There is no way to rotate it without abandoning the account entirely. Google estimates the top 1,000 Ethereum wallets by balance, holding roughly 20.5 million ETH, are exposed.

A quantum computer cracking one key every nine minutes could work through all 1,000 in under nine days.

The master keys to DeFi

Many smart contracts on Ethereum, the self-executing programs that power lending, trading and stablecoin issuance, give special privileges to a handful of administrator accounts. These admins can pause the contract, upgrade its code, or move funds.

Google found at least 70 major contracts with admin keys exposed on-chain, holding about 2.5 million ETH. But the bigger risk is what those keys control beyond ETH.

Admin accounts also govern minting authority for stablecoins like USDT and USDC, meaning a quantum attacker who cracks one could print unlimited tokens. The paper estimates roughly $200 billion in stablecoins and tokenized assets on Ethereum depend on these vulnerable admin keys.

Forging even one could trigger a chain reaction across every lending market that accepts those tokens as collateral.

(CoinDesk)

Layer 2s built on vulnerable math

Ethereum processes the bulk of its transactions through Layer 2 networks, separate systems like Arbitrum and Optimism that handle activity off the main chain and report back.

These L2s rely on Ethereum’s built-in cryptographic tools, none of which are quantum-resistant. The paper estimates at least 15 million ETH across major L2s and cross-chain bridges is exposed.

Only StarkNet, which uses a different type of math based on hash functions rather than elliptic curves, is considered safe.

Attacking the staking system

Ethereum secures itself through proof-of-stake, where validators (network participants who lock up ETH as collateral) vote on which transactions are valid. Those votes are authenticated using a digital signature scheme the paper considers vulnerable to quantum computers.

Roughly 37 million ETH is staked. If an attacker compromises one-third of validators, the network can no longer finalize transactions. Two-thirds gives the attacker the ability to rewrite the chain’s history.

The paper notes that if staking is concentrated in large pools, such as Lido at roughly 20%, targeting a single provider’s infrastructure could dramatically shorten the attack timeline.

The exploit you only need to run once

This is the vector with no precedent. Ethereum uses a system called Data Availability Sampling to verify that transaction data posted by L2 networks actually exists. That system depends on a one-time setup ceremony that generated a secret number, which was supposed to be destroyed afterward.

A quantum computer could recover that secret from publicly available data. Once recovered, it becomes a permanent tool, a piece of normal software, that can forge data verification proofs forever without needing quantum access again.

Google describes this exploit as “potentially tradable.” Every L2 that depends on Ethereum’s blob data system would be affected.

Ethereum’s head start and its limits

Drake, one of the paper’s co-authors, sits inside the Ethereum Foundation. The Foundation launched a post-quantum research portal last week backed by eight years of work, with test networks are shipping weekly and a multi-fork upgrade roadmap targets quantum-resistant cryptography by 2029.

Ethereum’s 12-second block times also make real-time transaction theft far harder than on bitcoin, where blocks take 10 minutes.

But the paper is clear that upgrading Ethereum’s base layer does not automatically fix the thousands of smart contracts already deployed on it. Each protocol, bridge and L2 would need to independently upgrade its own code and rotate its own keys. No single entity controls that process.

More For You

16x9 Image Stablecoin Landscape Series

As stablecoins evolve into core financial infrastructure, North America leads. This report maps the regulation, market shifts, and players driving adoption.

Why it matters:

Stablecoins are entering their third phase of evolution – the institutionalization era – becoming increasingly embedded into core financial infrastructure. As institutions prioritize transparency and compliance, regulated issuers like USDC, RLUSD, and PYUSD are steadily gaining share with RLUSD surpassing $1B in market cap within its first year. North America, leading in regulatory frameworks and institutional distribution, is at the center of it all.

More For You

Fingers on a keyboard

The crypto asset manager argued rising surveillance and AI could elevate demand for private digital money, positioning Zcash as a mispriced bet on confidentiality.

What to know:

  • Grayscale said AI and onchain transparency could push privacy from niche to core financial feature.
  • Zcash adoption metrics show real usage, even though its market share remains very small.
  • The report framed ZEC as a high-risk asset with significant upside if privacy demand reprices.

About the Author

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Stories