
Nodle bids farewell to Polkadot
The final steps of the migration to ZKsync

Announcing the Creation of the Nodle DAO: A New Era of Inclusive Decentralized Governance
The Nodle Foundation is excited to announce the launch of the Nodle DAO (Decentralized Autonomous Organization), marking a major step toward decentralizing the Nodle Network and placing its future directly in the hands of its community. The creation of the Nodle DAO introduces a structured framework of Nodle Governance Proposals (NGPs), that anyone with a smartphone can vote on. These proposals will allow the community to have a say in the network’s development, ensuring that its direction re...

Nodle. Click. Agents.
Why decentralized messaging matters more than everIn today’s ever-shifting digital terrain, the struggle for uncensored, verifiable communication is at the heart of personal sovereignty. Nodle has been working on XMTP integration into their apps for months. In June, we released the public beta on iOS, allowing users to connect privately and without a middleman. This experience is now live on Android, enabling our global user base to benefit from private and encrypted chat. This launch of Nodl...
>800 subscribers

Nodle bids farewell to Polkadot
The final steps of the migration to ZKsync

Announcing the Creation of the Nodle DAO: A New Era of Inclusive Decentralized Governance
The Nodle Foundation is excited to announce the launch of the Nodle DAO (Decentralized Autonomous Organization), marking a major step toward decentralizing the Nodle Network and placing its future directly in the hands of its community. The creation of the Nodle DAO introduces a structured framework of Nodle Governance Proposals (NGPs), that anyone with a smartphone can vote on. These proposals will allow the community to have a say in the network’s development, ensuring that its direction re...

Nodle. Click. Agents.
Why decentralized messaging matters more than everIn today’s ever-shifting digital terrain, the struggle for uncensored, verifiable communication is at the heart of personal sovereignty. Nodle has been working on XMTP integration into their apps for months. In June, we released the public beta on iOS, allowing users to connect privately and without a middleman. This experience is now live on Android, enabling our global user base to benefit from private and encrypted chat. This launch of Nodl...
Share Dialog
Share Dialog


Crypto 101 is an educational series designed to make complex blockchain and decentralized infrastructure ideas feel approachable. Each edition takes one topic, breaks it down from first principles, and then shows how it comes to life in the Nodle ecosystem.
Every blockchain you use today - Bitcoin, Ethereum, Solana, Nodle, all of them - locks the door with the same type of math: elliptic‑curve cryptography (ECC). Your private key is a huge random number; your public key is a point on a mathematical curve derived from that number. The relationship between the two is easy to compute in one direction and, for a classical computer, essentially impossible to reverse. That one‑way property is what stops the entire world from spending your tokens.
Quantum computers threaten to flip that one‑way door into a revolving one. An algorithm called Shor's algorithm, designed in the 1990s, can solve the underlying math problem in polynomial time once a quantum machine has enough stable qubits. No one has that machine today, but the trajectory is clear: Google's 105‑qubit Willow chip, unveiled in December 2024, is the latest in an accelerating series of milestones. Chainalysis estimates that a cryptographically relevant quantum computer could appear within 10–15 years. Other researchers argue the window may be even shorter.
The good news: the cryptography community is not standing still. NIST - the U.S. National Institute of Standards and Technology - finalized its first three post‑quantum cryptographic standards in August 2024 and has declared they "can and should be put into use now". Ethereum's Vitalik Buterin published a detailed quantum‑resistance roadmap in February 2026, targeting four vulnerable pillars of the network. And the broader blockchain ecosystem is exploring hybrid signatures, account abstraction, and hash‑centric proof systems to buy time and build resilience.
This edition walks through everything you need to know - what's at risk, how the defences work, the real‑world tradeoffs, and what the migration path looks like.
Before we talk about what breaks, we need to understand what holds everything together. Blockchains rely on two big families of cryptographic primitives, each solving different problems.
When you create a wallet, you generate a private key and derive a public key from it using elliptic‑curve math - specifically, a curve called secp256k1 on Bitcoin and Ethereum. Your address is typically a hash of your public key. Every time you send a transaction, you produce a digital signature (using ECDSA or a related scheme) that proves you hold the private key without ever revealing it.
Proof‑of‑stake networks add another layer: validators sign blocks using BLS signatures, another elliptic‑curve scheme that allows many signatures to be aggregated into one compact proof. Ethereum also uses KZG commitments - a pairing‑based elliptic‑curve construction - for data‑availability sampling in its rollup architecture. In short, ECC is the identity and authentication backbone of virtually every chain.
Hash functions like SHA‑256 and Keccak‑256 produce fixed‑size "fingerprints" of arbitrary data. Blockchains use them everywhere: linking blocks together, building Merkle trees for efficient data verification, generating addresses from public keys, and anchoring proof‑of‑work targets. While ECC answers the question who authorized this?, hashes answer what exactly was agreed on? - they guarantee integrity and immutability.

