can’t get your private key just by looking at your public address on the blockchain, they *can* store those public keys now. If those funds haven’t moved by the time powerful quantum computers are available, attackers could then try to recover the key.
As an analyst, I always advise people that keeping your public keys secure and not reusing addresses are simple but effective ways to protect yourself from potential signature forgery down the line. It’s a small effort with a big impact on security.
What Breaks Under Shor vs. Grover
Various parts of a blockchain rely on different fundamental building blocks. Here’s a general overview of how these components might be affected.
Here’s a breakdown of how different crypto components are affected by potential attacks from quantum computers:
Wallet Security: Current digital signature methods (like those used for Bitcoin and Ethereum) relying on elliptic curve cryptography are vulnerable to Shor’s algorithm. This means an attacker could potentially calculate your private key from your public key and steal your funds.
Consensus Mechanisms: Systems using BLS signatures for validator aggregation are also at risk from Shor’s algorithm. Fixing this would require significant changes to the underlying protocol, and the way these systems work makes finding alternatives difficult.
Proof-of-Work & Merkle Trees: The hashing algorithms used in Bitcoin’s Proof-of-Work system (SHA-256) and Merkle trees are resistant to quantum attacks, but Grover’s algorithm could reduce their security margin. Increasing the parameters or using double hashing can help mitigate this.
zk-SNARKs: These privacy-focused technologies, which use pairings on elliptic curves, are vulnerable to Shor’s algorithm. Post-quantum alternatives like zk-STARKs offer a potential solution.
zk-STARKs: These are more resistant to quantum attacks as they are based on hash functions. Adjusting parameters can further improve their security against Grover’s algorithm.
Address Hashing: Hashing used to create addresses is relatively resistant, but Grover’s algorithm could offer a small reduction in security. Obfuscating the public key within the address can provide a temporary delay before funds are at risk.
On the defense side, several PQ signature families show promise:
- Lattice-based (e.g., CRYSTALS-Dilithium, Falcon) offer performance close to today’s systems, with larger keys/signatures.
- Hash-based (e.g., SPHINCS+) avoid number-theoretic assumptions, but signatures are larger and verification is heavier.
- Code-based and multivariate schemes exist, but most blockchain discussions center on lattice and hash-based options due to tooling and standardization momentum.
The U.S. National Institute of Standards and Technology (NIST) has chosen CRYSTALS-Kyber for key encapsulation and CRYSTALS-Dilithium, Falcon, and SPHINCS+ for digital signatures as new standards. Draft versions of these standards are expected in 2024. You can find the latest updates on the program at NIST PQC.
State of Major Networks: Bitcoin, Ethereum, Solana and Beyond
Bitcoin
Typically, Bitcoin transactions hide most of your public key information until you spend your coins, which helps protect against potential attacks. However, a newer Bitcoin feature called Taproot reveals a simplified version of your public key upfront. While current computers aren’t powerful enough to exploit this difference, it’s a detail to consider as quantum computing technology develops. This is because future quantum computers *could* potentially take advantage of the publicly available key information.
Bitcoin Script can be updated to include support for new types of digital signatures based on post-quantum cryptography, and even allow for conditions where transactions can be spent using either current or future signature methods. However, changes to the Bitcoin system require careful consideration and take time to implement. Currently, there isn’t a standard for post-quantum signatures that everyone agrees on – researchers are still actively discussing the best approach.
Ethereum
Regular Ethereum accounts use a type of digital signature called ECDSA. Because of how these signatures work, anyone can figure out an account’s public key just by looking at transactions it makes. Ethereum’s newer system, the beacon chain, uses a different type of signature called BLS, which is also built on similar mathematical principles.
Ethereum’s ability to be programmed gives it a key advantage: it can quickly adapt to new technologies. Account abstraction, like the ERC-4337 standard for smart contract wallets, lets users and blockchains switch to more secure signature methods (or combine old and new) without needing a disruptive, full network upgrade. While replacing the current BLS signature scheme at the core of Ethereum is a more complex undertaking, it’s important because efficient signature aggregation is critical for how validators operate.
Solana and other high-throughput L1s
Solana uses addresses based on a type of cryptography (Ed25519) that could be cracked by a powerful future quantum computer. Switching to quantum-resistant signatures is challenging for Solana due to its speed and efficiency goals – it would likely increase signature sizes and verification times. However, Solana’s flexible system allows for new verification methods and a gradual transition to these more secure signatures.
Most blockchains like Polkadot and Cosmos currently use standard digital signature methods based on elliptic curves, which could be vulnerable to attacks from quantum computers using Shor’s algorithm. How each blockchain updates its security will depend on its own governance and upgrade processes.
Layer 2 and proofs
As a crypto investor, I’m keeping a close eye on how layer-2 scaling solutions will handle the shift to post-quantum cryptography. Right now, zk-SNARK rollups, while promising, depend on some older mathematical assumptions that could be vulnerable down the line. STARK-based systems seem a bit more prepared because they rely more on hashing, which is easier to adapt. However, even with these L2s, the way accounts and bridges work often still uses standard digital signatures like ECDSA, so we need to think about securing *everything* – the whole system – against future quantum threats. It’s not enough to just focus on the rollup itself.
