The post Justin Drake: Quantum computing could break crypto keys in minutes, Ethereum aims for post-quantum security by 2029, and the race to secure blockchain The post Justin Drake: Quantum computing could break crypto keys in minutes, Ethereum aims for post-quantum security by 2029, and the race to secure blockchain

Justin Drake: Quantum computing could break crypto keys in minutes, Ethereum aims for post-quantum security by 2029, and the race to secure blockchain against quantum threats


Quantum computing could threaten crypto security, urging urgent upgrades to protect digital assets.

Key takeaways

  • Quantum computing poses a significant threat to current cryptographic systems used in crypto.
  • The emergence of quantum computers necessitates a strategic allocation of resources to mitigate risks.
  • Quantum computers could potentially break cryptographic keys in a matter of minutes.
  • Three key cryptographic components in crypto are vulnerable to quantum computing.
  • Quantum computers, if built at a large enough scale, can break existing cryptographic systems.
  • There is a reasonable chance of having a cryptographically relevant quantum computer by 2031.
  • Improvements in quantum algorithms are reducing the number of qubits needed to break Ethereum’s cryptography.
  • A cryptographically relevant quantum computer could compromise the security of the entire crypto industry.
  • Cold storage wallets can be secured against quantum attacks by not revealing the public key until a transaction is made.
  • Approximately 30% of keys are not protected behind a hash, posing a security risk.
  • The transition to post-quantum cryptography involves both technical and social challenges.
  • To maintain long-term privacy, blockchain systems must adopt quantum secure cryptography now.
  • Privacy coins like Zcash will be prime targets for quantum computers due to their ability to allow fund theft without detection.
  • Ethereum plans to upgrade all its cryptography to be post-quantum secure by 2029.
  • The blockchain industry will attract a significant amount of post-quantum talent in the near future.

Guest intro

Justin Drake is a researcher at the Ethereum Foundation. He played a key role in Ethereum’s transition from proof-of-work to proof-of-stake, known as The Merge. His work focuses on cryptographic protocols, scalability, and security in blockchain technology.

The threat of quantum computing to cryptographic security

  • “Quantum computers could potentially break cryptographic keys in a matter of minutes.” – Justin Drake
  • “Quantum computing poses a significant threat to current cryptographic systems used in crypto.” – Justin Drake
  • “Three key cryptographic components in crypto are vulnerable to quantum computing.” – Justin Drake
  • “Quantum computers, if built at a large enough scale, can break existing cryptographic systems.” – Justin Drake
  • “There is a reasonable chance we could have a cryptographically relevant quantum computer by 2031.” – Justin Drake
  • The improvement in quantum algorithms is significantly reducing the number of qubits needed to break Ethereum’s cryptography.
  • A cryptographically relevant quantum computer could compromise the security of the entire crypto industry.
  • “The emergence of a powerful quantum computer poses a systemic risk to all crypto.” – Justin Drake
  • Quantum computers could disrupt blockchain consensus mechanisms by breaking the cryptographic protections in place.
  • “Quantum computers may take a long time to break cryptographic keys, but other modalities like supercomputing can do it much faster.” – Justin Drake

Preparing for quantum threats in blockchain

  • “We need to start preparing for the transition to new cryptography well in advance of the arrival of quantum computers.” – Justin Drake
  • Cold storage wallets can be secured against quantum attacks by not revealing the public key until a transaction is made.
  • “Approximately 30% of keys are not protected behind a hash, which poses a security risk.” – Justin Drake
  • Exchanges typically manage their assets through a tiered storage system including cold, lukewarm, and hot wallets.
  • “There is a competitive race among major companies to develop quantum computers that could potentially attack crypto.” – Justin Drake
  • Governments are heavily investing in quantum computing technology, but their progress is largely undisclosed.
  • “China is likely one of the few governments motivated to attack blockchain technologies.” – Justin Drake
  • The transition to post-quantum cryptography involves both technical and social challenges.
  • “The size problem in post-quantum cryptography significantly impacts blockchain throughput.” – Justin Drake
  • Signature aggregation is a solution being developed to address the size problem in blockchain transactions.