Not all cryptography is equally vulnerable. The quantum threat comes in two very different flavours.
Shor's algorithm can efficiently solve the Elliptic Curve Discrete Logarithm Problem (ECDLP), the mathematical hardness assumption behind ECDSA, BLS, KZG, and related schemes. Given a public key, a sufficiently large quantum computer could derive the private key. That means:
Wallet theft: any address whose public key has been exposed on‑chain (through spending transactions or certain address formats) is at risk.
Validator impersonation: BLS private keys could be recovered, compromising consensus.
Data‑availability forgery: KZG commitments could be faked, undermining rollup security.
The danger is not limited to future attacks. Under a strategy called "harvest now, decrypt later" (HNDL), adversaries capture encrypted data and public‑key material today, intending to decrypt it once quantum hardware matures. For long‑lived data - content credentials, device reputations, trade secrets - this makes the threat immediate in practical terms, even though the decryption capability lies years away.
Grover's algorithm provides a quadratic speed‑up for brute‑force search. In practice, this halves the effective security level of symmetric ciphers and hash functions: a 128‑bit key behaves like ~64 bits against a quantum attacker, and a 256‑bit key behaves like ~128 bits. Since 128 bits of security is still considered very strong, the fix is straightforward: use 256‑bit keys and hash outputs. Blockchains that already use SHA‑256 or Keccak‑256 with 256‑bit outputs are in reasonable shape on the hashing side.
The takeaway: quantum computers are a crisis for public‑key cryptography and a headache for symmetric/hash cryptography - but only the first one requires a fundamental redesign.
The world is not starting from zero. After an eight‑year evaluation process, NIST published three finalized post‑quantum cryptographic (PQC) standards in August 2024:
Standard | Algorithm | Type | Primary use |
|---|---|---|---|
FIPS 203 | ML‑KEM (CRYSTALS‑Kyber) | Lattice‑based | Key encapsulation (encryption) |
FIPS 204 | ML‑DSA (CRYSTALS‑Dilithium) | Lattice‑based | Digital signatures |
FIPS 205 | SLH‑DSA (SPHINCS+) | Hash‑based | Digital signatures (backup) |
A fourth algorithm, FN‑DSA (Falcon), has been selected for future standardization and is awaiting its own FIPS publication. Two of the three published standards were developed by IBM researchers in collaboration with academic partners.
These rely on hard problems in high‑dimensional mathematical lattices — specifically, variants of the Learning With Errors (LWE) problem. No known classical or quantum algorithm can solve LWE efficiently. Lattice schemes offer a strong balance of performance and security:
ML‑DSA is the "all‑rounder": relatively compact signatures (~2.4 KB at the lowest security level), fast signing and verification, and straightforward implementation. It is expected to become the default PQ signature for most applications.
FN‑DSA (Falcon) achieves even smaller signatures (~666 bytes) but has a more complex signing process that makes it harder to implement securely.
ML‑KEM handles encrypted key exchange with compact ciphertexts and fast operations.
SLH‑DSA relies almost entirely on the security of hash functions. Its signatures are built from Merkle trees and one‑time signature constructions - no new mathematical assumptions required. This makes it extremely conservative: if SHA‑256 is safe, SLH‑DSA is safe. The price is much larger signatures (7–29 KB depending on parameter choice) and slower operations. NIST designated it as a backup in case lattice‑based assumptions are ever broken.
Code‑based schemes (like Classic McEliece) and multivariate polynomial schemes offer additional options, especially for encryption. They have long research histories but tend to come with very large public keys, limiting their practicality for blockchain use.

The single biggest engineering challenge in migrating blockchains to PQC is signature and key bloat. Every transaction, every block header, every validator attestation carries signatures that must be stored, transmitted, and verified by every node.
An ECDSA signature is 64 bytes. An ML‑DSA‑44 signature is 2,420 bytes — roughly 38× larger. Falcon‑512 is more compact at ~666 bytes (still 10× larger), while SPHINCS+‑128f balloons to 17,088 bytes — 267× the size of ECDSA. Public keys grow proportionally.
For a network like Ethereum, which processes thousands of transactions per block and aggregates thousands of validator attestations per slot, this is not a trivial upgrade. Research on hybrid PQ signatures for the EVM estimates that quantum‑resistant accounts could require 59× more storage than classical ones. Solana, Avalanche, and other high‑throughput chains face similar or worse pressure because their block‑production rates are even higher.
This is why the choice of algorithm matters enormously. ML‑DSA offers a reasonable middle ground for most use cases, Falcon suits bandwidth‑constrained environments willing to accept implementation complexity, and SLH‑DSA serves as the conservative fallback when absolute confidence in the underlying math is paramount.
Ethereum provides the most detailed public case study of a major blockchain planning for quantum resistance. In February 2026, Vitalik Buterin published a comprehensive roadmap identifying four cryptographic pillars that need to be upgraded:
Consensus‑layer BLS signatures - used by ~1 million validators to attest to blocks.
