By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
bitcoin
Bitcoin (BTC) $ 87,863.00
ethereum
Ethereum (ETH) $ 2,932.94
xrp
XRP (XRP) $ 1.89
tether
Tether (USDT) $ 0.998809
solana
Solana (SOL) $ 124.35
bnb
BNB (BNB) $ 884.15
usd-coin
USDC (USDC) $ 0.999621
dogecoin
Dogecoin (DOGE) $ 0.122441
cardano
Cardano (ADA) $ 0.350636
staked-ether
Lido Staked Ether (STETH) $ 2,933.38
tron
TRON (TRX) $ 0.293454
chainlink
Chainlink (LINK) $ 11.96
avalanche-2
Avalanche (AVAX) $ 11.68
wrapped-bitcoin
Wrapped Bitcoin (WBTC) $ 87,597.00
wrapped-steth
Wrapped stETH (WSTETH) $ 3,592.52
the-open-network
Toncoin (TON) $ 1.52
stellar
Stellar (XLM) $ 0.206024
hedera-hashgraph
Hedera (HBAR) $ 0.106242
sui
Sui (SUI) $ 1.44
shiba-inu
Shiba Inu (SHIB) $ 0.000008
weth
WETH (WETH) $ 2,932.74
leo-token
LEO Token (LEO) $ 9.26
polkadot
Polkadot (DOT) $ 1.85
litecoin
Litecoin (LTC) $ 69.74
bitget-token
Bitget Token (BGB) $ 3.57
bitcoin-cash
Bitcoin Cash (BCH) $ 587.58
hyperliquid
Hyperliquid (HYPE) $ 27.96
usds
USDS (USDS) $ 0.999681
uniswap
Uniswap (UNI) $ 4.68
cryptoprune cryptoprune
  • MarketCap
  • Crypto Bubbles
  • Multi Currency
  • Evaluation
  • Home
  • News
  • Crypto
    • Altcoins
    • Bitcoin
    • Blockchain
    • Cardano
    • Ethereum
    • NFT
    • Solana
  • Market
  • Mining
  • Exchange
  • Regulation
  • Metaverse
Crypto PruneCrypto Prune
  • Home
  • News
  • Crypto
    • Altcoins
    • Bitcoin
    • Blockchain
    • Cardano
    • Ethereum
    • NFT
    • Solana
  • Market
  • Mining
  • Exchange
  • Regulation
  • Metaverse

Search

  • Home
  • News
  • Crypto
    • Altcoins
    • Bitcoin
    • Blockchain
    • Cardano
    • Ethereum
    • NFT
    • Solana
  • Market
  • Mining
  • Exchange
  • Regulation
  • Metaverse

Latest Stories

image
Metalpha-linked addresses withdraw $24.85 million ETH from the exchange, signaling a strategic shift in digital asset custody
Ethereum’s huge fee shock: New post-quantum signatures are 40x larger and threaten to crush network throughput and user costs
Ethereum’s huge fee shock: New post-quantum signatures are 40x larger and threaten to crush network throughput and user costs
image
Bitcoin miner Cango receives ‘significantly undervalued’ rating after securing $10.5 million in EWCL funding
Russia declares Ukrainian Bitcoin exchange 'undesirable'
Russia declares Ukrainian Bitcoin exchange ‘undesirable’
image
Wallet Connect launches Pay, emphasizing that payments are the “final frontier” of cryptocurrencies
© 2025 All Rights reserved | Powered by Crypto Prune
Crypto Prune > News > Crypto > Ethereum > Ethereum’s huge fee shock: New post-quantum signatures are 40x larger and threaten to crush network throughput and user costs
Ethereum

Ethereum’s huge fee shock: New post-quantum signatures are 40x larger and threaten to crush network throughput and user costs

1 hour ago 16 Min Read

Ethereum pushed post-quantum cryptography to a top strategic priority this month, forming a dedicated PQ team led by Thomas Collager and announcing a $1 million prize to power its hash-based primitives.

The announcement came a day before A16Z Crypto unveiled its roadmap, arguing that quantum threats are often overstated and that premature transitions risk trading known security for speculative protection.

Both positions are defensible, and the obvious tension reveals where the real fight lies.

The Ethereum Foundation’s announcement positions PQ Security as an inflection point. Multi-client consensus development net goes live every two weeks. An all-core developer meeting to coordinate precompilation and account abstraction passes begins next month. A comprehensive roadmap promises “zero money loss and zero downtime” during the multi-year transition.

On January 21, Coinbase launched an independent quantum advisory board that includes Ethereum researcher Justin Drake, signaling industry collaboration around long-term planning.

Solana conducted a PQ signing experiment on the testnet in December under Project Eleven, explicitly branding the work as “proactive” rather than emergency response.

Related books

Solana co-founder insists on the need for Bitcoin to adopt quantum resistance for future security

Yakovenko praised Bitcoin’s decentralized nature and proof-of-work system, but warned that quantum computing poses threats.

September 19, 2025 · Oluwaperumi Adejumo

Polkadot’s JAM proposal outlines the implementation of ML-DSA and Falcon, along with SNARK-based migration proofs.

The conservative BIP-360 proposal for payments to quantum-resistant hashes of Bitcoin represents an incremental first step constrained by governance realities.

This pattern is similar to an arms race, but it is not driven by an immediate threat.

This is a competition for organizational readiness, with winners upgrading their crypto infrastructure while maintaining fee economics, consensus efficiency, and wallet UX before external pressures force adjustments.

harvest paradox

A16z’s central argument revolves around distinguishing between “harvest-now-de-encrypt-later” risks and signature vulnerabilities. HNDL attacks become important if an attacker can intercept currently encrypted data and decrypt it once quantum computers reach sufficient scale.

This threat clearly maps to TLS, VPN, and data-at-rest encryption. Blockchain signatures authenticate transactions in real-time and leave no encrypted payload to store for future cracking.

Ethereum’s response tacitly accepts this framework, but argues that operational urgency remains high, as changes to signature schemes affect everything from wallets, account formats, hardware signers, custody infrastructure, menpools, fee markets, consensus messages, and L2 proof of payment.

The transition requires years of lead time, not because quantum computing is imminent, but because the engineering scope is vast and the failure modes are catastrophic.

NIST completed its first post-quantum standards, FIPS 203, 204, and 205, in 2024 and selected HQC as the backup key encapsulation mechanism while advancing Falcon and FN-DSA to draft stage.

The EU published a harmonized PQC transition roadmap in June 2025. These developments reduce the question, “Which algorithm should I use?” Eliminate uncertainty and make your transition plan concrete, even if cryptography-related quantum computing is still a long way off.

Although Citi’s January 2026 report cited a range of possible widespread breaches of public-key cryptography by 2034 to 2044, many experts see a very low chance of CRQC occurring in the 2020s.

See also  Bitmine Immersion aims to bet 5% of Ethereum supply as its holdings exceed $2 billion
quantum probability
According to Calsi data, 50% of respondents expect the first practical quantum computer to arrive by 2035, and 59% expect it to arrive by 2030.

Timeline ambiguity does not eliminate the obligation to plan, but it amplifies it because chains that wait until threat signals are clear will face timeline compression and coordination disruption.

Characteristic expansion as a base layer bottleneck

The immediate technical challenge is the size of the signature.

ECDSA signatures consume approximately 65 bytes. This equates to approximately 1,040 gas at 16 gas per non-zero byte in Ethereum’s call data pricing model.

ML-DSA candidates generate signatures in the 2-3 KB range, and the dilithium variant is likely to be widely adopted. A 2,420-byte signature consumes approximately 38,720 gas just for signature bytes. Compared to ECDSA, Delta is 37,680 gas.

This overhead is significant enough to impact throughput and pricing unless the chain compresses or aggregates signatures at the protocol level.

This is where Ethereum’s bet on hash-based cryptography and the $1 million Poseidon Prize becomes strategic. Hash-based signatures avoid the algebraic structures utilized by quantum algorithms, and hash functions integrate naturally with zero-knowledge proof systems.

If Ethereum can operationalize STARK-based signature aggregation, it could maintain fee economics while upgrading its security assumptions. The challenge is that a practical post-quantum analog to BLS aggregation does not yet exist, and zk-based aggregation introduces real performance constraints.

Consensus efficiency depends on this issue.

Currently, Ethereum’s consensus layer relies heavily on BLS signature aggregation. Validators sign certificates and synchronize committee messages, and the protocol aggregates thousands of signatures into compact proofs.

Losing that ability without a replacement would force a dramatic change in the economics and vitality assumptions of consensus participation.

EF’s public emphasis on interop calls to orchestrate a “lean” crypto foundation and multi-client PQ Devnet suggests that the organization understands that aggregation is a hidden cliff.

signature schemeSignature size (bytes)Calldata gas @ 16 gases / non-zero bytesDelta vs ECDSA (Gas)implication
ECDSA (secp256k1, r||s||v)651,0400today’s baseline
ML-DSA-442,42038,720+37,680Price + throughput shock
ML-DSA-653,30952,944+51,904Aggregation becomes necessary
ML-DSA-874,62774,032+72,992L1 scaling pressure spike
Related books

Vitalik proposes “Lean Ethereum” for quantum security and simpler validator operations

The concept already has four research tracks under consideration that are related to existing efforts in the Ethereum ecosystem.

June 12, 2025 · gino matos

Wallet UX as the social layer of cryptography

Protocol support alone is not enough to complete a migration.

Ethereum’s current design does not allow externally owned accounts to cleanly rotate keys. Users require a one-click migration flow that doesn’t require deep technical knowledge. Hardware wallets need to distribute firmware updates. Administrators need secure bulk migration tools.

Ethereum researchers have been exploring proof systems and seed-based migration approaches suitable for key recovery to precisely reduce reconciliation risk and UX friction.

a16z warns that premature migration will result in vulnerabilities such as immature implementations, changes in standards after deployment, and bugs in new cryptographic libraries.

The organization argues that current security issues such as governance failures and software bugs pose greater immediate risks than quantum computers.

cryptoprune Daily Brief

See also  Ethereum (Eth) is seeing a massive bounce from "strong support blocks."

There is a signal every day and no noise.

Get the market-moving headlines and context all at once, every morning.

5 minute digest 100,000+ readers

free. No spam. Unsubscribe at any time.

Oops, looks like there’s a problem. Please try again.

Subscribed. welcome.

This is the core of the “Don’t Panic” framework. Moving too soon trades known security for speculative security, and the cost of getting it wrong can be higher than the cost of waiting for standards to mature and better tools.

Both positions are defensible because they are optimized for different failure modes. EF prioritizes avoiding hasty adjustments under pressure.

a16z prioritizes avoiding self-harm through hasty deployment. This difference reveals the real battlefield. Chains that thread the needle by building migration infrastructure early, without prematurely imposing immature standards on users, gain a competitive advantage.

Related books

Bitcoin’s ‘quantum’ death sentence is causing a rift on Wall Street, but the fix is ​​already hidden in the code

The threat of quantum computing is calling into question Bitcoin’s status as “digital gold” and prompting a shift in strategy.

January 16, 2026 · Oluwaperumi Adejumo

3 scenarios, different winners

The timeline for the transition depends on external breakthroughs that no one can control.

In a slow-burn scenario, where CRQC does not reach until the 2040s, the transition occurs at the pace of regulations and standards, prioritizing safety over speed. Chains invested in the agility of cryptocurrencies with dual signature periods, hybrid schemes, and extremely difficult strategies can adapt without interruption.

In the base case of a material quantum threat emerging in the mid-2030s, our efforts today will determine the outcome. If the ecosystem wants a smooth transition by 2035, wallet tools and aggregation research will need to be production-ready years in advance.

This is the scenario that EF’s roadmap optimizes for, and where a multi-year lead time justifies the current investment.

In rapid shock scenarios where breakthroughs suggest a credible risk before 2030, the differentiator will be how quickly chains can freeze exposures, migrate accounts, and maintain viability. Although a16z maintains that this outcome is unlikely to occur, the organization’s emphasis on planning suggests that preparation is justified even for low-probability tail risks.

Notable triggers include reliable demonstration of error-corrected scaling, logic qubit stability, and sustained gate fidelity. NIST or a major government has accelerated the transition deadline and major administrators are shipping PQ-ready signatures into production.

None of these are urgent, but they all compress the decision-making timeline.

battlefield layerwhy is it importantWhat are push signals in EF?a16z “Don’t panic” counterpointKPIs to watch
Planning and encryption agilityThe transition is a multi-year program. Failure mode is hasty adjustment under pressureDedicated PQ Team + Governance Cadence (PQ ACD) = Treat migration as a protocol program rather than a research threadPremature shifts increase Risks (immature libraries, changing standards, new bugs)existence of published Chain roadmap + clear “break the glass” plan + gradual deployment milestones
Wallet UX and account migrationUsers will not migrate unless there is little friction. EOA is a long tailAccount Abstraction Path + “Zero Downtime/Zero Loss” Messaging Focus = UX FocusAvoid forcing new schemes on users too early. UX failure is a self-inflicted lossPercentage of supported wallets/custodians Dual sign/key rotation It flows. Migration time for non-technical users
Aggregation and fee economicsPQ sig can be large. Without aggregation, throughput decreases and prices increaseLeanVM + hash/ZK foundation + devnet is a bet implied. Protocol level compressionEven the “correct” PQ may become unusable if it makes it uneconomical. Don’t trade ease of use for theoretical safetyproven Signature aggregation Performance (proof size/verification time) and resulting cost per transmission/proof
Consensus efficiency and validator overheadCurrently, Ethereum consensus relies on aggregation. Losing it threatens lives and the economy.Multi-client PQ consensus devnet + interop calls = not just wallets, but treat consensus as the hard partNew consensus cryptography is high-risk engineering. Conservative deployment trumps hasty redesignmeasured Bandwidth/CPU overhead per validator Against today. Certificate inclusion rate under load
Interoperability and standards maturityStandards alleviate the question, “Which algorithm?” Uncertainty. Ecosystem converges on safer choicesPrizes + Workshops + External Collaboration (Advisory Board) = Ecosystem AlignmentWait until standards/implementations mature before forcing large-scale migrationsNIST/EU Milestone Coordination. Ships PQ support in major libraries/HW wallets without significant CVEs
See also  Ethereum Price Refuses to Fall After Auction Failure, Possible Bullish Reversal to $4,000?

new status game

Post-quantum readiness is following the same path that L2 maturity followed in previous cycles, becoming an indicator of institutional trustworthiness.

Chains without a reliable PQ roadmap risk being deemed unprepared for long-term settlement guarantees, even if the immediate threat is far away.

This dynamic explains why Solana, Polkadot, and Bitcoin all have active PQ workstreams despite the lack of an imminent Q-day consensus.

The arms race is not about who returns the PQ first. Instead, it’s about who maintains UX, fee economics, and consensus efficiency in doing so.

Ethereum’s approach bets on hash-based infrastructure, ZK aggregation, and governance alignment.

Solana’s high-throughput architecture makes signature overhead particularly acute and requires design innovation.

Polkadot’s heterogeneous sharding model enables chain-by-chain experimentation.

Bitcoin’s conservatism reflects governance constraints and a long tail of legacy outputs that cannot be migrated without the cooperation of owners.

Related books

Bitcoin encryption is not at risk from quantum computers for one simple reason. That’s because Bitcoin encryption doesn’t actually exist.

There are no secret messages on the blockchain to decrypt. The real threat is Shor’s algorithm, which forges the signature of the key you’ve already published.

December 19, 2025 · Liam Akiva Wright

If PQ becomes the next L1 arms race, the winner will not be the chain that announces the most prizes or development nets. This provides a migration path for regular users to actually complete, maintains throughput despite multi-KB signature candidates, and becomes a chain that replaces today’s aggregation assumptions without sacrificing uptime.

The planning layer, the wallet UX layer, and the aggregation layer are now the real battlegrounds, and the clock started years before most participants realized the race had begun.

mentioned in this article
TAGGED:CoinsCryptoEthereum AnalysisEthereum News
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RELATED NEWS

Ethereum

The Ethereum Foundation is setting ambitious goals for the next 10 years with its new blog

By Crypto Prune 6 months ago
Bitcoin

Bitcoin tests are low ranges after clearing local liquidity

By Crypto Prune 6 months ago
ethereum

Ethereum ETF inflows reach $296.6 million in 24 hours, overtaking Bitcoin products

By Crypto Prune 6 months ago
The US Bitcoin Edge can drive the next era of America's prosperity - River

The US Bitcoin Edge can drive the next era of America’s prosperity – River

By Crypto Prune 8 months ago
cryptoprune

© 2025 All Rights reserved | Powered by Crypto Prune

  • Altcoins
  • Bitcoin
  • Blockchain
  • Cardano
  • Ethereum
  • Exchange
  • Market
  • Metaverse
  • Mining
  • News
  • Crypto
  • NFT
  • Solana
  • Regulation
  • Technology
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?