{"id":33626,"date":"2025-07-30T23:49:07","date_gmt":"2025-07-30T23:49:07","guid":{"rendered":"https:\/\/www.newsbeep.com\/au\/33626\/"},"modified":"2025-07-30T23:49:07","modified_gmt":"2025-07-30T23:49:07","slug":"bitcoin-and-ethereum-arent-ready-for-quantum-computers-researcher-says","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/au\/33626\/","title":{"rendered":"Bitcoin and Ethereum Aren\u2019t Ready For Quantum Computers, Researcher Says"},"content":{"rendered":"<p>In brief<br \/>\nQuantum computers threaten blockchain security by cracking private keys with Shor\u2019s algorithm.<br \/>\nChains using EdDSA, like Solana and Sui, are easier to upgrade for quantum resistance.<br \/>\nOlder chains like Bitcoin face steep risks and costly upgrades, or risk leaving assets exposed.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">Quantum computing could one day break the cryptographic foundations that secure trillions of dollars in crypto assets\u2014and according to a new report from Mysten Labs, some blockchains are more unprepared than others.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">The <a href=\"https:\/\/eprint.iacr.org\/2025\/1368.pdf\" target=\"_blank\" rel=\"noopener nofollow\" class=\"sc-adb616fe-0 bJsyml\">report<\/a>, released Wednesday, argues that networks using the EdDSA signature scheme\u2014such as <a href=\"https:\/\/decrypt.co\/resources\/what-is-solana-a-scalable-decentralized-network-for-dapps\" target=\"_blank\" rel=\"noopener nofollow\" class=\"sc-adb616fe-0 bJsyml\">Solana<\/a>, <a href=\"https:\/\/decrypt.co\/resources\/what-is-sui-the-latest-solana-killer-from-former-diem-devs\" target=\"_blank\" rel=\"noopener nofollow\" class=\"sc-adb616fe-0 bJsyml\">Sui<\/a>, and Near\u2014are structurally better positioned to withstand quantum threats.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">Older chains like Bitcoin and Ethereum, which rely on the ECDSA system, face steeper cryptographic and logistical hurdles to implement post-quantum defenses.<\/p>\n<p>\ufeff<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">As more corporations and governments establish Bitcoin <a href=\"https:\/\/decrypt.co\/309032\/president-trump-signs-executive-order-to-establish-bitcoin-reserve-crypto-stockpile\" target=\"_blank\" rel=\"noopener nofollow\" class=\"sc-adb616fe-0 bJsyml\">treasuries<\/a>, Kostas Chalkias, co-founder and Chief Cryptographer at Mysten Labs, said the pressure to meet post-quantum security standards is growing.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">&#8220;Governments are well aware of the risks posed by quantum computing. Agencies worldwide have issued mandates that classical algorithms like ECDSA and RSA must be deprecated by 2030 or 2035,&#8221; Chalkias told Decrypt.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">&#8220;That means if your blockchain supports sovereign assets, national treasuries in crypto, ETFs, or CBDCs, it will soon be required to adopt post-quantum cryptographic standards, if your community cares about long-term credibility and mass adoption,&#8221; he added.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">Edwards-curve Digital Signature Algorithm (<a href=\"https:\/\/docs.keyfactor.com\/ejbca\/9.0\/eddsa-keys-and-signatures\" target=\"_blank\" rel=\"noopener nofollow external\" class=\"sc-adb616fe-0 bJsyml\">EdDSA<\/a>) is a newer, faster, and easier-to-implement digital signature scheme that avoids common Elliptic Curve Digital Signature Algorithm (<a href=\"https:\/\/www.encryptionconsulting.com\/education-center\/what-is-ecdsa\/\" target=\"_blank\" rel=\"noopener nofollow external\" class=\"sc-adb616fe-0 bJsyml\">ECDSA<\/a>) pitfalls, like compromised security from weak random number generation, nonce reuse, and side-channel leakage.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">Both <a href=\"https:\/\/decrypt.co\/resources\/what-is-bitcoin-four-minute-instant-guide-explainer\" target=\"_blank\" rel=\"noopener nofollow\" class=\"sc-adb616fe-0 bJsyml\">Bitcoin<\/a> and <a href=\"https:\/\/decrypt.co\/resources\/what-is-ethereum-quickly-explained-four-minute-guide\" target=\"_blank\" rel=\"noopener nofollow\" class=\"sc-adb616fe-0 bJsyml\">Ethereum<\/a> currently rely on ECDSA for transaction security and will eventually need to upgrade to quantum-resistant algorithms.<\/p>\n<p lang=\"en\" dir=\"ltr\">\ud83d\udea8 BREAKING: Sui Research just dropped a major breakthrough in quantum transition of &#8220;some&#8221; blockchains. Unfortunately it works for Sui, Solana, Near, Cosmos and other EdDSA-based chains, but not for Bitcoin and Ethereum \ud83d\ude22<\/p>\n<p>Here is the paper: <a href=\"https:\/\/t.co\/XdsC90zQi9\" data-wpel-link=\"internal\" rel=\"nofollow\">https:\/\/t.co\/XdsC90zQi9<\/a><\/p>\n<p>*Afaik this\u2026 <a href=\"https:\/\/t.co\/8Sxcqtegjh\" data-wpel-link=\"internal\" rel=\"nofollow\">pic.twitter.com\/8Sxcqtegjh<\/a><\/p>\n<p>\u2014 Kostas Kryptos (@kostascrypto) <a href=\"https:\/\/twitter.com\/kostascrypto\/status\/1949743266850603095?ref_src=twsrc%5Etfw\" data-wpel-link=\"internal\" rel=\"nofollow noopener\" target=\"_blank\">July 28, 2025<\/a><\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">Chalkias warned that quantum computing poses an existential threat to cryptography and warned that once <a href=\"https:\/\/decrypt.co\/resources\/from-the-quantum-realm-to-reality-a-beginner-guide-to-the-computer-of-the-future\" target=\"_blank\" rel=\"noopener nofollow\" class=\"sc-adb616fe-0 bJsyml\">quantum computers<\/a> scale, they could break the cryptographic assumptions behind most existing blockchains.