KZG data‑availability commitments - used by rollups to prove data was published.
ECDSA account signatures - used by every externally owned account (EOA) to authorize transactions.
Zero‑knowledge proofs (Groth16, etc.) - used by application‑layer ZK rollups and privacy protocols.
All four depend on elliptic‑curve math and are therefore vulnerable to Shor's algorithm.
The Ethereum Foundation formed a Post‑Quantum Security team in January 2026. The planned ETH2030 upgrade introduces six quantum‑resistant signature schemes, 13 new EVM precompiles, and recursive STARK aggregation to replace KZG commitments with hash‑based proofs. A devnet test ran in February 2026, with full activation scheduled for a future hard fork.
The Strawmap - Ethereum's experimental four‑year Layer 1 upgrade plan - schedules roughly seven forks over the period, with the Glamsterdam and Hegotá forks confirmed for 2026. Quantum‑resistant components could ship within the plan's first two upgrades.
One of the most consequential moves is replacing KZG commitments with STARK‑style proofs. KZG is elegant - it commits to a polynomial with a tiny constant‑size proof - but it relies on elliptic‑curve pairings and a trusted setup, both of which are quantum‑fragile. STARKs build commitments from collision‑resistant hash functions and Merkle trees, deriving verifier challenges by hashing the transcript (Fiat‑Shamir). They are "transparent" (no trusted setup) and quantum‑robust by design. The tradeoff is larger proof sizes and more complex engineering, but recursive STARK aggregation can compress many proofs into a single on‑chain object.
Ethereum's first Post‑Quantum Transaction Signature (PQTS) breakout session reached a clear conclusion: account abstraction (AA) is the architectural foundation for the post‑quantum transition. Native AA decouples account identity from any specific signature algorithm, meaning wallet verification logic can be upgraded to PQ schemes without requiring users to abandon their addresses or balances.
EIP‑7702 allows EOAs to delegate execution logic to smart contracts, enabling custom signature logic while preserving user identity. However, researchers note that EIP‑7702 still "enshrines ECDSA" at the transaction‑signing layer, so the ultimate goal is native AA via EIP‑7701/RIP‑7560, which removes any hard dependency on ECDSA entirely.

Upgrading a live, decentralized network from ECDSA to post‑quantum signatures is one of the hardest coordination problems in crypto. The community has converged on a phased approach.
The safest first step is requiring both an ECDSA signature and a PQ signature on each transaction. This hybrid approach offers three benefits:
Backward compatibility: existing ECDSA infrastructure keeps working.
Forward security: quantum resistance kicks in immediately for new transactions.
Graceful degradation: if one algorithm is broken, the other still holds.
A concrete proposal for Ethereum introduces a new transaction type "Q" (0x51) that bundles deterministic CRYSTALS‑Dilithium Level 2 alongside the current ECDSA signature. After finality is reached, only the hash of both signatures is stored, reclaiming most of the extra space.
Through account abstraction, wallets can advertise which signature schemes they support - ECDSA, ML‑DSA, FN‑DSA, or future algorithms - and the protocol validates accordingly. This is "algorithm agility": the ability to swap cryptographic primitives without changing the user's address or the protocol's core transaction format.
Once the network and ecosystem have migrated, the classical ECDSA pathway can be deprecated and eventually removed. At this point, signatures, key exchanges, commitments, and proofs are all quantum‑resistant. Bitcoin researchers estimate this full cycle could take approximately seven years due to the consensus and testing required across a global decentralized network.
Some networks are already integrating quantum‑aware building blocks without waiting for a hard fork. Nodle, the smartphone‑powered DePIN, launched in‑app decentralized messaging via XMTP in mid‑2025. In July 2025, XMTP declared itself a fully quantum‑resistant decentralized messaging protocol, making it one of the first in the Web3 space to reach that milestone.
XMTP's approach is instructive. Rather than replacing all cryptography everywhere (which would bloat every message), the team identified the single chokepoint where public‑key material is exchanged: MLS Key Packages used in Welcome messages that add members to encrypted groups. By swapping the key‑encapsulation step in Welcomes with a hybrid quantum‑resistant KEM (XWING), XMTP protects the session‑key handshake against harvest‑now‑decrypt‑later attacks. The change adds only ~1.5 KB per Key Package, while high‑volume application messages and group commits remain completely unaffected.
For Nodle, this means that the decentralized chat layer inside the Nodle app already benefits from post‑quantum forward secrecy. Content credentials, proofs of connectivity, and device‑reputation data that flow through the network gain an additional layer of long‑term resilience. This kind of targeted, efficient approach - protect the most vulnerable handshake first, then extend quantum resistance outward - is a model other DePIN and blockchain projects can learn from.
