How Real Is the Quantum Threat?

25.03.2026

How Real Is the Quantum Threat?

The thing about blockchain security is that it relies on math problems that are practically impossible for normal computers to solve. Your private key is protected because no classical computer can reverse-engineer it from your public key in any reasonable time. We call this polynomial time, and quantum computers threaten to change that. They can solve certain types of these problems exponentially faster using the so called Shor's algorithm. A normal computer trying to crack your key is like trying every combination one by one in a brute force manner. A quantum computer gets to try massive groups of combinations simultaneously.

But the “threatens to" is doing a lot of heavy lifting there. The biggest quantum computer today (IBM's) has about 1,100 physical qubits. Qubit are the basic processing units of a quantum computer akin to bits in the regular ones. Breaking Bitcoin's cryptography would need around 2,330 logical qubits. Sounds close? It's not. A logical qubit is a reliable, error-corrected unit built from hundreds or thousands of noisy physical ones, the same way you might need a hundred unreliable witnesses to get one trustworthy testimony. So that 2,330 number actually means somewhere between 2 and 23 million physical qubits. We're roughly 1,000x short. Nobody's is going to crack your wallet this decade.

That said, the field is picking up speed. Google's Willow chip recently proved that quantum error correction actually gets better as you add more qubits, which wasn't guaranteed and its a significant milestone. A 2025 expert report counted 120 error correction research papers that year, up from 36 the year before. All the major hardware approaches have now crossed the 99% accuracy mark on basic operations. The progress is research is real, although not "sell everything now" real.

 The exact arrival date of powerful quantum computers matters less than you'd think, because of something called "harvest now, decrypt later." The idea is that governments and sophisticated attackers can scoop up encrypted data today and just wait until quantum computers can crack it open later. The storage costs of text data are negligible. This isn't theoretical. A campaign called Volt Typhoon (attributed to Chinese state actors, uncovered in 2024) was caught doing exactly this to telecom networks.

For blockchain, this is especially nasty. Public ledgers are permanent by design and every transaction is recorded forever. The moment you make a transaction and reveal your public key, that information sits on-chain indefinitely, waiting for whatever comes next. Storage is cheap. Patience is free.

 The best estimates from the big boys at Global Risk Institute, McKinsey, and IBM say there's less than a 5% chance of a crypto-breaking quantum computer before 2028. The serious probability window is 2035–2040, at around 40–60% cumulative likelihood. Grayscale (one of the biggest crypto asset managers) recently confirmed that quantum risk hasn't even come up as a concern in institutional investment decisions. Nvidia’s Jensen Huang and Meta’s Mark Zuckerberg both publicly guessed 15–20 years for practical quantum applications.

TL:DR: not tomorrow, not never, probably sometime in the 2030s.

While the quantum computers aren't ready yet, the replacement cryptography is. NIST (the U.S. standards body) spent eight years evaluating quantum-resistant encryption methods and finalized three new standards in August 2024, with a fourth added in March 2025. These are essentially new mathematical approaches designed to resist both normal and quantum computers. They're based on a different kind hard problems related to finding the shortest path through a high-dimensional lattice, which quantum computers don't speed up the way they speed up the current decryption math.

This isn't sitting on a shelf somewhere. Apple iMessage, Google Chrome, and Signal already use hybrid versions of these new standards (meaning they run both old and new encryption simultaneously). Ubuntu's next major release (April 2026) ships with quantum-resistant encryption turned on by default. The NSA requires all new national security systems to be quantum-safe by January 2027. The plumbing is getting upgraded whether the crypto world pays attention or not.

There's a huge gap between blockchain projects that have genuinely implemented quantum-resistant cryptography and projects that put "quantum-safe" in their Twitter bio.