The future of blockchain security

  • “Bitcoin’s infrequent upgrades pose a risk in the face of advancing quantum computing technology.” – Justin Drake
  • “It would be catastrophic if each blockchain developed its own post-quantum solution independently.” – Justin Drake
  • Collaboration between Ethereum and Bitcoin could lead to a unified post-quantum cryptographic solution.
  • “Having broad industry standards in cryptography is beneficial for interoperability and security.” – Justin Drake
  • The Falcon signature scheme is a notable example of a cryptographic standard being adopted for post-quantum security.
  • Algorand’s state proofs utilize the Falcon signature scheme to provide post-quantum secure attestations of the blockchain state.
  • “Post-quantum signatures enhance security by preventing quantum computers from forging signatures.” – Justin Drake
  • “Quantum computing poses a significant threat to current encryption methods used in blockchain technology.” – Justin Drake
  • To maintain long-term privacy, blockchain systems must adopt quantum secure cryptography now.
  • Privacy coins like Zcash will be prime targets for quantum computers due to their ability to allow fund theft without detection.

Ethereum’s approach to quantum security

  • “Ethereum’s lost coins represent a negligible portion of its circulating supply.” – Justin Drake
  • Migration to post-quantum secure wallets may require user action unless a proof of knowledge of the seed phrase is implemented.
  • In the event of a quantum attack, Ethereum may need to shut down temporarily to implement security measures.
  • The transition to post-quantum secure cryptography for Ethereum will involve a complex process that could temporarily halt the network.
  • “Ethereum plans to upgrade all its cryptography to be post-quantum secure by 2029.” – Justin Drake
  • “Algorand’s approach to upgrades involves deploying state proofs and iterating based on learned experiences.” – Justin Drake
  • Post quantum cryptography has very different performance profiles compared to classical cryptography.
  • Starting early with post quantum transitions is essential to learn and adjust strategies.
  • “The blockchain industry will attract a significant amount of post-quantum talent in the near future.” – Justin Drake
  • Hash-based cryptography is being pursued for its uncompromising security in addressing the size problem.

The role of hash-based cryptography

  • “Hash-based cryptography is chosen for its uncompromising security despite larger signature sizes compared to lattice-based signatures.” – Justin Drake
  • The ‘hash gambit’ allows for larger signatures while solving size problems with smaller, fast-to-verify proofs.
  • “Sharded mempools can effectively manage transaction flow and enhance scalability.” – Justin Drake
  • Hash-based signatures offer a combination of security and simplicity, making them a viable option for blockchain technology.
  • Merkle trees and hash-based signatures are foundational technologies that can enhance blockchain security.
  • “Post-quantum cryptography is evolving with practical applications emerging from theoretical concepts.” – Justin Drake
  • Lattice-based cryptography and hash-based cryptography are key categories selected for post-quantum cryptography standards.
  • “Lattice-based cryptography will lead to significant advancements in privacy and computation within the next five to ten years.” – Justin Drake
  • Nick Carter’s concerns about Bitcoin’s vulnerability to quantum threats are valid.
  • Bitcoin may not withstand the test of time due to its security budget.

Addressing Bitcoin’s quantum vulnerabilities

  • “A small group of researchers can effectively address technical challenges in blockchain technology.” – Justin Drake
  • The migration process for Bitcoin could take about a year.
  • Increasing the block size is a technically naive solution to Bitcoin’s aggregation problem.
  • Hash-based signatures can provide a scalability boost for Bitcoin without increasing block size.
  • “Quantum computers will eventually scale up to break current cryptography, but the timeline is uncertain.” – Justin Drake
  • The timeline for the emergence of quantum computers capable of breaking cryptography is unpredictable.
  • Satoshi’s coins pose a unique threat to Bitcoin due to their large quantity and public key structure.
  • The potential theft of Satoshi’s coins could lead to a contentious debate and possible fork in the Bitcoin community.
  • The portrayal of the quantum threat to Bitcoin may be overstated, with only a small number of bitcoins actually vulnerable.
  • Quantum computing could potentially allow for the theft of Satoshi’s coins within a couple of years.

The urgency of upgrading blockchain security

  • “The speed of quantum computing advancements could lead to rapid and widespread capabilities that outpace current security measures.” – Justin Drake
  • Quantum computers can quietly accumulate secret keys before executing an attack on blockchain wallets.
  • Chains must upgrade their security measures before quantum computing becomes a threat.
  • AI may accelerate the discovery of mathematical breakthroughs that could threaten current cryptographic systems.
  • The migration to post-quantum cryptography should be done quickly and is also a migration to post-AI cryptography.
  • “We should avoid structured assumptions in cryptography and favor maximally unstructured methods like hash-based cryptography.” – Justin Drake
  • The way we think about post-quantum cryptography is shifting from a defensive to an aggressive strategy.
  • Ethereum’s proactive approach to quantum security could attract institutional capital.
  • “Ethereum is becoming an attractive asset for investors due to its proactive stance on quantum threats.” – Justin Drake

Quantum computing could threaten crypto security, urging urgent upgrades to protect digital assets.

Key takeaways

  • Quantum computing poses a significant threat to current cryptographic systems used in crypto.
  • The emergence of quantum computers necessitates a strategic allocation of resources to mitigate risks.
  • Quantum computers could potentially break cryptographic keys in a matter of minutes.
  • Three key cryptographic components in crypto are vulnerable to quantum computing.
  • Quantum computers, if built at a large enough scale, can break existing cryptographic systems.
  • There is a reasonable chance of having a cryptographically relevant quantum computer by 2031.
  • Improvements in quantum algorithms are reducing the number of qubits needed to break Ethereum’s cryptography.
  • A cryptographically relevant quantum computer could compromise the security of the entire crypto industry.
  • Cold storage wallets can be secured against quantum attacks by not revealing the public key until a transaction is made.
  • Approximately 30% of keys are not protected behind a hash, posing a security risk.
  • The transition to post-quantum cryptography involves both technical and social challenges.
  • To maintain long-term privacy, blockchain systems must adopt quantum secure cryptography now.
  • Privacy coins like Zcash will be prime targets for quantum computers due to their ability to allow fund theft without detection.
  • Ethereum plans to upgrade all its cryptography to be post-quantum secure by 2029.
  • The blockchain industry will attract a significant amount of post-quantum talent in the near future.

Guest intro

Justin Drake is a researcher at the Ethereum Foundation. He played a key role in Ethereum’s transition from proof-of-work to proof-of-stake, known as The Merge. His work focuses on cryptographic protocols, scalability, and security in blockchain technology.

The threat of quantum computing to cryptographic security

  • “Quantum computers could potentially break cryptographic keys in a matter of minutes.” – Justin Drake
  • “Quantum computing poses a significant threat to current cryptographic systems used in crypto.” – Justin Drake
  • “Three key cryptographic components in crypto are vulnerable to quantum computing.” – Justin Drake
  • “Quantum computers, if built at a large enough scale, can break existing cryptographic systems.” – Justin Drake
  • “There is a reasonable chance we could have a cryptographically relevant quantum computer by 2031.” – Justin Drake
  • The improvement in quantum algorithms is significantly reducing the number of qubits needed to break Ethereum’s cryptography.
  • A cryptographically relevant quantum computer could compromise the security of the entire crypto industry.
  • “The emergence of a powerful quantum computer poses a systemic risk to all crypto.” – Justin Drake
  • Quantum computers could disrupt blockchain consensus mechanisms by breaking the cryptographic protections in place.
  • “Quantum computers may take a long time to break cryptographic keys, but other modalities like supercomputing can do it much faster.” – Justin Drake

Preparing for quantum threats in blockchain

  • “We need to start preparing for the transition to new cryptography well in advance of the arrival of quantum computers.” – Justin Drake
  • Cold storage wallets can be secured against quantum attacks by not revealing the public key until a transaction is made.
  • “Approximately 30% of keys are not protected behind a hash, which poses a security risk.” – Justin Drake
  • Exchanges typically manage their assets through a tiered storage system including cold, lukewarm, and hot wallets.
  • “There is a competitive race among major companies to develop quantum computers that could potentially attack crypto.” – Justin Drake
  • Governments are heavily investing in quantum computing technology, but their progress is largely undisclosed.
  • “China is likely one of the few governments motivated to attack blockchain technologies.” – Justin Drake
  • The transition to post-quantum cryptography involves both technical and social challenges.
  • “The size problem in post-quantum cryptography significantly impacts blockchain throughput.” – Justin Drake
  • Signature aggregation is a solution being developed to address the size problem in blockchain transactions.

The future of blockchain security

  • “Bitcoin’s infrequent upgrades pose a risk in the face of advancing quantum computing technology.” – Justin Drake
  • “It would be catastrophic if each blockchain developed its own post-quantum solution independently.” – Justin Drake
  • Collaboration between Ethereum and Bitcoin could lead to a unified post-quantum cryptographic solution.
  • “Having broad industry standards in cryptography is beneficial for interoperability and security.” – Justin Drake
  • The Falcon signature scheme is a notable example of a cryptographic standard being adopted for post-quantum security.
  • Algorand’s state proofs utilize the Falcon signature scheme to provide post-quantum secure attestations of the blockchain state.
  • “Post-quantum signatures enhance security by preventing quantum computers from forging signatures.” – Justin Drake
  • “Quantum computing poses a significant threat to current encryption methods used in blockchain technology.” – Justin Drake
  • To maintain long-term privacy, blockchain systems must adopt quantum secure cryptography now.
  • Privacy coins like Zcash will be prime targets for quantum computers due to their ability to allow fund theft without detection.