ML‑DSA (Dilithium) | FN‑DSA (Falcon) | SLH‑DSA (SPHINCS+) | ECDSA (today) | |
|---|---|---|---|---|
Math basis | Lattice (Module‑LWE) | Lattice (NTRU) | Hash functions | Elliptic curves |
Sig size | 2,420–4,627 B | ~666–1,280 B | 7,856–29,792 B | 64 B |
Pub key | 1,312–2,592 B | 897–1,793 B | 32–64 B | 33 B |
Signing speed | Fast | Moderate (complex) | Slow | Fast |
Verify speed |
The cost of inaction is not theoretical. Even before a cryptographically relevant quantum computer exists, the HNDL threat means that long‑lived secrets exposed today can be retroactively compromised. For blockchains, this includes:
Early Bitcoin UTXOs: addresses that exposed raw public keys (Pay‑to‑Public‑Key format) collectively hold hundreds of billions of dollars in BTC.
Smart‑contract state: any on‑chain data tied to ECDSA‑authenticated ownership can be re‑attributed if the keys are cracked.
Content provenance: cryptographic signatures that attest "this photo is authentic" or "this sensor reading is genuine" become worthless if the signing key can be forged after the fact.
Governments are not waiting. The U.S. Department of Homeland Security has mandated inventories of cryptographic systems and sensitive datasets. The European Union's ANSSI recommends hybrid approaches for the transition period. NIST has explicitly stated that its new PQC standards "can and should be put into use now".
Quantum computers are still early, but their impact on cryptography will be anything but subtle. The chains, wallets, and apps that start planning now will be the ones that can upgrade smoothly instead of scrambling during a crisis. For most builders, that does not mean rewriting everything from scratch; it means choosing primitives that can be swapped out, embracing account abstraction, and experimenting with hybrid post‑quantum signatures before they are strictly needed.
The deeper lesson is simple: cryptography is not a one‑time choice, it is a living part of your protocol. Just as the industry moved from weak hashes to SHA‑256 and from ad‑hoc crypto to audited libraries, the move to post‑quantum standards will be another turn of that same wheel. If we do it right, most users will barely notice anything has changed — their wallets will keep working, their proofs will keep verifying, and their assets and data will stay safe in a world where “impossible to break” keeps getting redefined.
The networks that move early — like XMTP's targeted quantum‑resistant key exchange, or Ethereum's Strawmap timeline — will be the ones that earn long‑term trust from users, enterprises, and regulators alike.
Disclaimer: This article is for educational purposes only and does not constitute financial advice. Always do your own research before making any financial decisions.
Account abstraction (AA)
A design where an account can choose its own rules for how transactions are authorized, instead of being hard‑wired to one signature algorithm like ECDSA.
AES‑128 / AES‑256
Two common encryption key sizes where 256‑bit keys are harder to brute‑force than 128‑bit keys, especially important in a future with quantum computers.
BLS signatures
A type of digital signature used by some proof‑of‑stake chains that lets many validator signatures be combined into one compact proof.
Data availability
The guarantee that the raw data behind a block or rollup is actually published and retrievable so anyone can verify it independently.
ECDSA
The most widely used elliptic‑curve signature scheme on blockchains like Bitcoin and Ethereum, used to prove that a wallet owner approved a transaction.
Elliptic‑curve cryptography (ECC)
A family of cryptography that uses points on special mathematical curves to create public and private keys that are easy to compute in one direction but hard to reverse.
Grover’s algorithm
A quantum algorithm that can speed up brute‑force search and effectively halves the security level of symmetric keys and hashes, but does not completely break them.
Hash function
A one‑way function that turns any input into a fixed‑size “fingerprint,” used to link blocks together, build Merkle trees, and check that data hasn’t changed.
Crypto 101 is an educational series designed to make complex blockchain and decentralized infrastructure ideas feel approachable. Each edition takes one topic, breaks it down from first principles, and then shows how it comes to life in the Nodle ecosystem.
Every blockchain you use today - Bitcoin, Ethereum, Solana, Nodle, all of them - locks the door with the same type of math: elliptic‑curve cryptography (ECC). Your private key is a huge random number; your public key is a point on a mathematical curve derived from that number. The relationship between the two is easy to compute in one direction and, for a classical computer, essentially impossible to reverse. That one‑way property is what stops the entire world from spending your tokens.
Quantum computers threaten to flip that one‑way door into a revolving one. An algorithm called Shor's algorithm, designed in the 1990s, can solve the underlying math problem in polynomial time once a quantum machine has enough stable qubits. No one has that machine today, but the trajectory is clear: Google's 105‑qubit Willow chip, unveiled in December 2024, is the latest in an accelerating series of milestones. Chainalysis estimates that a cryptographically relevant quantum computer could appear within 10–15 years. Other researchers argue the window may be even shorter.
The good news: the cryptography community is not standing still. NIST - the U.S. National Institute of Standards and Technology - finalized its first three post‑quantum cryptographic standards in August 2024 and has declared they "can and should be put into use now". Ethereum's Vitalik Buterin published a detailed quantum‑resistance roadmap in February 2026, targeting four vulnerable pillars of the network. And the broader blockchain ecosystem is exploring hybrid signatures, account abstraction, and hash‑centric proof systems to buy time and build resilience.
This edition walks through everything you need to know - what's at risk, how the defences work, the real‑world tradeoffs, and what the migration path looks like.
Before we talk about what breaks, we need to understand what holds everything together. Blockchains rely on two big families of cryptographic primitives, each solving different problems.
When you create a wallet, you generate a private key and derive a public key from it using elliptic‑curve math - specifically, a curve called secp256k1 on Bitcoin and Ethereum. Your address is typically a hash of your public key. Every time you send a transaction, you produce a digital signature (using ECDSA or a related scheme) that proves you hold the private key without ever revealing it.
Proof‑of‑stake networks add another layer: validators sign blocks using BLS signatures, another elliptic‑curve scheme that allows many signatures to be aggregated into one compact proof. Ethereum also uses KZG commitments - a pairing‑based elliptic‑curve construction - for data‑availability sampling in its rollup architecture. In short, ECC is the identity and authentication backbone of virtually every chain.
Hash functions like SHA‑256 and Keccak‑256 produce fixed‑size "fingerprints" of arbitrary data. Blockchains use them everywhere: linking blocks together, building Merkle trees for efficient data verification, generating addresses from public keys, and anchoring proof‑of‑work targets. While ECC answers the question who authorized this?, hashes answer what exactly was agreed on? - they guarantee integrity and immutability.

Not all cryptography is equally vulnerable. The quantum threat comes in two very different flavours.
Shor's algorithm can efficiently solve the Elliptic Curve Discrete Logarithm Problem (ECDLP), the mathematical hardness assumption behind ECDSA, BLS, KZG, and related schemes. Given a public key, a sufficiently large quantum computer could derive the private key. That means:
Wallet theft: any address whose public key has been exposed on‑chain (through spending transactions or certain address formats) is at risk.
Validator impersonation: BLS private keys could be recovered, compromising consensus.
Data‑availability forgery: KZG commitments could be faked, undermining rollup security.
The danger is not limited to future attacks. Under a strategy called "harvest now, decrypt later" (HNDL), adversaries capture encrypted data and public‑key material today, intending to decrypt it once quantum hardware matures. For long‑lived data - content credentials, device reputations, trade secrets - this makes the threat immediate in practical terms, even though the decryption capability lies years away.
Grover's algorithm provides a quadratic speed‑up for brute‑force search. In practice, this halves the effective security level of symmetric ciphers and hash functions: a 128‑bit key behaves like ~64 bits against a quantum attacker, and a 256‑bit key behaves like ~128 bits. Since 128 bits of security is still considered very strong, the fix is straightforward: use 256‑bit keys and hash outputs. Blockchains that already use SHA‑256 or Keccak‑256 with 256‑bit outputs are in reasonable shape on the hashing side.
The takeaway: quantum computers are a crisis for public‑key cryptography and a headache for symmetric/hash cryptography - but only the first one requires a fundamental redesign.
The world is not starting from zero. After an eight‑year evaluation process, NIST published three finalized post‑quantum cryptographic (PQC) standards in August 2024:
Standard | Algorithm | Type | Primary use |
|---|---|---|---|
FIPS 203 | ML‑KEM (CRYSTALS‑Kyber) | Lattice‑based | Key encapsulation (encryption) |
FIPS 204 | ML‑DSA (CRYSTALS‑Dilithium) | Lattice‑based | Digital signatures |
FIPS 205 | SLH‑DSA (SPHINCS+) | Hash‑based | Digital signatures (backup) |
A fourth algorithm, FN‑DSA (Falcon), has been selected for future standardization and is awaiting its own FIPS publication. Two of the three published standards were developed by IBM researchers in collaboration with academic partners.
These rely on hard problems in high‑dimensional mathematical lattices — specifically, variants of the Learning With Errors (LWE) problem. No known classical or quantum algorithm can solve LWE efficiently. Lattice schemes offer a strong balance of performance and security:
ML‑DSA is the "all‑rounder": relatively compact signatures (~2.4 KB at the lowest security level), fast signing and verification, and straightforward implementation. It is expected to become the default PQ signature for most applications.
FN‑DSA (Falcon) achieves even smaller signatures (~666 bytes) but has a more complex signing process that makes it harder to implement securely.
ML‑KEM handles encrypted key exchange with compact ciphertexts and fast operations.
SLH‑DSA relies almost entirely on the security of hash functions. Its signatures are built from Merkle trees and one‑time signature constructions - no new mathematical assumptions required. This makes it extremely conservative: if SHA‑256 is safe, SLH‑DSA is safe. The price is much larger signatures (7–29 KB depending on parameter choice) and slower operations. NIST designated it as a backup in case lattice‑based assumptions are ever broken.
