Post-quantum cryptography does not signal an imminent end.

Beginner
Quick Reads
Last Updated 2026-03-25 18:19:26
Reading Time: 1m
With growing attention on quantum computing, both industry and policymakers are increasingly advocating for an immediate, comprehensive transition to post-quantum cryptography (PQC). However, the risks associated with different cryptographic primitives vary, and migrating prematurely could lead to higher security risks and increased implementation costs.

Common Misconceptions About Quantum Threats Being Overestimated


(Source: a16zcrypto)

Recently, claims that quantum computers will soon break all cryptography have become widespread, fueling demands for the immediate and universal adoption of post-quantum cryptography. These arguments often overlook two critical issues:

  • Quantum computers capable of practical cryptographic attacks have not yet been developed

  • Quantum risks vary fundamentally across different cryptographic technologies

Ignoring these differences can lead to poor decisions regarding cost, efficiency, and security.

What Is a Quantum Computer of Cryptographic Significance?

A quantum computer of cryptographic significance is not simply an experimental device demonstrating quantum advantage. It refers to a fault-tolerant quantum system capable of running Shor’s algorithm and breaking RSA-2048 or secp256k1 in a reasonable timeframe.

Current public technological advances—whether in superconducting quantum, ion trap, or neutral atom architectures—have yet to achieve the required number of logical qubits and error correction depth. Even systems with thousands of physical qubits remain insufficient for genuine cryptographic attacks. Media and businesses often employ vague terms like quantum advantage and logical qubits to generate urgency, but there is still a gap of several orders of magnitude between these milestones and actual cryptographic threats.

zkSNARKs and Quantum Risk in Blockchain

Zero-knowledge proofs (zkSNARKs) share a similar quantum security profile with digital signatures:

  • The zero-knowledge property itself is secure against quantum attacks

  • There is no risk of data being collected now and cracked in the future

As long as the proof is generated before quantum computers emerge, its validity cannot be retroactively compromised. The actual risk only applies to proofs generated after quantum computers become available.

Most Blockchains Are Not Vulnerable to HNDL Attacks

Non-privacy public blockchains such as Bitcoin and Ethereum mainly use cryptography for transaction authorization, not data encryption:

  • On-chain data is inherently public

  • The quantum threat concerns potential future signature forgery, not the decryption of historical transactions

Applying HNDL risk directly to Bitcoin is a common yet serious misinterpretation.

Privacy Chains Are the Real Cause for Concern

Privacy-oriented blockchains conceal transaction amounts and recipients. If their encrypted content is decrypted after the fact, historical transactions could be traced and exposed. These chains do need to consider post-quantum or hybrid solutions earlier.

If you want to learn more about Web3, click to register: https://www.gate.com/

Summary

Post-quantum cryptography is an unavoidable future direction. For encrypted communications requiring long-term confidentiality, action is urgent. For blockchain signatures and zero-knowledge systems, however, excessive haste may incur higher costs. Only by precisely aligning threat levels and technological readiness can we avoid being undermined by implementation risks before quantum threats actually arrive.

Author: Allen
Disclaimer
* The information is not intended to be and does not constitute financial advice or any other recommendation of any sort offered or endorsed by Gate.
* This article may not be reproduced, transmitted or copied without referencing Gate. Contravention is an infringement of Copyright Act and may be subject to legal action.

Related Articles

Gold Price Forecast for the Next Five Years: 2026–2030 Trend Outlook and Investment Implications, Could It Reach $6,000?
Beginner

Gold Price Forecast for the Next Five Years: 2026–2030 Trend Outlook and Investment Implications, Could It Reach $6,000?

Analyze current gold price trends alongside authoritative five-year forecasts, integrating an evaluation of market risks and opportunities. This gives investors insight into the potential trajectory of gold prices and the main drivers expected to shape the market over the next five years.
2026-03-25 18:13:30
AI-Native Settlement Layers: How United Stables Is Building the Next Financial Rail
Beginner

AI-Native Settlement Layers: How United Stables Is Building the Next Financial Rail

Stablecoins were originally designed as dollar substitutes within exchanges, primarily used for asset pricing and trade settlement. As on-chain financial ecosystems have matured, their role has expanded beyond simple payments to include collateral assets, cross-chain liquidity mediums, and unified settlement units. In particular, as AI systems and automated agents begin to participate directly in economic activity, demand has risen sharply for programmable value units capable of instant settlement. This shift is pushing stablecoins toward the role of foundational financial infrastructure.
2026-03-25 03:16:17
Aster vs Hyperliquid: Which Perp DEX Will Prevail?
Beginner

Aster vs Hyperliquid: Which Perp DEX Will Prevail?

Aster and Hyperliquid are the two representative protocols of the "purpose-built L1 path" within the current decentralized perpetual exchange (Perp DEX) sector. As a pioneer in the field, Hyperliquid has built a deep liquidity moat through its highly mature order book architecture and strong community consensus. Conversely, Aster, as a rising challenger, seeks to leapfrog the competition in high-performance trading through more aggressive multi-chain aggregation logic, private transaction modules, and an underlying execution environment optimized for 2026 market demands.
2026-03-24 11:58:33
DePIN Identity Network and Real World Applications: How Humanity Protocol Brings on-chain Identity Into the Physical World
Beginner

DePIN Identity Network and Real World Applications: How Humanity Protocol Brings on-chain Identity Into the Physical World

Most Web3 identity systems remain confined to on-chain environments and struggle to achieve meaningful adoption in real world settings. Through a DePIN architecture and physical verification hardware, Humanity Protocol aims to bring decentralized identity into access control systems, hospitality, public services, and offline events, allowing on-chain identity to function not just as a digital credential, but as foundational infrastructure for real world access.
2026-03-25 07:40:53
Aerodrome Tokenomics: How ve(3,3) Powers Base's Most Profitable DEX
Beginner

Aerodrome Tokenomics: How ve(3,3) Powers Base's Most Profitable DEX

AERO is the native token of Aerodrome Finance, a core decentralized exchange and liquidity protocol in the Base ecosystem. It is primarily used for liquidity incentives and ecosystem operations. veAERO is a governance NFT that users receive by locking AERO, representing both voting power and the right to share protocol revenue. Through a dual track structure of AERO as a utility token and veAERO as a governance credential, Aerodrome separates liquidity usage value from long term governance power, allowing participants to act as liquidity providers, governance decision makers, and revenue sharers within the same system.
2026-03-25 06:40:31
How Does Kite Work? An In-Depth Look at Kite's Identity and Programmable Permission Architecture
Beginner

How Does Kite Work? An In-Depth Look at Kite's Identity and Programmable Permission Architecture

Kite is an EVM compatible Layer 1 blockchain network that runs on proof of stake. It is designed to give AI agents verifiable identity, programmable permissions, and real time settlement in an on-chain execution environment. In Kite's design, AI is no longer only a tool that follows instructions. It becomes an economic participant with independent on-chain identity and direct control over assets. Within secure and auditable infrastructure, an AI agent can complete payments, call services, and coordinate tasks autonomously, making Kite a foundational layer for the emerging agent economy.
2026-03-25 06:02:34