The government is encouraging a shift to more secure encryption standards, but in a measured way. Guidance from the National Security Agency, like the Commercial National Security Algorithm Suite 2.0 (CNSA 2.0), suggests a gradual transition for government systems over the next decade. The focus is on first identifying what needs to be updated and ensuring systems can easily adapt to new encryption methods. You can find more details in the NSA’s CNSA 2.0 notice.
Migration Playbooks: From Crypto-Agile Wallets to L1 Upgrades
Hybrid signatures and algorithm agility
- Wallet-level hybrids: Require both a classical signature (ECDSA/Schnorr) and a PQ signature to spend, or allow either path under policy. This enables gradual rollout while preserving compatibility.
- Scriptable commits: For UTXO chains, commit to a PQ public key’s hash today (cheap) and reveal PQ verification only when needed.
- Smart contract wallets: In account-based chains, customizable validation logic can accept PQ signatures as soon as precompiles or libraries exist.
L1 consensus and protocol changes
- New address types or opcodes: Introduce PQ-verify operations and new address encodings. Expect extensive review because signature sizes and verify costs affect fees and block limits.
- Consensus key migration: For chains using BLS, research targets include PQ signatures with aggregation or alternative consensus designs that reduce signature load.
- Bridges and cross-chain: Many bridges rely on threshold signatures or multisig over elliptic curves. Plans should evaluate PQ-ready quorum schemes or hybrid attestations.
Key management, hardware, and custody
- Inventory your cryptography: Map where ECDSA/EdDSA/BLS are used across wallets, custodial flows, validator tooling, and off-chain services.
- Hardware wallet roadmaps: Ask vendors about implementing Dilithium/Falcon/SPHINCS+ and how firmware upgrades will be authenticated as the trust anchor transitions to PQ.
- Rotation and sweeping: Prepare to rotate keys and sweep funds from addresses that expose public keys (including Taproot and any reused accounts) to PQ or hybrid outputs before any credible Q‑day.
Cost, Performance, and UX Trade-offs of Post-Quantum Signatures
Signatures designed to be secure against future quantum computers are generally bigger and take more processing power to check than the digital signatures we use now, like ECDSA, Ed25519, or BLS. This difference impacts how much data blockchains can handle, transaction costs, and how easy they are to use.
- Footprint: Typical PQ signature sizes range from roughly a few hundred bytes up to tens of kilobytes depending on the scheme and security level. Public keys can also be larger. Larger payloads increase bandwidth and storage needs.
- Verification cost: Lattice-based verification is generally fast but still costlier than Ed25519 per signature. Hash-based signatures (e.g., SPHINCS+) can be slower and bigger, trading performance for conservative assumptions.
- Aggregation: BLS’s compact aggregation is a major win in current consensus designs. PQ aggregation is an active research area; today’s PQ schemes don’t yet match BLS’s combination of compactness and speed.
- Stateless and one-time signatures: Some hash-based options (e.g., XMSS/WOTS variants) require careful state handling or produce large signatures. They may suit niche uses (e.g., infrequent rotations) rather than high-throughput wallets.
Considering these pros and cons, many teams are taking a balanced approach. They’re implementing post-quantum (PQ) security for sensitive transactions like treasury movements and validator keys, but continuing to use traditional security methods for everyday customer transactions until PQ technology is more developed and reliable.
A Practical Checklist for Teams and Treasuries
For protocol and wallet developers
- Map dependencies: List every place signatures are used—wallets, consensus, bridges, admin keys, CI/CD signing, binary updates.
- Minimize public key exposure: Avoid address reuse; prefer address types that don’t reveal public keys until spend where possible.
- Add crypto agility: Design interfaces so signature algorithms can be swapped without rewriting apps. Consider hybrid verification in scripts or smart contracts.
- Run PQ pilots: Experiment with Dilithium/Falcon/SPHINCS+ in devnets. Measure size, verification cost, and UX impact.
- Engage standards early: Track NIST PQC, IETF CFRG drafts, and ecosystem proposals. Align encodings and parameter choices with emerging norms to avoid costly rewrites later. See IETF CFRG.
- Have a sweep plan: Create playbooks to move funds from exposed public keys to PQ/hybrid outputs on short notice. Test fees, batching, and operational throughput.
- Vendor diligence: Ask HSM, hardware wallet, and custody providers for PQ timelines, firmware auth plans, and migration tooling.
For institutions and treasuries
- Assess key exposure today: Identify assets held at addresses that reveal public keys (e.g., Taproot, Solana accounts, used Ethereum EOAs) and prioritize rotation sequencing.
- Choose crypto-agile custody: Require contracts that include PQ roadmaps and service-level objectives for migration readiness.
- Diversify controls: Prefer multisig or smart contract wallets that can add PQ paths, rate limits, and time locks to slow down potential key-forgery attacks.
- Incident drills: Simulate a sudden step-change in estimated quantum risk. Can you rotate thousands of keys in days? Who signs off? What’s the communications plan?
