Ullah, Mati and Ali, Amjad and Jadoon, Atif Khan (2025): Quantum Computing and Blockchain Security: A Critical Assessment of Cryptographic Vulnerabilities and Post-Quantum Migration Strategies.
Preview |
PDF
MPRA_paper_127528.pdf Download (367kB) | Preview |
Abstract
This paper examines the growing threat that quantum computing presents to blockchain security. Core blockchain cryptographic frameworks, specifically the Elliptic Curve Digital Signature Algorithm and the Secure Hash Algorithm 256, are vulnerable to quantum algorithms. Both the Shor algorithm and the Grover algorithm are capable of breaking the Elliptic Curve Digital Signature Algorithm, enabling attackers to calculate private keys from public keys, while the Grover algorithm can also compromise hash-based systems that depend on brute-force methods, such as Proof-of-Work. On-chain analysis indicates that billions of dollars’ worth of crypto-assets are held in addresses susceptible to these quantum attacks. A proposed countermeasure is migration to Post-Quantum Cryptography, which incorporates quantum-resistant algorithms, such as CRYSTALS-Dilithium and Falcon. However, this migration introduces a trilemma among network security, decentralization, and performance. Post-Quantum Cryptography algorithms significantly increase transaction sizes and computational costs, which pose economic and technical challenges for large blockchain networks. The paper further discusses how the timeline for quantum advancements will be shaped by geopolitical competition, and how the catch-the-crop, decrypt-later strategy puts current data at risk from future quantum decryption. It emphasizes that active migration to Post-Quantum Cryptography is urgent, calling on stakeholders to prioritize system audits, transition to cryptographically flexible infrastructures, promote research into quantum-resistant solutions, and establish governance frameworks that enable prompt and decentralized upgrades.
| Item Type: | MPRA Paper |
|---|---|
| Original Title: | Quantum Computing and Blockchain Security: A Critical Assessment of Cryptographic Vulnerabilities and Post-Quantum Migration Strategies |
| English Title: | Quantum Computing and Blockchain Security: A Critical Assessment of Cryptographic Vulnerabilities and Post-Quantum Migration Strategies |
| Language: | English |
| Keywords: | Quantum Computing, Blockchain Security, Post-Quantum Cryptography, Shor’s Algorithm, Grover’s Algorithm, Cryptographic Vulnerability |
| Subjects: | O - Economic Development, Innovation, Technological Change, and Growth > O3 - Innovation ; Research and Development ; Technological Change ; Intellectual Property Rights |
| Item ID: | 127528 |
| Depositing User: | Dr. Amjad Ali |
| Date Deposited: | 02 Mar 2026 04:59 |
| Last Modified: | 02 Mar 2026 04:59 |
| References: | AI Invest. (2025, June 3). Bitcoin faces imminent quantum threat with 25% supply vulnerable. AI Invest. Alnahawi, N., Schmitt, N., Wiesmaier, A., Heinemann, A., & Grasmeyer, T. (2023). On the state of crypto-agility. Cryptology ePrint Archive. Alzoubi, Y. I., & Mishra, A. (2024). Techniques to alleviate blockchain bloat: Potentials, challenges, and recommendations. Computers and Electrical Engineering, 116, 109216. Andreou, G. (2025, June 8). QRAMP protocol, explained: Can Bitcoin’s 21-million cap survive the future? Medium. Aranha, D. F., Novaes, F. R., Takahashi, A., Tibouchi, M., & Yarom, Y. (2020). LadderLeak: Breaking ECDSA with less than one bit of nonce leakage. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (pp. 225–242). Aspers, P., & Corte, U. (2019). What is qualitative in qualitative research. Qualitative Sociology, 42, 139–160. Bailey, B., & Sattath, O. (2024). 51% attack via difficulty increase with a small quantum miner. arXiv preprint arXiv:2403.08023. Baseri, Y., Hafid, A., Shahsavari, Y., Makrakis, D., & Khodaiemehr, H. (2025). Blockchain security risk assessment in quantum era, migration strategies and proactive defense. arXiv preprint arXiv:2501.11798. Beckwith, L. N. (2022). High-performance hardware implementation of lattice-based digital signatures. Cryptology ePrint Archive. Dam, D. T., Tran, T. H., Hoang, V. P., Pham, C. K., & Hoang, T. T. (2023). A survey of post-quantum cryptography: Start of a new race. Cryptography, 7(3), 40. Deloitte. (2025, June 18). Quantum computers and the Bitcoin blockchain. Deloitte. Erata, F., Piskac, R., Mateu, V., & Szefer, J. (2023). Towards automated detection of single-trace side-channel vulnerabilities in constant-time cryptographic code. In 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) (pp. 687–706). IEEE. Farooq, S. M., Hussain, S. S., & Ustun, T. S. (2019). Elliptic curve digital signature algorithm (ECDSA) certificate-based authentication scheme for advanced metering infrastructure. In 2019 Innovations in Power and Advanced Computing Technologies (i-PACT) (Vol. 1, pp. 1–6). IEEE. Farras, A., Ali, A., & Audi, M. (2025). Advancing Audit Practices through Technology: A Comprehensive Review of Continuous Auditing. Journal of Social Signs Review, 3(2), 506-539. Fernandez-Carames, T. M., & Fraga-Lamas, P. (2020). Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks. IEEE Access, 8, 21091–21116. Giovanni, F. D. (2024, January 5). Physical principles underpinning quantum computing. ET Times. Goodin, D. (2022, August 3). A new attack easily knocked out a potential encryption algorithm. Wired. Iqbal, S. S., & Zafar, A. (2024). Enhanced Shor’s algorithm with quantum circuit optimization. International Journal of Information Technology, 16(4), 2725–2731. Kodithuwak, S., & Pacillo, N. (2025). Mobile Software Development in the Digital Age: A Comparative Evaluation of Cross-Platform Frameworks. Journal of Policy Options, 8(2), 9-17. Kulkarni, A. U., Jain, S., & Kumar, A. (2022). Quantum computing and quantum blockchain: Recent advancements, analysis and future directions. In Quantum and Blockchain for Modern Computing Systems: Vision and Advancements (pp. 311–339). Springer International Publishing. Kumar, D. K., Krishna, E. H. V., Ushasri, R., Jahnavi, V., Prakash, K. B., & Imambi, S. (2023). Implementation of Grover's and Shor's algorithms in quantum machine learning. In 2023 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE) (pp. 967–972). IEEE. Kumar, M., & Pattnaik, P. (2020). Post quantum cryptography (PQC)–an overview. In 2020 IEEE High Performance Extreme Computing Conference (HPEC) (pp. 1–9). IEEE. Larasati, H. T., & Kim, H. (2021). Quantum cryptanalysis landscape of Shor’s algorithm for elliptic curve discrete logarithm problem. In Information Security Applications: 22nd International Conference, WISA 2021 (pp. 91–104). Lösch, S., Rambo, C. A., & de Lima Ferreira, J. (2023). Exploratory research in the qualitative approach in education. Revista Ibero-Americana de Estudos Em Educação, 18. Mandelbaum, R., Gambetta, J., Chow, J., Mittal, T., Yoder, T. J., Cross, A., & Steffen, M. (2025, June 10). How IBM will build the world's first large-scale, fault-tolerant quantum computer. IBM. Marchsreiter, D. (2025). Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems. IET Blockchain, 5(1), e12094. Martinez, J. E. (2022). Decoherence and quantum error correction for quantum computing and communications. arXiv preprint arXiv:2202.08600. Melo, D., Hernandez, S. P., Rodríguez, L., & Pérez-Sansalvador, J. C. (2023). Bitcoin transactions types and their impact on storage scalability. In 2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) (pp. 1–6). IEEE. Minella, C. (2025). Managing Agile Across Borders: A Review of Scrum Implementation in Globally Distributed Software Development. Journal of Policy Options, 8(2), 37-45. Mosteanu, N. R., & Faccia, A. (2021). Fintech frontiers in quantum computing, fractals, and blockchain distributed ledger: Paradigm shifts and open innovation. Journal of Open Innovation: Technology, Market, and Complexity, 7(1), 19. Olutimehin, A. T., Joseph, S., Ajayi, A. J., Metibemu, O. C., Balogun, A. Y., & Olaniyi, O. O. (2025). Future-proofing data: Assessing the feasibility of post-quantum cryptographic algorithms to mitigate ‘harvest now, decrypt later’ attacks. Decrypt Later’ Attacks. Paul, P., Aithal, P. S., Saavedra, R., & Ghosh, S. (2021). Blockchain technology and its types—A short review. International Journal of Applied Science and Engineering (IJASE), 9(2), 189–200. Paul, S., Scheible, P., & Wiemer, F. (2022). Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication. Journal of Computer Security, 30(4), 623–653. Preston, R. H. (2023). Applying Grover's algorithm to hash functions: A software perspective. IEEE Transactions on Quantum Engineering, 3, 1–10. Qiu, D., Luo, L., & Xiao, L. (2024). Distributed Grover's algorithm. Theoretical Computer Science, 993, 114461. Qureca. (2025, June 5). Quantum initiatives worldwide 2025. Qureca. Raheman, F. (2024). Defining quantum advantage for building a sustainable MVP to deliver quantum computing services. Open Journal of Applied Sciences, 14(6), 1530–1549. Raheman, F. (2024). Futureproofing blockchain & cryptocurrencies against growing vulnerabilities & Q-Day threat with quantum-safe ledger technology (QLT). Journal of Computer and Communications, 12(7), 59–77. Rankhambe, B. P., & Khanuja, H. K. (2019). A comparative analysis of blockchain platforms—Bitcoin and Ethereum. In 2019 5th International Conference on Computing, Communication, Control and Automation (ICCUBEA) (pp. 1–7). IEEE. Reddy, G. P., Narayana, A., Keerthan, P. K., Vineetha, B., & Honnavalli, P. (2021). Multiple hashing using SHA-256 and MD5. In Advances in Computing and Network Communications: Proceedings of CoCoNet 2020, Volume 1 (pp. 643–655). Springer Singapore. Redo, M., & Gębska, M. (2020). Globalization in growing financial markets as a threat to the financial security of the global economy. European Research Studies Journal, 23(Special 1), 335–355. Reich, A., & Reich, N. (2025). Scrum in Global Software Development: Challenges, Risks, and Mitigation Strategies for Effective Project Management. Journal of Policy Options, 8(1), 43-50. Sami, M. S. U. I., Azar, K. Z., Kamali, H. M., Farahmandi, F., & Tehranipoor, M. (2024). PQC-HI: PQC-enabled chiplet authentication and key exchange in heterogeneous integration. In 2024 IEEE 74th Electronic Components and Technology Conference (ECTC) (pp. 464–471). IEEE. Schärer, K., & Comuzzi, M. (2023). The quantum threat to blockchain: Summary and timeline analysis. Quantum Machine Intelligence, 5(1), 19. Security Site. (2025, June 17). Elliptic curve digital signature algorithm (ECDSA). Security Site. Shaukat, H., Ali, A., & Audi, M. (2025). Artificial Intelligence and Economic Transformation: Implications for Growth, Employment, and Policy in the Digital Age. Research Consortium Archive, 3(2), 852-869. Singh, A. (2023, August 7). Unveiling quantum wonders: Superposition and entanglement in quantum computing. Medium. Snetkov, N., Vakarjuk, J., & Laud, P. (2024). TOPCOAT: Towards practical two-party Crystals-Dilithium. Discover Computing, 27(1), 18. Swayne, M. (2024, April 12). What is quantum computing? Quantum Insider. Tyagi, A. K., Mishra, A. K., Aswathy, S. U., & Kumari, S. (2024). Quantum computing, qubits with artificial intelligence, and blockchain technologies: A roadmap for the future. In Automated Secure Computing for Next‐Generation Systems (pp. 367–384). Valenta, L., Gonçalves, V., & Westerbaan, B. (2024, August 20). NIST’s first post-quantum standards. Cloudflare. Wong, H. Y. (2023). Shor’s algorithm. In Introduction to Quantum Computing: From a Layperson to a Programmer in 30 Steps (pp. 289–298). Springer International Publishing. Yalamuri, G., Honnavalli, P., & Eswaran, S. (2022). A review of the present cryptographic arsenal to deal with post-quantum threats. Procedia Computer Science, 215, 834–845. Zaghloul, E., Li, T., Mutka, M. W., & Ren, J. (2020). Bitcoin and blockchain: Security and privacy. IEEE Internet of Things Journal, 7(10), 10288–10313. Zhang, K., Cui, H., & Yu, Y. (2022). SPHINCS-α: A compact stateless hash-based signature scheme. Cryptology ePrint Archive. Zhou, Y., Chen, J., Wang, Y., Tang, Y., & Gu, G. (2024). Towards understanding crypto-asset risks on Ethereum caused by key leakage on the Internet. In Companion Proceedings of the ACM Web Conference 2024 (pp. 875–878). |
| URI: | https://mpra.ub.uni-muenchen.de/id/eprint/127528 |

