3.12.4 Post-Quantum Considerations
Most of Book 3 has covered threats that are present today. Section 3.12.4 covers a threat that is mostly not — but is approaching faster than many in the industry expected. Sufficiently powerful quantum computers, when they exist, will break the elliptic-curve cryptography that secures every Ethereum account, every Bitcoin wallet, and the vast majority of digital signatures protecting on-chain value. The transition from "this threat is decades away" to "this threat may arrive within ten years" happened largely in the past 18 months, driven by a combination of algorithmic breakthroughs that reduced the quantum resources required for cryptanalysis and steady (if incremental) hardware progress.
This subsection covers what the threat actually is, what is being done about it, and what a smart contract developer should and should not be worried about today. The framing throughout: quantum threats are real, the migration is underway, but it is not yet an emergency for protocols deployed today. Funds in Ethereum accounts are safe in 2026; the question is whether they will still be safe in 2032, 2035, or 2040. The work happening now is to ensure they are.
The topic is unusual for Book 3 in being primarily a protocol-level concern rather than a contract-level one. Individual smart contracts do not need to "implement post-quantum cryptography" — Ethereum's consensus layer does. But contracts that store, manage, or rely on signed messages will eventually need to migrate, and contracts being designed today for very long lifespans should consider quantum-resistance in their architecture.
What's Actually at Risk
Three distinct vulnerabilities arise from quantum computing for blockchain systems:
1. ECDSA Signatures (Account Security)
This is the central concern. Every Ethereum account is secured by an ECDSA key pair on the secp256k1 curve. The same is true for Bitcoin (also secp256k1) and most major chains. ECDSA's security depends on the discrete logarithm problem on elliptic curves — a problem that is computationally infeasible for classical computers but reduces to polynomial time on a sufficiently large quantum computer via Shor's algorithm.
The attack pattern, when feasible: an attacker observes any Ethereum transaction signed by a target address. From the transaction, they can derive the address's public key (the public key is included in the signature, not just hashed in the address). With sufficient quantum compute, they derive the private key from the public key. They then sign transactions as the target, draining the account.
Critical detail: addresses that have never made an outbound transaction are partially protected. The public key is not exposed on-chain until the address signs something. Funds sitting in an address that has only received transactions cannot be derived from on-chain data alone — they would require breaking the hash function (SHA-3 / Keccak) to derive the address back to the public key, which quantum computers cannot do efficiently.
This protection vanishes the moment the address signs any transaction. And it doesn't apply to addresses that have made even one outbound transaction in their history — once the public key is exposed, the attacker has a permanent window.
2. Validator Signatures (Consensus Security)
Ethereum's proof-of-stake consensus uses BLS signatures for validator attestations and block proposals. BLS shares ECDSA's vulnerability to quantum attack — it is also based on elliptic curve operations.
If validator signatures could be forged, the entire consensus mechanism would be subvertible. An attacker with quantum capability could potentially forge attestations, manipulate finality, or impersonate validators.
This is a protocol-level concern handled by core Ethereum development, not by application developers. The Lean Ethereum roadmap (Vitalik Buterin, February 2026) explicitly identifies validator signatures as one of the four cryptographic areas requiring post-quantum upgrades.
3. ZK Proof Systems
Many zero-knowledge proof systems (used by ZK rollups, privacy protocols, and increasingly by oracle attestation systems) rely on cryptographic assumptions that quantum computers could undermine. Some ZK constructions (STARKs) are already quantum-resistant by virtue of using only hash-function-based cryptography. Others (SNARKs based on pairing-friendly curves like BN254 or BLS12-381) are vulnerable.
For protocols built on ZK rollups (Section 3.11.5, 3.11.8), the quantum-resistance of the underlying proof system matters. STARK-based systems (StarkNet, some Polygon configurations) inherit quantum resistance for free. SNARK-based systems (zkSync, Polygon zkEVM, Scroll, Linea) will eventually need to migrate. Section 3.12.5 covers ZK proof system security in more detail.
4. Hash Functions and Other Primitives
Less critically: quantum computers reduce the security of hash functions by a quadratic factor (Grover's algorithm). A 256-bit hash effectively becomes a 128-bit hash against quantum attackers. This is still secure in practice — 128 bits of security exceeds the computational reach of any plausible attacker for the foreseeable future — but represents a halving of the security margin.
This means SHA-256, Keccak-256, and similar hash functions are less vulnerable than ECDSA but not immune. The migration path is generally to use larger hash outputs where the security margin matters.
The Timeline Question
The question every protocol team is asked: when does this become urgent? The honest answer in 2026: probably not for several more years; possibly within a decade.
Specific data points informing this estimate:
Hardware progress. As of mid-2025, the largest quantum computers had hundreds of physical qubits. Breaking ECDSA on a real Ethereum-scale curve requires somewhere between a few hundred thousand and a few million logical qubits, depending on the algorithm and error rates. Logical qubits require many physical qubits each (perhaps 1,000-10,000) for error correction. The gap remains large, but it is closing.
Algorithmic progress has accelerated. In the past 18 months, three published papers have reduced the quantum resources required for cryptanalysis by an order of magnitude. What in May 2024 was estimated to require 20 million physical qubits for RSA-2048 was, by early 2026, estimated at fewer than 1 million. Estimates for breaking ECDSA on secp256k1 have similarly dropped, currently below 500,000 logical qubits under newer architectures.
Industry forecast. Reputable forecasters now place the "Q-day" estimate (when a cryptographically relevant quantum computer first exists) somewhere between 2030 and 2040. Estimates vary substantially across experts. Some prominent voices have moved their estimates earlier in recent years; others remain more conservative.
NIST timeline. The U.S. National Institute of Standards and Technology has published Internal Report 8547, which calls for ECDSA-P-256 and RSA-2048 to be deprecated after 2030 and disallowed after 2035. This is the closest thing to an official regulatory timeline for cryptographic migration.
Ethereum's timeline. The Ethereum Foundation formed a Post-Quantum Security team in January 2026. Vitalik Buterin's February 2026 roadmap identifies four cryptographic areas needing post-quantum upgrades and targets completion of core post-quantum infrastructure by approximately 2029. EIP-8141 (post-quantum account abstraction) is being considered for the Hegotá hard fork, planned for the second half of 2026.
The synthesis: the cryptographic migration is being actively developed and is targeted to be infrastructurally complete several years before the threat is expected to materialize. This is the right way for the transition to happen — gradual, deliberate, with substantial margin between when defenses are deployed and when attacks become feasible. The risk is that the threat arrives faster than expected; the upside is that even the most aggressive timelines leave room for orderly migration.
"Harvest Now, Decrypt Later"
One specific threat does not wait for quantum computers to actually arrive. Harvest-now-decrypt-later attacks involve recording encrypted or signed data today, with the intention of decrypting or forging it once quantum capabilities mature.
For blockchain specifically, this has limited impact for currently-active addresses (the value is in the present-day signing capability, not in past signatures). But for long-term holdings, dormant addresses, and large historical balances, the threat is concrete: an attacker who records the public key of a large dormant address today could, ten years from now, derive the private key and steal the funds.
This is the strongest argument for not delaying the migration. Addresses that need to be secure for very long horizons should already be considering post-quantum protections, even though the active threat is years away.
NIST Post-Quantum Standards
In August 2024, NIST finalized the first three post-quantum cryptography standards after a years-long evaluation process:
ML-KEM (formerly CRYSTALS-Kyber, now FIPS 203). A lattice-based key encapsulation mechanism. Used for encrypted communications rather than signatures; less directly relevant to blockchain signatures but important for infrastructure that uses TLS.
ML-DSA (formerly CRYSTALS-Dilithium, now FIPS 204). A lattice-based digital signature algorithm. This is the leading candidate to replace ECDSA for blockchain signatures. Signatures are larger than ECDSA (around 2-4KB vs. 64 bytes), and verification is somewhat slower, but both are within practical limits for on-chain use.
SLH-DSA (formerly SPHINCS+, now FIPS 205). A hash-based signature scheme. Stateless and quantum-resistant based only on well-understood hash assumptions, but with much larger signatures (8-50KB) and slower performance. Useful as a backup if lattice assumptions are ever broken.
A fifth algorithm, HQC, was selected by NIST in March 2025 as a code-based backup to the lattice-based primary standards. Code-based cryptography rests on different mathematical assumptions (decoding random linear codes) than lattice-based cryptography, providing diversification.
For smart contract developers, the relevant near-future fact: Ethereum's account-level post-quantum cryptography will likely use ML-DSA or a variant. The signature size implications matter for protocols that store many signatures on-chain.
What This Means for Smart Contracts Today
For the vast majority of smart contracts deployed today, the answer is nothing urgent. The migration is being handled at the protocol level. When Ethereum migrates to post-quantum signatures, existing accounts will receive a structured upgrade path. Contracts will continue to verify signatures using whatever scheme Ethereum uses; the change is largely transparent to application-layer code.