- Monitor policy signals: NSA CNSA 2.0 and NIST guidance won’t dictate blockchain timelines, but they provide credible migration pacing for critical systems.
Just a reminder that the biggest cybersecurity risks right now are still the usual ones: phishing attacks, harmful software, poor key management, flaws in smart contracts, and attacks on bridges. It’s important to focus on these core security practices and not get too caught up in preparing for the potential threat of quantum computing.
Myths, Edge Cases, and Open Questions
- “Quantum will kill Bitcoin overnight.” Not likely. Even if a credible quantum threat emerges, networks can soft-fork in PQ options and coordinate sweeping to safer outputs. The harder challenge is logistics at scale, not a lack of cryptographic candidates.
- “Proof-of-Work collapses under quantum.” Grover’s algorithm offers only a quadratic speedup for hashing. Practical quantum hardware capable of challenging global hash rates appears far off, and parameter tweaks (e.g., difficulty, hash output length) help maintain margins.
- “Address hashes make me safe forever.” Address hashing helps until you spend and reveal a signature or public key. If funds sit behind a public key (e.g., Taproot, many account-based chains), exposure is immediate in a post-Shor world.
- “We can just switch to PQ in a week.” Real migrations touch wallets, nodes, fee markets, hardware, and user education. Expect multi-year, staged rollouts—hence the value of crypto agility now.
- zk-proof ecosystems. SNARKs built on elliptic curves face the same Shor risk as signatures, while STARKs lean on hash assumptions and look more robust. Either way, account keys and bridges may still rely on classical signatures until upgraded.
- Aggregation gap. Today’s PQ signatures don’t replicate BLS’s elegant aggregation properties. Research into PQ-friendly aggregation or alternative consensus accounting remains ongoing.
As a researcher in this field, I’m constantly monitoring the progress of post-quantum cryptography standardization. The best place to stay up-to-date is the NIST PQC project website at csrc.nist.gov, where you can find the latest drafts for the new standards, including those for Kyber, Dilithium, and SPHINCS+ which are currently being circulated as FIPS drafts for 2024. I also frequently consult ethereum.org for resources on how developers are designing accounts with these new algorithms, and bitcoin.org for details on the transaction formats being used.
Stay updated on the latest developments in post-quantum cryptography across different blockchains with Crypto Daily. They track industry standards, project plans, and news from leading companies – check out Crypto Daily for their expert analysis.
Frequently Asked Questions
How soon could quantum computers threaten blockchain signatures?
It’s impossible to say exactly when it will happen, but experts believe fully secure, encryption-based systems are still some time away. However, organizations that set standards recommend starting to prepare now, as changing the core encryption methods used in systems is a lengthy process. Think of this as a significant, long-term risk – begin planning and implement changes gradually.
Are my Bitcoin holdings safe if I never reused addresses?
Protecting your funds involves using address types that keep your public key hidden until you spend them, which limits potential exposure. However, if funds are sent to addresses that immediately reveal your public key – like those using Taproot – they could be vulnerable if powerful quantum computers become available. Therefore, it’s wise to have a plan to move your funds into post-quantum or hybrid addresses before a serious quantum threat emerges.
Does Ethereum expose my public key?
With traditional Ethereum accounts (EOAs), signing a transaction reveals the account’s public key, making it vulnerable. Account abstraction and smart contract wallets offer a solution by allowing for more flexible and secure verification methods that can evolve over time.
Will Grover’s algorithm break SHA-256 mining?
Grover’s algorithm provides a speed increase, but it’s not a complete breakthrough. It does reduce the safety buffer of Proof-of-Work systems, but adjusting settings and the sheer difficulty of actually building the necessary technology mean it’s unlikely to pose an immediate threat.
Which post-quantum signatures look most practical for blockchains?
Dilithium and Falcon are leading options for secure digital signatures because they’re fast and efficient. SPHINCS+ is also popular because it relies on very secure, though sometimes slower, principles. The best choice for a specific situation depends on factors like how much data the system can handle, how large the signatures need to be, how quickly they need to be verified, and whether multiple signatures need to be combined.
What should teams do first to prepare?
Keep track of where digital signatures are used, reduce how much public key information is exposed, design wallets and contracts to easily adapt to new encryption methods, and try out post-quantum encryption on test networks. Also, work with companies that handle digital asset storage and security to plan their upgrades to these new methods.
Is this financial advice?
This article is for informational purposes only. Cryptocurrency investments are risky due to market fluctuations, potential security breaches, technical issues, and changing regulations. Before making any financial decisions involving crypto, it’s crucial to do your own thorough research and consider consulting with a financial professional.
Read More
- HYPE PREDICTION. HYPE cryptocurrency
- PI PREDICTION. PI cryptocurrency
- Brent Oil Forecast
- SUI PREDICTION. SUI cryptocurrency
- ONDO PREDICTION. ONDO cryptocurrency
- USD ZAR PREDICTION
- USD CNY PREDICTION
- FIL PREDICTION. FIL cryptocurrency
- DOGE PREDICTION. DOGE cryptocurrency
- USD JPY PREDICTION
2026-05-22 15:06