Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
How Ethereum is Preparing ECDSA and Other Cryptosystems for the Quantum Computing Era: Roadmap 2026–2030
Vitalik Buterin officially introduced a comprehensive strategy to protect Ethereum from quantum computing threats. The problem arises because four key cryptographic components of the network—including account-level ECDSA—are based on assumptions about the difficulty of elliptic curves and discrete logarithms, which become vulnerable to Shor’s algorithm. When quantum machines reach sufficient power, these systems could be compromised. Developers have already begun a phased transition to post-quantum cryptography, starting in 2026.
Four Main Systems Under Quantum Attack Threat
The first risk concerns BLS signatures at the consensus level—an algorithm used to validate Ethereum blocks. The second involves account ECDSA signatures, which ensure the security of user transactions. The third component is KZG commitments, responsible for data availability in the network. The fourth element is zero-knowledge proofs, which allow verification of computations without revealing sensitive information.
All these cryptosystems rely on elliptic curve cryptography or discrete logarithm problems. When Shor’s algorithm is run on a sufficiently powerful quantum computer, it can solve these problems exponentially faster than best classical algorithms. The platform Metaculus estimates a 20% probability of such machines appearing by 2030, though some experts suggest a shorter timeline.
In response to this challenge, the Ethereum Foundation officially created a dedicated Post-Quantum Security Working Group in January 2026. Led by Thomas Koratger, the team has a budget of $2 million for research prizes. At the Devconnect conference in Buenos Aires, Buterin warned that classical elliptic curve cryptography could face critical vulnerabilities even before the 2028 U.S. presidential elections.
ETH2030: Complete Post-Quantum Cryptographic Architecture
The foundation of protection is the ETH2030 project, which implements a comprehensive stack of post-quantum cryptography. The system consists of 46 source code files distributed across seven main packages. Developers integrated six quantum-resistant signature algorithms as alternatives to ECDSA and BLS.
During testing, the stack was evaluated on 48 datasets, successfully passing over 20,900 tests. However, implementing quantum-secure signatures introduces significant changes to computational costs. While verifying a traditional ECDSA signature costs about 3,000 gas units, post-quantum alternatives could require up to 200,000 gas—an unacceptable load for the network.
To address this, the roadmap relies on recursive STARK aggregation according to EIP-8141. This mechanism allows multiple digital signatures to be compressed into a single cryptographic proof, significantly reducing on-chain costs. Additionally, ETH2030 adds 13 specialized EVM precompiles, including re-compilation for lattice cryptography at address 0x15 and accelerators for STARK proof verification.
Consensus-Level Synchronization and Transition Mechanisms
At the consensus level, Ethereum implements double-signature attestations—a hybrid approach where each operation is verified both via traditional cryptography and post-quantum alternatives. This enables validators to transition smoothly without disrupting network continuity.
Finality systems are adapted with a special adapter supporting post-quantum verification. Simultaneously, to ensure data availability, KZG commitments are replaced with alternatives based on Merkle trees and lattice cryptography. These new schemes rely on hash security and the Module-LWE assumption, avoiding dependence on elliptic curves.
All post-quantum cryptographic functions will be activated simultaneously during the I+ fork. In early February 2026, developers successfully tested the system on the Kurtosis devnet, creating functional blocks and verifying all new pre-processes. This milestone demonstrated the readiness of the technical stack for the next deployment phases.
Three-Stage Activation Plan and Network Security
The final deployment phase follows a phased activation approach to minimize systemic risks. In the first stage, validators gradually update their software to support new post-quantum algorithms. In the second stage, a double-signature mode is launched, where each operation is verified by both methods. In the third stage, when nearly all network participants switch to the new systems, the old cryptographic schemes—including ECDSA—are finally deactivated.
This gradual migration contrasts with Ethereum Foundation’s strong recommendation for rapid transition. When the threat of powerful quantum machines becomes imminent, the network will have pre-developed mechanisms ready for instant deployment. Buterin emphasized that the transitional period is critically important—delaying the shift to post-quantum standards is dangerous, but rushing their implementation without proper testing is also unwise.