Code‑based schemes (like Classic McEliece) and multivariate polynomial schemes offer additional options, especially for encryption. They have long research histories but tend to come with very large public keys, limiting their practicality for blockchain use.

The single biggest engineering challenge in migrating blockchains to PQC is signature and key bloat. Every transaction, every block header, every validator attestation carries signatures that must be stored, transmitted, and verified by every node.
An ECDSA signature is 64 bytes. An ML‑DSA‑44 signature is 2,420 bytes — roughly 38× larger. Falcon‑512 is more compact at ~666 bytes (still 10× larger), while SPHINCS+‑128f balloons to 17,088 bytes — 267× the size of ECDSA. Public keys grow proportionally.
For a network like Ethereum, which processes thousands of transactions per block and aggregates thousands of validator attestations per slot, this is not a trivial upgrade. Research on hybrid PQ signatures for the EVM estimates that quantum‑resistant accounts could require 59× more storage than classical ones. Solana, Avalanche, and other high‑throughput chains face similar or worse pressure because their block‑production rates are even higher.
This is why the choice of algorithm matters enormously. ML‑DSA offers a reasonable middle ground for most use cases, Falcon suits bandwidth‑constrained environments willing to accept implementation complexity, and SLH‑DSA serves as the conservative fallback when absolute confidence in the underlying math is paramount.
Ethereum provides the most detailed public case study of a major blockchain planning for quantum resistance. In February 2026, Vitalik Buterin published a comprehensive roadmap identifying four cryptographic pillars that need to be upgraded:
Consensus‑layer BLS signatures - used by ~1 million validators to attest to blocks.
KZG data‑availability commitments - used by rollups to prove data was published.
ECDSA account signatures - used by every externally owned account (EOA) to authorize transactions.
Zero‑knowledge proofs (Groth16, etc.) - used by application‑layer ZK rollups and privacy protocols.
All four depend on elliptic‑curve math and are therefore vulnerable to Shor's algorithm.
The Ethereum Foundation formed a Post‑Quantum Security team in January 2026. The planned ETH2030 upgrade introduces six quantum‑resistant signature schemes, 13 new EVM precompiles, and recursive STARK aggregation to replace KZG commitments with hash‑based proofs. A devnet test ran in February 2026, with full activation scheduled for a future hard fork.
The Strawmap - Ethereum's experimental four‑year Layer 1 upgrade plan - schedules roughly seven forks over the period, with the Glamsterdam and Hegotá forks confirmed for 2026. Quantum‑resistant components could ship within the plan's first two upgrades.
One of the most consequential moves is replacing KZG commitments with STARK‑style proofs. KZG is elegant - it commits to a polynomial with a tiny constant‑size proof - but it relies on elliptic‑curve pairings and a trusted setup, both of which are quantum‑fragile. STARKs build commitments from collision‑resistant hash functions and Merkle trees, deriving verifier challenges by hashing the transcript (Fiat‑Shamir). They are "transparent" (no trusted setup) and quantum‑robust by design. The tradeoff is larger proof sizes and more complex engineering, but recursive STARK aggregation can compress many proofs into a single on‑chain object.
Ethereum's first Post‑Quantum Transaction Signature (PQTS) breakout session reached a clear conclusion: account abstraction (AA) is the architectural foundation for the post‑quantum transition. Native AA decouples account identity from any specific signature algorithm, meaning wallet verification logic can be upgraded to PQ schemes without requiring users to abandon their addresses or balances.
EIP‑7702 allows EOAs to delegate execution logic to smart contracts, enabling custom signature logic while preserving user identity. However, researchers note that EIP‑7702 still "enshrines ECDSA" at the transaction‑signing layer, so the ultimate goal is native AA via EIP‑7701/RIP‑7560, which removes any hard dependency on ECDSA entirely.

Upgrading a live, decentralized network from ECDSA to post‑quantum signatures is one of the hardest coordination problems in crypto. The community has converged on a phased approach.
The safest first step is requiring both an ECDSA signature and a PQ signature on each transaction. This hybrid approach offers three benefits:
Backward compatibility: existing ECDSA infrastructure keeps working.
Forward security: quantum resistance kicks in immediately for new transactions.
Graceful degradation: if one algorithm is broken, the other still holds.
A concrete proposal for Ethereum introduces a new transaction type "Q" (0x51) that bundles deterministic CRYSTALS‑Dilithium Level 2 alongside the current ECDSA signature. After finality is reached, only the hash of both signatures is stored, reclaiming most of the extra space.
Through account abstraction, wallets can advertise which signature schemes they support - ECDSA, ML‑DSA, FN‑DSA, or future algorithms - and the protocol validates accordingly. This is "algorithm agility": the ability to swap cryptographic primitives without changing the user's address or the protocol's core transaction format.
Once the network and ecosystem have migrated, the classical ECDSA pathway can be deprecated and eventually removed. At this point, signatures, key exchanges, commitments, and proofs are all quantum‑resistant. Bitcoin researchers estimate this full cycle could take approximately seven years due to the consensus and testing required across a global decentralized network.
