Quantum Threat to Cryptocurrencies

Preparing for Crypto’s Quantum Future: A Practical Guide

Introduction

This is the final article in a ten-part series on the quantum threat to cryptocurrencies. The preceding nine articles covered the territory: resource estimates showing that breaking blockchain cryptography requires fewer qubits and less time than previously assumed; platform-specific vulnerability analyses for Bitcoin, Ethereum, and the Lightning Network; deep technical migration roadmaps for fixing Bitcoin and fixing Lightning at the protocol level; the governance coordination challenge that will determine whether the migration happens in time; and a survey of quantum readiness across the broader blockchain ecosystem.

The question that remains: what should you actually do?

The answer depends on who you are and what you control. A Bitcoin holder with a single wallet faces different decisions than an exchange operating custodial infrastructure for millions of accounts. A protocol developer writing consensus code faces different constraints than an institutional investor evaluating quantum risk in a portfolio. This guide is segmented accordingly. Find your section, take the actions that apply, and revisit as the landscape evolves.

Two framing principles apply across every section. First: no quantum computer can break cryptocurrency cryptography today. The hardware does not exist. Current resource estimates place the requirement at roughly 500,000 physical qubits on a superconducting architecture or roughly 10,000 reconfigurable neutral atom qubits; the largest demonstrated devices operate orders of magnitude below these thresholds. Do not panic. Do prepare.

Second: the reason to act now is not that Q-Day is imminent. It is that the deadlines are set. NIST’s published transition timeline (IR 8547, initial public draft) proposes deprecating ECDSA by 2030 and disallowing it by 2035. Google has set a 2029 internal PQC migration deadline. Cryptographic migrations take years. The organizations that start now will complete the transition with time to spare. Those that wait for certainty will be scrambling.

For Individual Bitcoin Holders

Your exposure depends on your address type and whether your public key has been revealed on-chain.

Check Your Address Type

Look at the prefix of the address where you hold Bitcoin:

bc1q addresses (P2WPKH/P2WSH): These are SegWit addresses. Your public key is hidden behind a hash as long as you have never sent a transaction from this specific address. If you have only received to this address and never spent from it, you are not at risk from at-rest quantum attacks. This is the safest current address type for quantum exposure.

bc1p addresses (P2TR/Taproot): Your public key is stored directly in the locking script, visible on the blockchain from the moment you received coins. This is a quantum security regression from SegWit. Consider moving funds to a fresh, non-reused bc1q address to remove the at-rest exposure.

1... addresses (P2PKH): Your public key is hidden behind a hash, but only if you have never sent from this address. Because Bitcoin consumes UTXOs entirely, change is normally routed to a fresh address. However, if your wallet routed change back to the same address, or if you received new payments to an address you previously spent from (address reuse), those funds are exposed. Move any remaining funds at reused addresses to a fresh bc1q address.

3... addresses (P2SH): Similar to P2PKH regarding hash protection. Check whether the underlying script has been revealed through spending.

Immediate Actions

Stop reusing addresses. Every time you send Bitcoin from an address that still holds funds, you expose the public key for all remaining coins at that address. Use a wallet that generates a fresh address for every receive. Most modern HD wallets (Trezor, Ledger, Sparrow, BlueWallet) do this by default.

Move any funds sitting in Taproot (bc1p) addresses to a fresh bc1q address if you are concerned about long-term at-rest exposure. The cost is one transaction fee. The benefit is removing your public key from on-chain visibility.

Do not share extended public keys (xpubs) with portfolio tracking services, third-party wallets, or business partners unless you understand the implications. In a post-quantum world, extended public key exposure combined with a single compromised derived key can expose the entire key hierarchy.

What to Watch For

Monitor BIP-360 activation progress. When quantum-safe bc1z (P2MR) addresses become available, plan to migrate your holdings. This is not urgent today but will become important as the CRQC timeline narrows.

If you hold P2PK coins (from Bitcoin’s earliest years, no address prefix, very rare for most users), these have permanently exposed public keys and are the highest-priority migration target. Move them to a hash-protected address immediately if you have the private keys.

For Ethereum Holders and DeFi Users

Your Ethereum account’s public key was exposed the first time you sent a transaction. Unlike Bitcoin, there is no hash protection for accounts that have transacted.

Immediate Actions

There is no effective interim mitigation comparable to Bitcoin’s address hygiene. Ethereum’s account model permanently exposes your public key after the first outbound transaction, and legacy EOAs have no key rotation mechanism. Accept the current exposure as a known risk and plan for migration when post-quantum signature support becomes available.

Track the progress of EIP-8141 (Frame Transactions). When it ships (potentially in the Hegotá hard fork or a subsequent upgrade), it will allow your account to adopt a quantum-safe signature scheme without changing your address. Be among the first to migrate when wallet software supports PQ signatures.

If you operate with significant DeFi positions, evaluate the admin key exposure of the protocols you use. Are the admin keys for the smart contracts governing your positions exposed on-chain? Do the protocols have key rotation mechanisms? The admin vulnerability analysis in this series maps the specific risks.