Ethereum’s approach to quantum security

  • “Ethereum’s lost coins represent a negligible portion of its circulating supply.” – Justin Drake
  • Migration to post-quantum secure wallets may require user action unless a proof of knowledge of the seed phrase is implemented.
  • In the event of a quantum attack, Ethereum may need to shut down temporarily to implement security measures.
  • The transition to post-quantum secure cryptography for Ethereum will involve a complex process that could temporarily halt the network.
  • “Ethereum plans to upgrade all its cryptography to be post-quantum secure by 2029.” – Justin Drake
  • “Algorand’s approach to upgrades involves deploying state proofs and iterating based on learned experiences.” – Justin Drake
  • Post quantum cryptography has very different performance profiles compared to classical cryptography.
  • Starting early with post quantum transitions is essential to learn and adjust strategies.
  • “The blockchain industry will attract a significant amount of post-quantum talent in the near future.” – Justin Drake
  • Hash-based cryptography is being pursued for its uncompromising security in addressing the size problem.

The role of hash-based cryptography

  • “Hash-based cryptography is chosen for its uncompromising security despite larger signature sizes compared to lattice-based signatures.” – Justin Drake
  • The ‘hash gambit’ allows for larger signatures while solving size problems with smaller, fast-to-verify proofs.
  • “Sharded mempools can effectively manage transaction flow and enhance scalability.” – Justin Drake
  • Hash-based signatures offer a combination of security and simplicity, making them a viable option for blockchain technology.
  • Merkle trees and hash-based signatures are foundational technologies that can enhance blockchain security.
  • “Post-quantum cryptography is evolving with practical applications emerging from theoretical concepts.” – Justin Drake
  • Lattice-based cryptography and hash-based cryptography are key categories selected for post-quantum cryptography standards.
  • “Lattice-based cryptography will lead to significant advancements in privacy and computation within the next five to ten years.” – Justin Drake
  • Nick Carter’s concerns about Bitcoin’s vulnerability to quantum threats are valid.
  • Bitcoin may not withstand the test of time due to its security budget.

Addressing Bitcoin’s quantum vulnerabilities

  • “A small group of researchers can effectively address technical challenges in blockchain technology.” – Justin Drake
  • The migration process for Bitcoin could take about a year.
  • Increasing the block size is a technically naive solution to Bitcoin’s aggregation problem.
  • Hash-based signatures can provide a scalability boost for Bitcoin without increasing block size.
  • “Quantum computers will eventually scale up to break current cryptography, but the timeline is uncertain.” – Justin Drake
  • The timeline for the emergence of quantum computers capable of breaking cryptography is unpredictable.
  • Satoshi’s coins pose a unique threat to Bitcoin due to their large quantity and public key structure.
  • The potential theft of Satoshi’s coins could lead to a contentious debate and possible fork in the Bitcoin community.
  • The portrayal of the quantum threat to Bitcoin may be overstated, with only a small number of bitcoins actually vulnerable.
  • Quantum computing could potentially allow for the theft of Satoshi’s coins within a couple of years.

The urgency of upgrading blockchain security

  • “The speed of quantum computing advancements could lead to rapid and widespread capabilities that outpace current security measures.” – Justin Drake
  • Quantum computers can quietly accumulate secret keys before executing an attack on blockchain wallets.
  • Chains must upgrade their security measures before quantum computing becomes a threat.
  • AI may accelerate the discovery of mathematical breakthroughs that could threaten current cryptographic systems.
  • The migration to post-quantum cryptography should be done quickly and is also a migration to post-AI cryptography.
  • “We should avoid structured assumptions in cryptography and favor maximally unstructured methods like hash-based cryptography.” – Justin Drake
  • The way we think about post-quantum cryptography is shifting from a defensive to an aggressive strategy.
  • Ethereum’s proactive approach to quantum security could attract institutional capital.
  • “Ethereum is becoming an attractive asset for investors due to its proactive stance on quantum threats.” – Justin Drake

Loading more articles…

You’ve reached the end


Add us on Google

`;
}

function createMobileArticle(article) {
const displayDate = getDisplayDate(article);
const editorSlug = article.editor ? article.editor.toLowerCase().replace(/\s+/g, ‘-‘) : ”;
const captionHtml = article.imageCaption ? `