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">The threat stems from quantum machines\u2019 ability to solve complex problems using <a href=\"https:\/\/www.classiq.io\/insights\/shors-algorithm-explained\" target=\"_blank\" rel=\"noopener nofollow external\" class=\"sc-adb616fe-0 bJsyml\">Shor\u2019s Algorithm<\/a>. The method can quickly factor large numbers, making it capable of breaking the encryption behind widely used cryptographic systems like RSA and ECDSA.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">Paired with Shor&#8217;s algorithm, that capability could allow attackers to use quantum computers to reverse-engineer private keys from public blockchain data. Even holding the private keys, Chalkias said, may not matter in a post-quantum world.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">&#8220;Even if someone still holds their Bitcoin or Ethereum private key, they may not be able to generate a post-quantum secure proof of ownership, and this comes down to how that key was originally generated, and how much of its associated data has been exposed over time,&#8221; he said.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">While quantum computers aren\u2019t yet powerful enough to do this, according to San Jose State University computer science professor Ahmed Banafa, the time to prepare is now.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">\u201cTo adopt this new method, Bitcoin will need to implement a hard fork,\u201d Banafa told Decrypt. \u201cThis means having to change wallet addresses, migrate funds, and handle all the complications that come with it.\u201d<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">Banafa acknowledged that the likelihood of this hardfork happening is small, pointing to the <a href=\"https:\/\/decrypt.co\/332724\/ethereum-turns-10-whats-coming-next-decade\" target=\"_blank\" rel=\"noopener nofollow\" class=\"sc-adb616fe-0 bJsyml\">dispute<\/a> in the Ethereum community over whether or not to rollback the blockchain after a hack that led to the creation of <a href=\"https:\/\/decrypt.co\/resources\/what-is-ethereum-classic-explained-guide-cryptocurrency\" target=\"_blank\" rel=\"noopener nofollow\" class=\"sc-adb616fe-0 bJsyml\">Ethereum Classic<\/a> in 2015.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">\u201cIt\u2019s similar to when Ethereum split into Ethereum and Ethereum Classic,\u201d he said. \u201cWe could see a similar split in Bitcoin, with some people insisting on a different approach and refusing to follow proposed upgrades.\u201d<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">Another issue Banafa noted was the sheer number of Bitcoin and Ethereum wallets that have come into existence since the launch of those blockchains.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">\u201cThe real challenge will be implementation\u2014if users don\u2019t upgrade or secure their accounts, they could pose a risk to the network,\u201d he said. \u201cAnd if they lose funds as a result, they may try to blame the network.\u201d<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">According to Mysten Labs, if Bitcoin had used EdDSA from the start, even wallets belonging to\u00a0<a href=\"https:\/\/decrypt.co\/resources\/satoshi-nakamoto\" target=\"_blank\" rel=\"noopener nofollow\" class=\"sc-adb616fe-0 bJsyml\">Satoshi Nakamoto<\/a> could be made quantum-safe.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">Banafa noted, however, that hindsight plays a role in this debate. In 2009, when Bitcoin launched, quantum computing wasn\u2019t on the radar.<\/p>\n<p class=\"font-meta-serif-pro scene:font-noto-sans scene:text-base scene:md:text-lg font-normal text-lg md:text-xl md:leading-9 tracking-px text-body gg-dark:text-neutral-100\">\u201cBack in 2019, people assumed SHA-256 was strong enough\u2014it would take years to crack,\u201d he said. \u201cNo one expected quantum computing to become as powerful as it is now.\u201d<\/p>\n<p>Generally Intelligent Newsletter<\/p>\n<p>A weekly AI journey narrated by Gen, a generative AI model.<\/p>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"In brief Quantum computers threaten blockchain security by cracking private keys with Shor\u2019s algorithm. Chains using EdDSA, like&hellip;\n","protected":false},"author":2,"featured_media":33627,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[64,63,257,105],"class_list":{"0":"post-33626","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computing","8":"tag-au","9":"tag-australia","10":"tag-computing","11":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/33626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/comments?post=33626"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/33626\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media\/33627"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media?parent=33626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/categories?post=33626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/tags?post=33626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}