A few categories of contracts that should think about post-quantum considerations today:
Contracts with Very Long Lifespans
Contracts intended to operate for decades — institutional custody contracts, very long vesting schedules, certain DAO treasury structures — should plan for migration paths. If the contract cannot be upgraded and will hold value past 2035, the cryptographic assumptions of today need to be evaluated against the cryptographic landscape of then.
The practical answer: maintain upgradeability (Section 3.7.6 covers upgradeability tradeoffs) or architect the contract so that key rotation is possible (the contract can be migrated to new keys without losing state).
Contracts that Store Signatures On-Chain
ERC-2612 permits, Permit2 patterns, and signature-based authorization schemes embed ECDSA signatures in on-chain state or transaction calldata. When the underlying signature scheme changes, the storage format and verification logic will need to change.
Forward-looking design: where possible, abstract signature verification behind a function rather than hardcoding ecrecover directly. This allows easier migration when the underlying primitive changes.
// Less migration-friendly
function executeWithSig(bytes32 hash, bytes calldata sig) external {
address signer = ecrecover(hash, ...);
require(authorized[signer], "unauthorized");
// ...
}
// More migration-friendly: signature verification is pluggable
function executeWithSig(bytes32 hash, bytes calldata sig) external {
require(signatureVerifier.verify(authorized_signer, hash, sig), "invalid sig");
// ...
}
The migration-friendly version requires more setup, but a future post-quantum migration can swap the verifier rather than reimplementing the contract. This is similar to the discipline of using ERC-1271 (Section 3.11.7) — abstracting the signature primitive from the protocol.
Contracts with Large or Dormant Balances
Protocols managing large treasury reserves, especially treasuries that don't actively transact, should consider whether post-quantum protection is warranted. Options:
- Address freshness rotation: periodically move funds to a fresh address to limit the public-key exposure window
- Multi-signature with diverse cryptographic schemes: a multisig that includes signatures from multiple schemes (one classical, one post-quantum) provides defense in depth
- Time-locked withdrawal: even if a private key is later compromised, a sufficiently long withdrawal delay gives the protocol time to detect and respond
Privacy and ZK-Based Protocols
Protocols relying on SNARK-based privacy systems (Tornado Cash, Aztec, etc.) inherit the quantum vulnerability of their underlying proof system. STARK-based protocols do not. Protocols selecting between SNARK and STARK should weigh quantum-resistance as one factor (Section 3.12.5 covers this further).
Cross-Chain Bridges
Bridges with their own validator sets and signature schemes will need to migrate alongside (or independently of) Ethereum's protocol-level migration. Bridge designs that hardcode ECDSA verification will face transition costs; bridge designs that abstract verification will have smoother paths.
The Migration Strategies Under Discussion
The Ethereum Foundation's Lean Ethereum roadmap and related proposals identify several migration strategies. The current discussion (early 2026) centers on:
Account abstraction as a migration path. EIP-4337 (Section 3.11.7) lets accounts implement custom validation logic. A user could migrate their account to a smart contract that uses ML-DSA signatures while keeping the same address. This builds on infrastructure that already exists.
EIP-7702 hybrid identities. The Pectra-introduced ability for EOAs to delegate to smart-contract code per transaction (Section 3.11.7) creates a stepping stone toward smart-account-only operation. An EOA-with-7702 can use post-quantum signatures for specific transactions while preserving the EOA's address.
Native post-quantum accounts. Eventually, Ethereum may introduce a new account type that natively uses post-quantum signatures. This requires consensus-layer changes and is the target of work expected to ship in the late-decade timeframe.
Validator-level migration. Independently of account-level migration, BLS validator signatures will need to be replaced. This is a more straightforward consensus-protocol change (the validator set is finite and coordinated) than the account-level migration (which involves millions of independently-controlled EOAs).
For protocols building today, the practical implication: the migration mechanisms will be available through account abstraction. Protocols that already support smart account users (the recommendation from Section 3.11.7) are positioned for the eventual transition.
What Protocol Teams Should Be Doing Now
For a protocol team in 2026, a reasonable post-quantum posture:
Documented awareness. The team should understand the threat, the timeline, and the relevant migration plans. This is not about implementing post-quantum cryptography today — it is about not being surprised when the migration happens.
