Still, the authors caution against complacency.

“We have high confidence that a large-scale, fault-tolerant quantum computer will eventually be built,” the report states, adding that the timeline is uncertain but “clearly on the horizon.”

That uncertainty is exactly the problem, with estimates ranging from “a few years to a decade or more” and no reliable way to predict breakthroughs.

The urgency is reflected in guidance from the U.S. National Institute of Standards and Technology (NIST), which recommends migrating to quantum-resistant cryptography by 2035, a timeline the report suggests may even prove optimistic.

“Waiting for it to be urgent is not a good idea,” the Coinbase paper says, emphasizing that transitions across blockchains, wallets and exchanges could take years to execute safely.

Some assets may be more vulnerable than others. For example, Bitcoin wallets that have already revealed their public keys could be targeted, while those still protected behind hash functions may be safer in the short term.

The good news: Quantum-resistant cryptography (PQC) already exists and is being standardized by NIST.

The bad news: It’s not an easy swap.

Post-quantum digital signatures can be tens to hundreds of times larger than current ones, which could dramatically increase blockchain data costs and reduce throughput. One estimate in the report suggests that replacing today’s signatures with quantum-proof alternatives could expand block sizes by up to 38 times.

There are also usability challenges, from migrating millions of wallets to deciding what to do with “lost” or inactive funds that never upgrade.

Rather than a single solution, the report outlines multiple transition strategies, including hybrid systems that combine existing cryptography with post-quantum updates or allow a gradual switch when needed.

For now, the authors recommend flexible approaches that avoid sacrificing current security or performance while enabling a rapid upgrade later.

“The time to begin preparing for it is now,” the report concludes.

Read more: Solana’s quantum-threat readiness reveals harsh tradeoff: security vs speed

More For You

hacker

More than $500 million was siphoned across the Drift and Kelp exploits in just over two weeks. What once looked like isolated breaches now resembles a sustained campaign, likely driven by the financial needs of a sanctioned state.

What to know:

  • The Kelp exploit shows North Korea’s Lazarus Group is evolving beyond isolated hacks, rapidly shifting tactics from social engineering to exploiting structural weaknesses in crypto infrastructure, suggesting a sustained, state-driven campaign rather than one-off incidents.
  • The attack did not break cryptography but exploited known design choices and weak configurations, exposing…

About the Author

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Stories