Some networks are already integrating quantum‑aware building blocks without waiting for a hard fork. Nodle, the smartphone‑powered DePIN, launched in‑app decentralized messaging via XMTP in mid‑2025. In July 2025, XMTP declared itself a fully quantum‑resistant decentralized messaging protocol, making it one of the first in the Web3 space to reach that milestone.
XMTP's approach is instructive. Rather than replacing all cryptography everywhere (which would bloat every message), the team identified the single chokepoint where public‑key material is exchanged: MLS Key Packages used in Welcome messages that add members to encrypted groups. By swapping the key‑encapsulation step in Welcomes with a hybrid quantum‑resistant KEM (XWING), XMTP protects the session‑key handshake against harvest‑now‑decrypt‑later attacks. The change adds only ~1.5 KB per Key Package, while high‑volume application messages and group commits remain completely unaffected.
For Nodle, this means that the decentralized chat layer inside the Nodle app already benefits from post‑quantum forward secrecy. Content credentials, proofs of connectivity, and device‑reputation data that flow through the network gain an additional layer of long‑term resilience. This kind of targeted, efficient approach - protect the most vulnerable handshake first, then extend quantum resistance outward - is a model other DePIN and blockchain projects can learn from.
ML‑DSA (Dilithium) | FN‑DSA (Falcon) | SLH‑DSA (SPHINCS+) | ECDSA (today) | |
|---|---|---|---|---|
Math basis | Lattice (Module‑LWE) | Lattice (NTRU) | Hash functions | Elliptic curves |
Sig size | 2,420–4,627 B | ~666–1,280 B | 7,856–29,792 B | 64 B |
Pub key | 1,312–2,592 B | 897–1,793 B | 32–64 B | 33 B |
Signing speed | Fast | Moderate (complex) | Slow | Fast |
Verify speed |
The cost of inaction is not theoretical. Even before a cryptographically relevant quantum computer exists, the HNDL threat means that long‑lived secrets exposed today can be retroactively compromised. For blockchains, this includes:
Early Bitcoin UTXOs: addresses that exposed raw public keys (Pay‑to‑Public‑Key format) collectively hold hundreds of billions of dollars in BTC.
Smart‑contract state: any on‑chain data tied to ECDSA‑authenticated ownership can be re‑attributed if the keys are cracked.
Content provenance: cryptographic signatures that attest "this photo is authentic" or "this sensor reading is genuine" become worthless if the signing key can be forged after the fact.
Governments are not waiting. The U.S. Department of Homeland Security has mandated inventories of cryptographic systems and sensitive datasets. The European Union's ANSSI recommends hybrid approaches for the transition period. NIST has explicitly stated that its new PQC standards "can and should be put into use now".
Quantum computers are still early, but their impact on cryptography will be anything but subtle. The chains, wallets, and apps that start planning now will be the ones that can upgrade smoothly instead of scrambling during a crisis. For most builders, that does not mean rewriting everything from scratch; it means choosing primitives that can be swapped out, embracing account abstraction, and experimenting with hybrid post‑quantum signatures before they are strictly needed.
The deeper lesson is simple: cryptography is not a one‑time choice, it is a living part of your protocol. Just as the industry moved from weak hashes to SHA‑256 and from ad‑hoc crypto to audited libraries, the move to post‑quantum standards will be another turn of that same wheel. If we do it right, most users will barely notice anything has changed — their wallets will keep working, their proofs will keep verifying, and their assets and data will stay safe in a world where “impossible to break” keeps getting redefined.
The networks that move early — like XMTP's targeted quantum‑resistant key exchange, or Ethereum's Strawmap timeline — will be the ones that earn long‑term trust from users, enterprises, and regulators alike.
Disclaimer: This article is for educational purposes only and does not constitute financial advice. Always do your own research before making any financial decisions.
Account abstraction (AA)
A design where an account can choose its own rules for how transactions are authorized, instead of being hard‑wired to one signature algorithm like ECDSA.
AES‑128 / AES‑256
Two common encryption key sizes where 256‑bit keys are harder to brute‑force than 128‑bit keys, especially important in a future with quantum computers.
BLS signatures
A type of digital signature used by some proof‑of‑stake chains that lets many validator signatures be combined into one compact proof.
Data availability
The guarantee that the raw data behind a block or rollup is actually published and retrievable so anyone can verify it independently.
ECDSA
The most widely used elliptic‑curve signature scheme on blockchains like Bitcoin and Ethereum, used to prove that a wallet owner approved a transaction.
Elliptic‑curve cryptography (ECC)
A family of cryptography that uses points on special mathematical curves to create public and private keys that are easy to compute in one direction but hard to reverse.
Grover’s algorithm
A quantum algorithm that can speed up brute‑force search and effectively halves the security level of symmetric keys and hashes, but does not completely break them.