The ones who've actually done it: QRL (Quantum Resistant Ledger) has been running quantum-resistant signatures in production since June 2018. Seven years on mainnet, zero security incidents. That's a track record. Algorand landed the first transaction signed with a NIST-approved quantum-resistant algorithm (Falcon-1024) on a major blockchain in November 2025. Their approach is opt-in per account, so users can upgrade when ready without forcing the whole network to change at once. Both projects lead on implementation maturity.

The ones resistant by design: Starknet uses a proof system (STARKs) that happens to be quantum-resistant because it relies on hash functions rather than the type of math quantum computers can break. Hedera uses SHA-384 hashing that meets NSA requirements for protecting classified information. Zcash's privacy features (its "shielded pool") get partial quantum protection from their hash-based components, even though other parts of the system remain vulnerable.

The experimental fringe: QANplatform lets developers write quantum-resistant smart contracts in mainstream programming languages (Python, Rust, Go). Abelian combines quantum resistance with financial privacy, which is technically ambitious since most privacy tools rely on the exact math quantum computers threaten. And NeverLocal, a research project out of Oxford, is exploring something even more wild called “one-shot signatures" where a cryptographic key physically destroys itself after being used once. Impossible with classical physics, theoretically possible with quantum mechanics. It's early-stage research, but it flips the entire conversation from defense to offense.

Bitcoin has a proposal (BIP-360) for gradual quantum migration. The good news is that if you've only ever received Bitcoin to an address and never spent from it, your public key was never revealed on-chain, so it's safe for now. The bad news though is that roughly 5.9 million BTC accounting for about 30% of all the supply sits in addresses where the public key is already exposed (from address reuse or old address formats). Those coins become instantly stealable the day a powerful enough quantum computer boots up. No warning, no migration window. And Bitcoin's upgrade process is famously slow since the last major upgrade (SegWit) took years of heated debate. Realistic timeline for quantum-resistant Bitcoin is like 2028 at best, possibly 2030.

Ethereum on the contrary went full throttle. In January 2026, the Ethereum Foundation made quantum security a top priority, hired a dedicated post-quantum team, and put up two $1 million research prizes. Vitalik Buterin published a concrete upgrade roadmap in February 2026 that would let individual wallets adopt quantum-resistant signatures without requiring the entire network to upgrade simultaneously. This seems like a much more practical approach than a big-bang switchover. He's estimated a 20% chance that crypto-breaking quantum computers will arrive before 2030, which apparently was enough to get serious about it.

Solana is quietly preparing too. Devs can already create wallets with dual protection (current + quantum-resistant signatures), and a new quantum-safe vault option lets users lock high-value assets behind quantum-resistant math today.

If quantum computers take longer than expected, preparing early costs you basically nothing. If they arrive faster than expected, the unprepared face catastrophic losses. The 10-15 year window gives the industry time for an orderly transition. However it would require people to actually start transitioning instead of arguing about whether the threat is real.

There are some things you can do today regardless of where you stand on the timeline. Stop reusing wallet addresses (unexposed public keys are quantum-safe by default), pay attention to which projects have working implementations versus marketing slides, and notice that quantum-resistant encryption is already live in your browser, your messaging apps, and your operating system. The upgrade is happening around you. The blockchain layer is just the last piece to catch up.

It's worth zooming out for a second, though. Yes, quantum computing forces us into more complex cryptography and tighter opsec. That's the cost. But the same technology that threatens today's encryption also opens doors that didn't exist before. Quantum communication channels could make inter-exchange and institutional data transfer physically tamper-evident. Any interception disturbs the quantum signal itself, a property no classical network can offer. Quantum sensors are already being field-tested for GPS-free navigation with military-grade accuracy, and medical imaging applications are on a credible path to clinical use within the decade. And for materials science and molecular simulation (designing new catalysts, understanding protein folding, modeling battery chemistry) quantum computers address specific problems where classical methods genuinely hit a wall.

These aren't speculative fantasies. The hardware is being tested, the math checks out, and the investment is real. The blockchain industry upgrading its cryptography is a small price of admission to a much bigger technological shift.