For Validators

If you operate Ethereum validators, your BLS12-381 signing keys are exposed in the validator registry. Monitor the Ethereum Foundation’s leanXMSS research for hash-based replacement of BLS validator signatures. When PQ validator credentials become available, plan for credential rotation. Advocate within your staking pool or protocol for fast key rotation mechanisms as an interim measure.

For Exchange and Custodial Infrastructure Operators

Exchanges and custodians face the sharpest intersection of quantum risk and regulatory obligation. You hold assets on behalf of others, and your key management practices determine whether those assets are quantum-vulnerable.

Audit and Remediate Address Reuse

Address reuse is the single highest-impact vulnerability you can fix today, without waiting for any protocol upgrade. The Google paper identifies several major exchanges among the top vulnerable Bitcoin addresses by BTC balance. Every reused address with exposed public keys is an at-rest target for a future quantum attacker.

Implement strict single-use address policies for all deposit addresses. Use Hierarchical Deterministic wallet structures with hardened derivation paths. Audit existing address pools for reuse and consolidate exposed funds to fresh, non-reused addresses.

For Ethereum custody: ensure that hot wallet rotation procedures exist and are exercised regularly. When EIP-8141 ships, plan for rapid migration of custodial accounts to PQ-capable signature schemes.

Prepare for Regulatory Pressure

Your regulators will ask about quantum risk. NIST’s deprecation timeline (ECDSA deprecated by 2030, disallowed by 2035) applies to federal systems, but its effects radiate outward. Financial regulators, insurance underwriters, and institutional clients will incorporate these timelines into their risk assessments and due diligence questionnaires.

Prepare a quantum risk assessment for your custody infrastructure now, before regulators require it. Document which cryptographic primitives your systems use, which are quantum-vulnerable, and what your migration plan is. The PQC Migration Framework provides a structured methodology for this assessment, including sector-specific extensions for financial services.

Plan for PQC Signature Integration

Post-quantum signatures are 35-50x larger than ECDSA. Your transaction construction, fee estimation, UTXO management, and cold storage signing workflows will all need to accommodate larger witness data. Begin testing PQ signature handling on testnets (the BTQ Bitcoin Quantum testnet provides a live P2MR implementation). Evaluate hardware wallet vendor roadmaps for PQ signature support.

For Lightning-enabled exchanges: the Lightning migration roadmap requires hybrid transport encryption (deployable now), gossip protocol upgrades (significant bandwidth implications), and new funding transaction types (requires L1 soft fork). Map your Lightning infrastructure against this roadmap and prioritize the transport encryption upgrade.

For Protocol Developers

If you write code that will be deployed on a blockchain, you are building the infrastructure that must survive the quantum transition. Your decisions today determine whether the migration is orderly or chaotic.

Prioritize Transport Layer Upgrades

Hybrid ML-KEM key exchange for peer-to-peer connections can be deployed now, on any blockchain, without consensus changes. This halts the HNDL threat to metadata. For Bitcoin/Lightning developers: upgrade BOLT 8 Noise transport to hybrid HKDF(classical_ecdh_secret || ml_kem_secret). For Ethereum client developers: upgrade devp2p transport. For any chain: the transport layer is the one place where you can ship PQ protection without waiting for anyone else.

Build Crypto-Agility Into Everything

Design systems that can change their cryptographic primitives without rewriting the application layer. The NIST standardized algorithms will evolve. FN-DSA is not yet FIPS-finalized. Lattice-based assumptions may face new scrutiny. Hash-based signatures provide a conservative fallback. Your systems should be able to swap algorithms without protocol-breaking changes.

For Bitcoin developers: BIP-360’s P2MR design embodies crypto-agility by committing to a Merkle root of scripts rather than a specific key type. Different leaves can use different algorithms. Follow this pattern.

For Ethereum developers: EIP-8141 provides signature agility at the account level. Support it. When building smart contracts that perform cryptographic verification, design for algorithm upgradability.

Use Post-Quantum Cryptography for New Systems

If you are building a new protocol, token, DeFi application, or blockchain in 2026, there is no justification for building on quantum-vulnerable cryptography. ML-KEM (FIPS 203) is standardized for key exchange. ML-DSA (FIPS 204) is standardized for signatures. SLH-DSA (FIPS 205) is standardized as a conservative alternative. Multiple blockchains have deployed PQ signatures in production. The migration headache is for legacy systems. Do not create new ones.

Algorithm Selection Quick Reference

Use Case Recommended Why
Key exchange / transport ML-KEM-768 FIPS-finalized, fast, well-studied
General-purpose signing ML-DSA-65 FIPS-finalized, deterministic, fast verification
Size-constrained signing FN-DSA-512 (when FIPS-final) ~3x smaller than ML-DSA-44
Conservative backup SLH-DSA-SHA2-128s Hash-based, no lattice assumptions
Hybrid during transition Classical + ML-DSA (AND mode) Secure if either primitive is independently broken

Detailed algorithm tradeoffs for Bitcoin-specific and Lightning-specific use cases are covered in the Bitcoin and Lightning technical roadmap articles.

For Institutional Investors and Fund Managers

Your quantum risk is not primarily technical. It is regulatory, fiduciary, and reputational.

