Key Highlights
- Amid the significant progress in quantum computing, this technology is a big threat to blockchains
- Quantum computing can expose someone’s private crypto key just by looking at their public key.
- Blockchains like Bitcoin, Ethereum, Cardano, and others are preparing to secure their network from the quantum computing threat
While major businesses in the world are busy integrating blockchain technology with their existing infrastructure, there is a major future challenge for all blockchains, including Bitcoin and Ethereum. This is the rise of quantum computers.
The security of these networks depends on complex math problems that are very difficult for ordinary computers to solve. This security measure is known as Elliptic Curve Digital Signature Algorithms (ECDSA).
But, this security is gradually becoming vulnerable as quantum computers have a special method called Shor’s algorithm. This can solve mathematical problems in less time. If this happens, a quantum computer could find someone’s private crypto key just by looking at their public key on blockchains. This would allow them to steal the funds secured by that key. This quantum computing technology is a big threat to billions worth of cryptocurrency assets available on different blockchains.
Blockchains Prepare to Counter Quantum Computing Threat
The Bitcoin Quantum Leap: Quantum computing won’t break Bitcoin—it will harden it. The network upgrades, active coins migrate, lost coins stay frozen. Security goes up. Supply comes down. Bitcoin grows stronger.
— Michael Saylor (@saylor) December 16, 2025
While some experts like Michael Saylor agree that a powerful enough quantum computer for this task is still likely several years away, some recent developments show that the timeline for this could be near. Here is how major blockchain networks plan to address this threat.
1. Ethereum
Vitalik Buterin, co-founder of Ethereum, has many times issued warnings about the danger of quantum computers to the network. In late 2025, Buterin stated that there is around 20% chance that quantum machines will become powerful enough to break current crypto security could exist by the year 2030.
Ethereum itself must pass the walkaway test.
Ethereum is meant to be a home for trustless and trust-minimized applications, whether in finance, governance or elsewhere. It must support applications that are more like tools – the hammer that once you buy it’s yours – than like…
— vitalik.eth (@VitalikButerin) January 12, 2026
In order to counter this threat, In January 2026, the Ethereum Foundation announced “post-quantum” (PQ) security a top priority. To do this, they formed a special team to take action quickly.
In order to protect from the future threat, they decided to use new mathematical formulas that can provide the blockchain protection against quantum attacks. These formulas were approved by the U.S. National Institute of Standards and Technology (NIST) in 2024-2025. Here are some of these proposed formulas for Ethereum:
- ML-KEM (based on Kyber) – This standard is expected to exchange secure encryption keys.
- ML-DSA – This is based on Dilithium and is important for creating digital signatures for signing a transaction.
- SLH-DSA – It is a backup method to use a different math.
However, this upgrade can cost users and the network. The major issue of this development is its size, as quantum-resistant signatures can be up to 40 times bigger than the signatures used today. This could increase transaction costs and slow down the entire network. However, Ethereum is planning to deal with these kinds of problems.
2. Bitcoin
The Bitcoin community has also taken some steps to secure the network from future threats. According to some of its main developers, there is enough time for them to do this.
Unlike other blockchains, they are planning to implement new security upgrades through “soft forks,” which are backwards-compatible changes to the Bitcoin protocol. There are some proposals, like BIP-360, which can outline how to create new types of quantum-resistant Bitcoin addresses. This would allow users to move their funds to these new and safe addresses on their own timeline.
However, this process might take a long time. According to some experts, this process of complete transition could take between 5 and 10 years. The reason behind this long time is its community, which requires a collective agreement.
Also, their major task is to protect billions of dollars locked in “dormant” addresses, which could be vulnerable if their public keys have ever been exposed on the blockchain.
Also, this upgrade has received technical support from other entities. Companies like BTQ Technologies clearly explained a quantum-secure version of Bitcoin using NIST-standard algorithms in 2025. This proves that it can be done.
Apart from this, developers are testing solutions like hybrid signatures. This will help them to combine the current security with a new post-quantum puzzle at the protocol level.
3. Other Blockchains
There are some other blockchains, which are doing their own preparation to make their network secure from post-quantum.
- Cardano: In December 2025, Charles Hoskinson affirmed that while the necessary post-quantum puzzle exists, it also has some negatives. To deal with this, the Cardano team is leaning toward using “lattice-based” schemes like Dilithium for its long-term security plan.
- Solana: The leading blockchain, which is known for high speed, is already testing quantum-resistant transactions on its experimental test networks.
- Polkadot: It is also doing research on some solutions, such as similar types of solutions to lattice-based algorithms. It is examining how to integrate this new cryptography within its unique architecture.
Apart from this, there is a very impressive development taking place in this direction. The Quantum Resistant Ledger (QRL), which is developed from the creation of XMSS, is preparing QRL 2.0 for 2026 with EVM compatibility.
Conclusion
While there is no definitive timeline to arrive at the threat of quantum computing, most blockchains are now taking a technical approach to deal with this. However, only time can tell how efficient their approach will be to deal with such a threat.
Also Read: DeFi Sanctions Crackdown: Privacy Tools That Actually Work
See less