Quantum Computing Timeline Shrinks
The timeline for quantum computing moving from theory to a real-world security threat has drastically shortened. Advances in artificial intelligence are helping researchers develop scalable quantum computers much sooner than expected. This rapid progress is forcing financial institutions and blockchain developers to urgently reassess the security of digital assets, as current encryption methods are becoming outdated.
'Harvest Now, Decrypt Later' Threat
The main danger to digital assets isn't an immediate hack, but the 'harvest now, decrypt later' strategy. State actors are recording encrypted data now, planning to unlock it with future quantum computers. For blockchains, this poses a structural risk. Around 30% of Bitcoin's supply, including older addresses, is already exposed because their public keys are visible on the network. Bitcoin's cautious approach to changes, while usually a strength, makes quick adoption of quantum-resistant cryptography challenging.
Blockchain Architectures Vary in Vulnerability
Different blockchain networks face different levels of risk. Some have fixed address structures, while others are more flexible. Solana, for instance, is highly vulnerable because its addresses are directly linked to its public key models. NEAR Protocol, however, uses an account-based system with changeable access keys, allowing it to switch to post-quantum signatures with a single transaction, avoiding difficult network-wide upgrades. Ethereum is also working to enhance its security, but its complex system, which includes BLS signatures, presents a larger attack surface.
The Security Debt Challenge
Despite efforts to adopt post-quantum cryptography, a significant 'migration gap' remains. Even as new protocols are tested, hardware wallets, institutional custody systems, and cross-chain bridges are not yet fully ready. Experts warn that if these upgrades take too long, securing older systems could become too expensive. Some risk managers suspect that the 'quantum arms race' is being used by some projects to justify increased spending, while the real issue of human error in key management persists.