Abstract signature verification. Where possible, signature verification should be pluggable. ERC-1271 for smart account signatures is one example; using libraries like OpenZeppelin's SignatureChecker rather than direct ecrecover calls is another.
Upgradeability for very-long-lived contracts. Contracts intended to operate for decades should preserve the ability to migrate cryptographic primitives. Section 3.7.6 (Upgradeability Patterns and Vulnerabilities) covers the tradeoffs.
Consider quantum-resistance in major architectural decisions. Choosing between STARK-based and SNARK-based ZK systems, or between bridge architectures with different cryptographic foundations, should include quantum-resistance as one consideration.
Monitor the timeline. Ethereum's PQ team publishes updates; NIST publishes timeline updates; major industry players publish forecasts. A protocol team should designate someone to track these and report material developments.
Not panic. Funds in Ethereum accounts are safe in 2026. The migration is being managed competently by the people responsible for managing it. Protocols that follow the guidance above will be positioned for the transition; protocols that don't will face a more painful migration in 5-10 years.
What's Changing in 2026 and Beyond
Several trends are likely to evolve over the next several years:
More aggressive timelines for "Q-day." The recent trend of algorithmic improvements has shifted estimates earlier; this may continue. Each significant advance in quantum cryptanalysis shortens the available migration window.
Standardization of post-quantum signatures in account abstraction. ML-DSA-based smart accounts will likely become available in production through ERC-4337 paymasters and validator modules well before any consensus-layer migration. This gives users a path to opt-in to quantum-resistant accounts ahead of the mandatory transition.
Bridge protocol migrations. Bridge teams will need to migrate independently of L1 chains, on potentially different timelines. The cross-chain landscape will have a mixed cryptographic state for some period.
Insurance products. Some cyber insurance products (Section 3.12.8) are beginning to incorporate post-quantum risk. Protocols with substantial dormant balances may face higher premiums for cryptographic exposure as the timeline shortens.
Possibility of catastrophic surprises. The honest risk: a quantum capability could emerge faster than expected. The migration plan assumes a multi-year window; if that window is shorter than anticipated, the transition will be disorderly. This is a real tail risk, mitigated only by accelerated migration.
Practical Checklist
For a protocol building today with a long-term horizon:
- The team has documented understanding of the post-quantum threat landscape
- Signature verification uses abstracted interfaces (ERC-1271, SignatureChecker) rather than hardcoded ecrecover
- Contracts intended to outlive 2030-2035 have upgrade or migration paths
- Cryptographic-architecture decisions (ZK system choice, bridge selection) consider quantum-resistance
- The protocol is monitoring Ethereum's post-quantum roadmap
- Treasury management practices consider address-freshness rotation for large dormant balances
For protocols deciding when to actively migrate to post-quantum primitives:
- Migration timing is informed by both the threat timeline and the protocol's specific exposure
- Early adoption is balanced against the maturity of the chosen post-quantum primitives
- Users have a documented migration path (typically via smart accounts under ERC-4337)
- Communication about migration includes the why, not just the how — users need to understand the threat to motivate the change
The honest closing: most protocols can defer active migration for several more years and address it through the natural upgrade cycles already planned. Protocols with very long lifespans, very large dormant balances, or particularly time-sensitive cryptographic dependencies should consider acting earlier. Treating quantum threats as completely irrelevant to protocol design in 2026 is no longer defensible; treating them as urgent operational concerns is generally not yet warranted either.
Cross-References
- Composability — Section 3.11.2 covers signature handling patterns that affect migration ease
- Account abstraction — Section 3.11.7 covers ERC-4337 as the primary migration mechanism for post-quantum account signatures
- Cross-chain and bridge security — Section 3.11.5 covers bridges that will need independent cryptographic migration
- L2 considerations — Section 3.11.8 covers L2 deployment; SNARK-based L2s and STARK-based L2s have different quantum-resistance profiles
- Zero-knowledge proof system security — Section 3.12.5 covers ZK system choices and their quantum-resistance implications
- Upgradeability patterns — Section 3.7.6 covers the upgrade mechanisms needed for very-long-lived contracts
- NIST FIPS 203/204/205 —
https://csrc.nist.gov/projects/post-quantum-cryptographyfor the standards documents - Ethereum Post-Quantum Roadmap —
https://ethereum.org/roadmap/future-proofing/quantum-resistance/ - Vitalik Buterin's PQ roadmap (February 2026) — referenced in Ethereum Foundation publications
- NIST IR 8547 — the transition timeline document for ECDSA and RSA deprecation