Discussions about quantum computing potentially breaking existing cryptographic systems are once again driving the crypto industry to accelerate the deployment of protective measures. As the concept of "Q-Day" gains momentum, blockchain development teams, research institutions, and standards organizations are speeding up preparations for quantum-resistant migration, with a focus on wallets, validation nodes, exchanges, cross-chain bridges, and custodial institutions.
Solana begins testing a new signing tool
The Solana ecosystem's validator clients, Anza and Firedancer, have begun testing the Falcon signature scheme. This is a digital signature tool designed for quantum-resistant scenarios, aiming to provide an alternative pathway for the network should existing public-key cryptography become obsolete.
The related team stated that this toolset can be enabled as needed and is not expected to impose a significant burden on network performance. Jump Crypto noted that Falcon-512 signatures are smaller than those of some already selected post-quantum standards, helping to control storage usage and minimize impact on network speed.
NEAR focuses on asset ownership disputes
Unlike Solana, which focuses more on network defense, the NEAR research team highlights asset ownership as the key risk. Near One believes that quantum attacks could not only expose private keys but also trigger disputes over “who is the true owner” after stolen funds are quickly transferred on-chain.
Near One’s Chief Technology Officer, Anton Astafiev, stated that once attackers exploit quantum capabilities to forge valid transactions, the network may struggle to determine, based solely on on-chain records, whether a transfer originated from the legitimate holder or the attacker. The team plans to launch a testnet solution based on FIPS-204 quantum-resistant signatures by the end of the second quarter of 2026.
NIST has urged an earlier migration.
The National Institute of Standards and Technology (NIST) has released three post-quantum cryptographic standards and recommends that relevant organizations initiate migration as soon as possible. NIST assesses that currently widely used cryptographic algorithms may face future risks of being broken by quantum computing, and therefore, action should not be delayed until the threat materializes.
NIST also recommends that all types of organizations first inventory systems still using vulnerable algorithms before developing upgrade plans. For the crypto industry, this means wallets, validation nodes, exchanges, cross-chain bridges, and custodial services all need to prepare longer-term replacement strategies.
The risk has not yet materialized, but preparations have already begun.
Quantum computers capable of breaking major encryption systems at scale do not yet exist, but industry concerns have shifted from theoretical discussions to engineering preparedness. A frequently cited risk is “harvest now, decrypt later,” in which attackers store data that cannot currently be decrypted and wait until future quantum capabilities mature to break it.
This is also why multiple blockchains are conducting pre-emptive tests of quantum-resistant solutions. For blockchain networks, quantum risks affect not only the security of wallet private keys but also transaction validity, asset ownership verification, and the continuous operation of the entire on-chain system.