Hash function
A one‑way function that turns any input into a fixed‑size “fingerprint,” used to link blocks together, build Merkle trees, and check that data hasn’t changed.
Fast |
Very fast |
Moderate |
Fast |
Quantum safe? | Yes | Yes | Yes (conservative) | No |
NIST status | FIPS 204 (final) | Selected; FIPS 206 pending | FIPS 205 (final) | Legacy |
Hash‑based signatures (SPHINCS+/SLH‑DSA)
Signature schemes that get their security almost entirely from hash functions, making them very conservative but often much larger in size.
Hybrid signature
A setup where a transaction or message is signed with both a classical algorithm (like ECDSA) and a post‑quantum one, so it stays valid even if one is broken.
KZG commitments
A succinct proof system based on elliptic‑curve pairings that lets you commit to a whole polynomial or data blob and later prove individual values from it.
Lattice‑based cryptography
A type of post‑quantum cryptography that relies on hard problems in high‑dimensional grids (lattices) and is believed to be safe even against quantum attacks.
ML‑DSA (CRYSTALS‑Dilithium)
A lattice‑based post‑quantum signature scheme standardized by NIST as a general‑purpose replacement for algorithms like ECDSA.
ML‑KEM (CRYSTALS‑Kyber)
A lattice‑based key encapsulation mechanism standardized by NIST for establishing shared encryption keys in a quantum‑safe way.
NIST
A U.S. government standards body that runs open processes to select and publish widely used cryptographic standards for the world.
Post‑quantum cryptography (PQC)
New families of cryptographic algorithms designed to remain secure even if attackers have large, fault‑tolerant quantum computers.
Public key / private key
A key pair where the public key can be shared with everyone to verify signatures, while the private key must be kept secret to control a wallet or identity.
Shor’s algorithm
A quantum algorithm that can efficiently break the math behind RSA and elliptic‑curve cryptography, making today’s public‑key schemes unsafe in the long term.
STARKs
A type of zero‑knowledge proof that uses only hashes and avoids trusted setups, making it transparent and more naturally resistant to quantum attacks.
“Store now, decrypt later” (HNDL)
An attack strategy where adversaries record encrypted traffic today with the plan to decrypt it in the future once quantum computers become powerful enough.
XMTP
A decentralized messaging protocol used by apps like Nodle’s messenger that has begun integrating post‑quantum protections into its key exchange.
Zero‑knowledge proof (ZKP)
A cryptographic technique that lets someone prove a statement is true (like a valid transaction or computation) without revealing the underlying private data.
Fast |
Very fast |
Moderate |
Fast |
Quantum safe? | Yes | Yes | Yes (conservative) | No |
NIST status | FIPS 204 (final) | Selected; FIPS 206 pending | FIPS 205 (final) | Legacy |
Hash‑based signatures (SPHINCS+/SLH‑DSA)
Signature schemes that get their security almost entirely from hash functions, making them very conservative but often much larger in size.
Hybrid signature
A setup where a transaction or message is signed with both a classical algorithm (like ECDSA) and a post‑quantum one, so it stays valid even if one is broken.
KZG commitments
A succinct proof system based on elliptic‑curve pairings that lets you commit to a whole polynomial or data blob and later prove individual values from it.
Lattice‑based cryptography
A type of post‑quantum cryptography that relies on hard problems in high‑dimensional grids (lattices) and is believed to be safe even against quantum attacks.
ML‑DSA (CRYSTALS‑Dilithium)
A lattice‑based post‑quantum signature scheme standardized by NIST as a general‑purpose replacement for algorithms like ECDSA.
ML‑KEM (CRYSTALS‑Kyber)
A lattice‑based key encapsulation mechanism standardized by NIST for establishing shared encryption keys in a quantum‑safe way.
NIST
A U.S. government standards body that runs open processes to select and publish widely used cryptographic standards for the world.
Post‑quantum cryptography (PQC)
New families of cryptographic algorithms designed to remain secure even if attackers have large, fault‑tolerant quantum computers.
Public key / private key
A key pair where the public key can be shared with everyone to verify signatures, while the private key must be kept secret to control a wallet or identity.
Shor’s algorithm
A quantum algorithm that can efficiently break the math behind RSA and elliptic‑curve cryptography, making today’s public‑key schemes unsafe in the long term.
STARKs
A type of zero‑knowledge proof that uses only hashes and avoids trusted setups, making it transparent and more naturally resistant to quantum attacks.
“Store now, decrypt later” (HNDL)
An attack strategy where adversaries record encrypted traffic today with the plan to decrypt it in the future once quantum computers become powerful enough.
XMTP
A decentralized messaging protocol used by apps like Nodle’s messenger that has begun integrating post‑quantum protections into its key exchange.
Zero‑knowledge proof (ZKP)
A cryptographic technique that lets someone prove a statement is true (like a valid transaction or computation) without revealing the underlying private data.
No comments yet