${article.imageCaption}

` : ”;
const authorHtml = article.isPressRelease ? ” : `
`;

return `


${captionHtml}

${article.subheadline ? `

${article.subheadline}

` : ”}

${createSocialShare()}

${authorHtml}
${displayDate}

${article.content}

`;
}

function createDesktopArticle(article, sidebarAdHtml) {
const editorSlug = article.editor ? article.editor.toLowerCase().replace(/\s+/g, ‘-‘) : ”;
const displayDate = getDisplayDate(article);
const captionHtml = article.imageCaption ? `

${article.imageCaption}

` : ”;
const categoriesHtml = article.categories.map((cat, i) => {
const separator = i < article.categories.length – 1 ? ‘|‘ : ”;
return `${cat}${separator}`;
}).join(”);
const desktopAuthorHtml = article.isPressRelease ? ” : `
`;

return `

${categoriesHtml}

${article.subheadline ? `

${article.subheadline}

` : ”}

${desktopAuthorHtml}
${displayDate}
${createSocialShare()}

${captionHtml}

`;
}

function loadMoreArticles() {
if (isLoading || !hasMore) return;

isLoading = true;
loadingText.classList.remove(‘hidden’);

// Build form data for AJAX request
const formData = new FormData();
formData.append(‘action’, ‘cb_lovable_load_more’);
formData.append(‘current_post_id’, lastLoadedPostId);
formData.append(‘primary_cat_id’, primaryCatId);
formData.append(‘before_date’, lastLoadedDate);
formData.append(‘loaded_ids’, loadedPostIds.join(‘,’));

fetch(ajaxUrl, {
method: ‘POST’,
body: formData
})
.then(response => response.json())
.then(data => {
isLoading = false;
loadingText.classList.add(‘hidden’);

if (data.success && data.has_more && data.article) {
const article = data.article;
const sidebarAdHtml = data.sidebar_ad_html || ”;

// Check for duplicates
if (loadedPostIds.includes(article.id)) {
console.log(‘Duplicate article detected, skipping:’, article.id);
// Update pagination vars and try again
lastLoadedDate = article.publishDate;
loadMoreArticles();
return;
}

// Add to mobile container
mobileContainer.insertAdjacentHTML(‘beforeend’, createMobileArticle(article));

// Add to desktop container with fresh ad HTML
desktopContainer.insertAdjacentHTML(‘beforeend’, createDesktopArticle(article, sidebarAdHtml));

// Update tracking variables
loadedPostIds.push(article.id);
lastLoadedPostId = article.id;
lastLoadedDate = article.publishDate;

// Execute any inline scripts in the new content (for ads)
const newArticle = desktopContainer.querySelector(`article[data-article-id=”${article.id}”]`);
if (newArticle) {
const scripts = newArticle.querySelectorAll(‘script’);
scripts.forEach(script => {
const newScript = document.createElement(‘script’);
if (script.src) {
newScript.src = script.src;
} else {
newScript.textContent = script.textContent;
}
document.body.appendChild(newScript);
});
}

// Trigger Ad Inserter if available
if (typeof ai_check_and_insert_block === ‘function’) {
ai_check_and_insert_block();
}

// Trigger Google Publisher Tag refresh if available
if (typeof googletag !== ‘undefined’ && googletag.pubads) {
googletag.cmd.push(function() {
googletag.pubads().refresh();
});
}

} else if (data.success && !data.has_more) {
hasMore = false;
endText.classList.remove(‘hidden’);
} else if (!data.success) {
console.error(‘AJAX error:’, data.error);
hasMore = false;
endText.textContent=”Error loading more articles”;
endText.classList.remove(‘hidden’);
}
})
.catch(error => {
console.error(‘Fetch error:’, error);
isLoading = false;
loadingText.classList.add(‘hidden’);
hasMore = false;
endText.textContent=”Error loading more articles”;
endText.classList.remove(‘hidden’);
});
}

// Set up IntersectionObserver
const observer = new IntersectionObserver(function(entries) {
if (entries[0].isIntersecting) {
loadMoreArticles();
}
}, { threshold: 0.1 });

observer.observe(loadingTrigger);
})();

© Decentral Media and Crypto Briefing® 2026.

Source: https://cryptobriefing.com/justin-drake-quantum-computing-could-break-crypto-keys-in-minutes-ethereum-aims-for-post-quantum-security-by-2029-and-the-race-to-secure-blockchain-against-quantum-threats-unchained/

Market Opportunity
QUANTUM Logo
QUANTUM Price(QUANTUM)
$0.003341
$0.003341$0.003341
+0.17%
USD
QUANTUM (QUANTUM) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Tags: