If a blockchain is a vault, its signature scheme is the lock. Most major chains still rely on locks that a sufficiently capable quantum computer could eventually pick.
If you are reading this article, you likely already know Solana. Similarly, you likely know that Solana’s central pitch is speed, cheapness, and scale. What you may not know is that this pitch begs two important questions:
Can a high-throughput chain ever become quantum secure without breaking the user experience that made it popular?
Furthermore, can it do that before the quantum threat becomes urgent and chaotic?
The answer to the first question is unknown as of now. Even assuming the answer is yes, however, there's also reason to believe that the answer to the second question might still be no. Here's the state of play and why it's already in the process of changing significantly.
Solana is not quantum secure today
Today, Solana is vulnerable to any attacker with a sufficiently sophisticated quantum computer.
On Solana, most accounts use an Ed25519 public key as their address. Solana transactions also rely on signatures, and each signature is 64 bytes in the network’s transaction format. There is also a native on-chain verifier, and Solana documents the Ed25519 program as a runtime component for signature verification.
Those are key details because Ed25519 sits in a category of public-key assumptions that quantum algorithms explicitly target. Shor’s algorithm can break discrete-log and factoring based systems once an adversary can run it at scale, which would require more powerful quantum computers than what exists today. Once such a computer exists (assuming one ever does) it'll open the door to the key-recovery nightmare scenario, wherein an attacker recovers private keys from public keys and then produces signatures the chain accepts as valid.
To guard against this future possibility, the institutional world is responding by standardizing new primitives. NIST published FIPS 203, 204, and 205, and NIST is also encouraging administrators to begin transitioning as soon as possible.
Of course, Solana is not starting from zero; the chain already lives in an environment where signature checks can happen in multiple ways, including runtime checks and explicit on-chain verification for certain patterns. The issue here is that post-quantum signatures can be heavier, and Solana is allergic to anything that slows the machine down.
Solana’s key format is baked into wallet UX and exchange plumbing. A credible migration probably needs staged adoption, wherein new accounts default to post-quantum keys while old accounts get a clear runway, and maybe also some kind of safety net for users who mess up or who don't migrate in time. A practical intermediate step is hybrid signing, where a transaction carries both a classical proof for compatibility and a post-quantum proof for forward safety. That reduces the risk, but it also increases bandwidth and verification work.
Thus if Solana wants to become quantum secure, it needs crypto agility, meaning the ability to swap cryptographic primitives while keeping wallets, exchanges, and on-chain programs working.

Again, this is another place where Solana’s tight compute budget forces discipline around expensive primitives. That constraint becomes even sharper under post-quantum signatures, which can be larger and slower to verify than what most programs expect today. A quantum secure future likely requires new native verifiers or runtime pathways, plus tooling that prevents smart-contract teams from reinventing cryptography under deadline pressure.
To keep the moving parts straight in your mind, it helps to compress them into a table. The table below focuses on chain-specific friction points:
Solana surface | Quantum risk in plain terms | What a good upgrade looks like | Practical blocker to solve |
|---|---|---|---|
Wallet keys and addresses | A future attacker might be able to forge authorization from publicly visible keys | New-default post-quantum keys, plus a guided migration flow for old keys | UX friction, lost keys, and “I’ll do it later” behavior |
On-chain verification | Programs need a safe way to verify modern signatures without rolling their own crypto | Native verification pathways with clear compute pricing and audit trails; hybrid or staged signing during transition | Bandwidth, verification cost, and compatibility with legacy tooling; developer error risk under deadline pressure |
Bridges and oracles | A single compromised signer can cascade into many downstream protocols | Migration plans and audits that cover off-chain signing systems | Fragmented ownership and weak incentives to upgrade early |
Custody and exchange workflows | Institutions will not flip a switch without standards and test vectors | Public test environments, reference implementations, and clear cutover dates | Regulatory caution and long integration cycles |
Wallet keys and addresses
A future attacker might be able to forge authorization from publicly visible keys
New-default post-quantum keys, plus a guided migration flow for old keys
UX friction, lost keys, and “I’ll do it later” behavior
On-chain verification
Programs need a safe way to verify modern signatures without rolling their own crypto
Native verification pathways with clear compute pricing and audit trails; hybrid or staged signing during transition
Bandwidth, verification cost, and compatibility with legacy tooling; developer error risk under deadline pressure
Bridges and oracles
A single compromised signer can cascade into many downstream protocols
Migration plans and audits that cover off-chain signing systems
Fragmented ownership and weak incentives to upgrade early
Custody and exchange workflows
Institutions will not flip a switch without standards and test vectors
Public test environments, reference implementations, and clear cutover dates
Regulatory caution and long integration cycles
As you can see, quantum security is never a pure research problem once assets are on the line. Furthermore, Solana has a lot of assets, and a lot of constraints it'll need to work around to become secure.
The chain has a new ally onboard
The strongest evidence that Solana takes the significant challenge of its post quantum computing security seriously is that it's paying for real assessment work by experts, specifically Project Eleven.
Project Eleven deployed a functioning post-quantum signature system on a Solana testnet recently, and it's continuing to work with the chain to plot out an upgrade path that makes sense. For what it's worth, Project Eleven also recently announced a $20 million Series A funding round, which is a signal that “migration tooling” is becoming a serious category of service within crypto.
Of course, this progress is not the same thing as Solana becoming quantum secure. A testnet prototype proves feasibility, but not adoption. And when it comes to implementing the actual work of making the chain quantum secure, as well as getting users to buy into the new scheme, Solana has a big new obstacle which could ultimately prove to be a stumbling block.
The Pump.fun lawsuit could become the hidden tax on security upgrades
If your chain ecosystem is spending 2026 arguing about whether the chain itself is rigged against retail, it's a brutal backdrop for asking users to perform a complicated key migration in the name of quantum security.
In that vein, Solana Labs and the Solana Foundation, as well as the meme coin launchpad Pump.fun, are now facing a class action lawsuit from retail investors who claim that the defendants were involved in rigging meme coin launches so as to be unfair. Leaked emails suggest that the legal complaint is at least a little substantive. The bigger problem here is that if key Solana organizations are busy hiring expensive lawyers to defend themselves from this lawsuit (or if they lose it, or decide to settle it), there won't be as many resources to go around to fund a transition to post quantum security.
Furthermore, quantum secure migrations require trust, coordination, and effective communication. Litigation headlines create incentives for defensiveness and distraction, which is one more thing that Solana will need to overcome in the near future.
In closing, Solana can plausibly become quantum secure, but only if it treats migration as a core product and protects its engineering focus from ecosystem drama. So if Solana can keep funding serious quantum readiness work, post-quantum signature verification can likely be made performant enough for Solana’s throughput goals.
To keep up with the latest in blockchain technology and quantum computing, join us on X and subscribe to our newsletter.
Sources
Google says its breakthrough Willow quantum chip can’t break modern cryptography
NIST Releases First 3 Finalized Post-Quantum Encryption Standards
Project Eleven to Advance Post-Quantum Security for the Solana Network
Project Eleven Raises $20M to Prepare Digital Asset Infrastructure for the Quantum Era
Solana, Pump.fun Named in Amended RICO Suit Alleging $5.5B Meme Coin Gambling Scheme