Assess Portfolio Quantum Exposure

Not all crypto holdings carry the same quantum risk. A framework for evaluation:

Lowest current risk: Bitcoin in non-reused bc1q addresses with no public key exposure. Stablecoins on post-quantum chains (e.g., USDC on Algorand). Holdings on post-quantum native chains (QRL, Abelian).

Moderate risk: Bitcoin in Taproot (bc1p) addresses (public key exposed, but migration to bc1q is straightforward). Ethereum accounts that have transacted (public key permanently exposed, but migration path via EIP-8141 is under development). Holdings on chains with active PQ roadmaps (Solana, Zcash, XRP Ledger).

Highest risk: Bitcoin in P2PK addresses or heavily reused addresses (large at-rest exposure, no interim mitigation). Ethereum smart contract positions governed by exposed admin keys. Holdings on chains with no PQ plan and no governance mechanism to develop one.

Prepare for Custody Due Diligence

Institutional custody providers will face quantum risk questions from regulators, insurers, and clients. If you allocate to crypto through custodial products (ETFs, custody accounts, fund structures), ask your custodian:

What address types do you use for cold storage? Do you reuse addresses? What is your PQ migration plan? Have you tested PQ signature handling on testnets? What is your timeline for adopting quantum-safe address types when they become available?

If your custodian cannot answer these questions, that is a risk factor to weigh alongside performance metrics.

Factor Ecosystem Deadlines Into Investment Timelines

The relevant question is not “when will a quantum computer break my keys?” It is “what deadlines has the ecosystem set?” NIST deprecation of ECDSA by 2030 will reshape regulatory expectations. Google’s 2029 internal migration deadline reflects the assessment of the organization best positioned to build a CRQC. CNSA 2.0 mandates PQ networking by 2030. These external deadlines will affect insurance availability, regulatory compliance requirements, and institutional custody standards regardless of when (or whether) a CRQC actually arrives.

Investment positions with 5-10 year horizons should incorporate quantum migration risk as a factor. Chains with credible PQ roadmaps carry less regulatory and reputational risk than chains without them. The Citi quantum threat report provides an institutional framing for this analysis.

For Policymakers and Regulators

The cryptocurrency ecosystem’s quantum vulnerability intersects with regulatory mandates, financial stability concerns, and national security considerations.

The Dormant Asset Question Requires Policy Engagement

Approximately 2.3 million BTC sits in addresses that are both quantum-vulnerable and dormant (no activity in five years or more). These assets cannot be migrated because the private keys are presumed lost. They will eventually become accessible to the first entity with a CRQC. Whether that entity operates within the regulated financial system or outside it is a policy question, not a technical one.

The Google paper proposes a digital salvage framework analogous to maritime salvage law, treating CRQC-based recovery of dormant assets as a regulated activity. Robinson’s PACTs proposal offers a mechanism for dormant holders to prove key control without moving coins. Both proposals merit policy analysis. The alternative, allowing tens of billions of dollars in assets to be seized by unregulated actors, is worse than any of the proposed solutions.

Tokenized Assets Need PQC Requirements

With real-world asset tokenization projected to exceed $16 trillion by 2030, the quantum vulnerability of hosting blockchains becomes a systemic financial stability concern. Regulators overseeing tokenized securities, stablecoins, and digital asset custody should consider requiring PQC migration plans as a condition of approval, similar to how NSM-10 requires federal agencies to submit PQC transition plans.

Engage the Bitcoin Community, But Do Not Wait for It

Bitcoin’s governance coordination challenge means the community may not resolve the PQC migration question on a timeline that satisfies regulatory or national security requirements. Policymakers should engage constructively, recognizing Bitcoin’s governance norms, while developing contingency frameworks (digital salvage, custody requirements, disclosure mandates) that address the offchain consequences of potential governance failure.

Quantum Upside & Quantum Risk - Handled

My company - Applied Quantum - helps governments, enterprises, and investors prepare for both the upside and the risk of quantum technologies. We deliver concise board and investor briefings; demystify quantum computing, sensing, and communications; craft national and corporate strategies to capture advantage; and turn plans into delivery. We help you mitigate the quantum risk by executing crypto‑inventory, crypto‑agility implementation, PQC migration, and broader defenses against the quantum threat. We run vendor due diligence, proof‑of‑value pilots, standards and policy alignment, workforce training, and procurement support, then oversee implementation across your organization. Contact me if you want help.

Talk to me Contact Applied Quantum

Marin Ivezic

I am the Founder of Applied Quantum (AppliedQuantum.com), a research-driven consulting firm empowering organizations to seize quantum opportunities and proactively defend against quantum threats. A former quantum entrepreneur, I’ve previously served as a Fortune Global 500 CISO, CTO, Big 4 partner, and leader at Accenture and IBM. Throughout my career, I’ve specialized in managing emerging tech risks, building and leading innovation labs focused on quantum security, AI security, and cyber-kinetic risks for global corporations, governments, and defense agencies. I regularly share insights on quantum technologies and emerging-tech cybersecurity at PostQuantum.com.