Is Solana Ever Going to Become Quantum Secure?

Solana is not quantum secure today. The real story is whether it can execute a migration before the threat window tightens.

Neon SOLANA text in cyberpunk city with lightning and digital structures symbolizing blockchain technology and quantum computing risk.

Date

Mar 17, 2026

0 min read
0

If a blockchain is a vault, its signature scheme is the lock. Most major chains still rely on locks that a sufficiently capable quantum computer could eventually pick. 

If you are reading this article, you likely already know Solana. Similarly, you likely know that Solana’s central pitch is speed, cheapness, and scale. What you may not know is that this pitch begs two important questions: 

  1. Can a high-throughput chain ever become quantum secure without breaking the user experience that made it popular? 

  2. Furthermore, can it do that before the quantum threat becomes urgent and chaotic?

The answer to the first question is unknown as of now. Even assuming the answer is yes, however, there's also reason to believe that the answer to the second question might still be no. Here's the state of play and why it's already in the process of changing significantly. 

Solana is not quantum secure today

Today, Solana is vulnerable to any attacker with a sufficiently sophisticated quantum computer. 

On Solana, most accounts use an Ed25519 public key as their address. Solana transactions also rely on signatures, and each signature is 64 bytes in the network’s transaction format. There is also a native on-chain verifier, and Solana documents the Ed25519 program as a runtime component for signature verification.

Those are key details because Ed25519 sits in a category of public-key assumptions that quantum algorithms explicitly target. Shor’s algorithm can break discrete-log and factoring based systems once an adversary can run it at scale, which would require more powerful quantum computers than what exists today. Once such a computer exists (assuming one ever does) it'll open the door to the key-recovery nightmare scenario, wherein an attacker recovers private keys from public keys and then produces signatures the chain accepts as valid.

To guard against this future possibility, the institutional world is responding by standardizing new primitives. NIST published FIPS 203, 204, and 205, and NIST is also encouraging administrators to begin transitioning as soon as possible.

Of course, Solana is not starting from zero; the chain already lives in an environment where signature checks can happen in multiple ways, including runtime checks and explicit on-chain verification for certain patterns. The issue here is that post-quantum signatures can be heavier, and Solana is allergic to anything that slows the machine down.

Solana’s key format is baked into wallet UX and exchange plumbing. A credible migration probably needs staged adoption, wherein new accounts default to post-quantum keys while old accounts get a clear runway, and maybe also some kind of safety net for users who mess up or who don't migrate in time. A practical intermediate step is hybrid signing, where a transaction carries both a classical proof for compatibility and a post-quantum proof for forward safety. That reduces the risk, but it also increases bandwidth and verification work.

Thus if Solana wants to become quantum secure, it needs crypto agility, meaning the ability to swap cryptographic primitives while keeping wallets, exchanges, and on-chain programs working.

Crypto agility diagram showing validator computer budget pressure pointing toward cryptographic agility as the solution for post-quantum security.

Again, this is another place where Solana’s tight compute budget forces discipline around expensive primitives. That constraint becomes even sharper under post-quantum signatures, which can be larger and slower to verify than what most programs expect today. A quantum secure future likely requires new native verifiers or runtime pathways, plus tooling that prevents smart-contract teams from reinventing cryptography under deadline pressure.

To keep the moving parts straight in your mind, it helps to compress them into a table. The table below focuses on chain-specific friction points:

Wallet keys and addresses

Quantum risk in plain terms

A future attacker might be able to forge authorization from publicly visible keys

What a good upgrade looks like

New-default post-quantum keys, plus a guided migration flow for old keys

Practical blocker to solve

UX friction, lost keys, and “I’ll do it later” behavior

On-chain verification

Quantum risk in plain terms

Programs need a safe way to verify modern signatures without rolling their own crypto

What a good upgrade looks like

Native verification pathways with clear compute pricing and audit trails; hybrid or staged signing during transition

Practical blocker to solve

Bandwidth, verification cost, and compatibility with legacy tooling; developer error risk under deadline pressure

Bridges and oracles

Quantum risk in plain terms

A single compromised signer can cascade into many downstream protocols

What a good upgrade looks like

Migration plans and audits that cover off-chain signing systems

Practical blocker to solve

Fragmented ownership and weak incentives to upgrade early

Custody and exchange workflows

Quantum risk in plain terms

Institutions will not flip a switch without standards and test vectors

What a good upgrade looks like

Public test environments, reference implementations, and clear cutover dates

Practical blocker to solve

Regulatory caution and long integration cycles

As you can see, quantum security is never a pure research problem once assets are on the line. Furthermore,  Solana has a lot of assets, and a lot of constraints it'll need to work around to become secure. 

The chain has a new ally onboard

The strongest evidence that Solana takes the significant challenge of its post quantum computing security seriously is that it's paying for real assessment work by experts, specifically Project Eleven

Project Eleven deployed a functioning post-quantum signature system on a Solana testnet recently, and it's continuing to work with the chain to plot out an upgrade path that makes sense. For what it's worth, Project Eleven also recently announced a $20 million Series A funding round, which is a signal that “migration tooling” is becoming a serious category of service within crypto.

Of course, this progress is not the same thing as Solana becoming quantum secure. A testnet prototype proves feasibility, but not adoption. And when it comes to implementing the actual work of making the chain quantum secure, as well as getting users to buy into the new scheme, Solana has a big new obstacle which could ultimately prove to be a stumbling block. 

The Pump.fun lawsuit could become the hidden tax on security upgrades

If your chain ecosystem is spending 2026 arguing about whether the chain itself is rigged against retail, it's a brutal backdrop for asking users to perform a complicated key migration in the name of quantum security.

In that vein, Solana Labs and the Solana Foundation, as well as the meme coin launchpad Pump.fun, are now facing a class action lawsuit from retail investors who claim that the defendants were involved in rigging meme coin launches so as to be unfair. Leaked emails suggest that the legal complaint is at least a little substantive. The bigger problem here is that if key Solana organizations are busy hiring expensive lawyers to defend themselves from this lawsuit (or if they lose it, or decide to settle it), there won't be as many resources to go around to fund a transition to post quantum security. 

Furthermore, quantum secure migrations require trust, coordination, and effective communication. Litigation headlines create incentives for defensiveness and distraction, which is one more thing that Solana will need to overcome in the near future.

In closing, Solana can plausibly become quantum secure, but only if it treats migration as a core product and protects its engineering focus from ecosystem drama. So if Solana can keep funding serious quantum readiness work, post-quantum signature verification can likely be made performant enough for Solana’s throughput goals.

To keep up with the latest in blockchain technology and quantum computing, join us on X and .

Sources

Christopher Smith's close up photo
Editor-in-Chief
Christopher Smith

Serial Entrepreneur, Hacker, Engineer, Musician.
With a rich career in AI leadership, blockchain innovation, and quantum technology, Chris brings a unique blend of technical mastery and philosophical insight. He continues to push the boundaries of what's possible, driven by a belief that technology, wielded thoughtfully, can redefine humanity's future for the better.

Related Insights

quantum canary's logo

Sponsored by: