Quantum Threats to EVM Chains: Can They Be Secured?

EVM's strength is also its quantum risk. PQC standards are here; the migration hinges on account abstraction, precompiles, and chain-by-chain fee choices.

Futuristic cyberpunk Ethereum symbol struck by quantum lightning in a digital cityscape, representing quantum threats to EVM blockchains and crypto security.

Date

Oct 30, 2025

Author

Quantum Canary Staff

0 min read
0

The uncomfortable truth about quantum computing-based threats to the Ethereum Virtual Machine (EVM) is that the same network effects that made Ethereum's ecosystem powerful also concentrate its cryptographic risk. 

EVMs define how smart contracts execute and how wallets sign, but most rely on elliptic curve cryptography (ECC) signatures which share the same single point of failure. Viable post-quantum algorithms exist, but turning them into production standards across many heterogeneous chains is where the engineering pain lives.

This matters now because official standards for post-quantum cryptography (PQC) are here already. NIST has now approved three Federal Information Processing Standards that define ML-DSA for signatures, ML-KEM for key establishment, and SLH-DSA as a conservative backup. As a result, large operators have begun hardening their systems with post-quantum encrypted tunnels to mitigate harvest-now-decrypt-later risks, and have even shipped a WARP client that wraps traffic in PQ tunnels

The question for investors is not if migration happens, but how cleanly it'll occur and who pays the fee. So let's dive in and take a closer look at quantum threats to EVM, and understand where it's best to position your assets and why. 

EVM Interoperability Is A Strength, But Also a Risk

To ground the discussion, here's an overview of the largest EVM chains:

Chain

EVM status

Defining trait

Ethereum

EVM native

Consensus uses BLS12-381 for validator signatures

Polygon PoS

EVM-compatible environment

Pushes EVM-equivalence on zkEVM

Arbitrum One

Ethereum-compatible rollup

Stylus adds Rust and Wasm

Optimism

EVM-equivalent OP Stack chains

Superchain interop for app builders

Base

EVM-compatible L2 from Coinbase

Smart-wallet-ready architecture

BNB Chain

EVM-compatible L1

PoSA validators and low fees

Avalanche C-Chain

EVM-compatible chain

C-Chain runs the EVM for Solidity dapps

Before diving into fixes, we need to level-set about why the EVM is so important to the entire crypto sector's smooth functioning. 

The Ethereum Virtual Machine is the execution layer for Ethereum and a broad family of other chains, which lets developers deploy Solidity smart contracts and reuse their software tools and know-how across blockchain ecosystems. There's also an important distinction between EVM-compatibility and EVM-equivalence to be aware of.

When developers talk about Ethereum Virtual Machine (EVM) compatibility, they mean a chain can run code written for Ethereum, but sometimes with small adjustments required. That might include rewriting certain functions, tweaking gas assumptions, or updating developer tooling. It’s "close enough" to Ethereum that most applications can port over, but it isn't always a zero-effort process.

EVM equivalence takes things further. An "EVM-equivalent" chain is designed to behave identically to Ethereum at the code level, so developers can copy-and-paste their Ethereum smart contracts and infrastructure without any changes. Because the execution environment is indistinguishable from Ethereum's, all the same developer tools (debuggers, libraries, wallets, etc.) work seamlessly.

For instance, the BNB Smart Chain (BSC) advertises full EVM compatibility, while OP Stack chains like Optimism describe themselves as EVM equivalent to minimize migration friction. Separately, Arbitrum positions EVM compatibility while enabling new modes like Stylus, which adds Rust and WASM alongside EVM. Meanwhile, Coinbase's Base documents its RPC and chain IDs for connecting to Base, and Avalanche clarifies that its Contract Chain runs the EVM, resulting in several implementations to keep track of. 

Interoperability and tooling reuse are the general upside for the chains that use EVM. The shared reliance on the same signature primitives is the down-side, because today's EVM wallets standardize on ECDSA over secp256k1, which is efficient but not quantum safe. 

Infographic showing major EVM chains including Ethereum, Polygon PoS, Arbitrum One, Optimism, Base, BNB Chain, and Avalanche C-Chain by Quantum Canary.

The table highlights the investor's dilemma; EVM compatibility keeps developer velocity high, and grants access to the single largest population of developers in crypto, but it also concentrates cryptographic assumptions across many markets, and implies a dangerously high degree of correlation in asset pricing to the downside in the event of a major quantum hack.

Quantum Threats to EVM Breaks Today's Cryptography

The mechanism of failure in EVM in the face of a quantum computing threat is well-trodden territory

In short, Shor's algorithm can solve discrete logarithms efficiently, which undermines both ECDSA and BLS signatures that secure transactions and validator attestations. Ethereum's beacon chain, for example, aggregates validator signatures using BLS12-381 for scale. By contrast, Grover's algorithm offers only a quadratic speedup against hashes, which effectively halves symmetric key strength; the practical mitigation is bigger symmetric parameters rather than a wholesale change in primitives.

This creates two distinct risk pathways. 

  1. Signatures are the immediate problem for EVM chains because signature forgery becomes tractable once hardware exists at scale. That hardware might not exist for a while, but it's still a significant overhang from an investment risk perspective. 

  2. Public keys that are already on-chain are sitting ducks for harvest-now-crack-later adversaries. Keys become vulnerable once the public key is revealed on spend, giving attackers an indefinite runway to collect and later exploit historical data.

Two practical takeaways follow from the cryptography issues here. Signatures are the primary fire to fight on EVM chains, while symmetric primitives survive with parameter bumps. The bandwidth and fee pain lands with signatures and keys, not with hashes.

Quantum Threats to EVM Collide With Client Design

The good news is that standards are available to smooth the threat mitigation process. 

NIST formally approved ML-DSA for signatures, ML-KEM for key establishment, and SLH-DSA as a backup. These are the anchors most industries should and eventually will adopt. The challenge inside the EVM is thus operational and immediate.

Signature size is a key concern. A typical ECDSA signature is roughly 64–65 bytes, while a level-2 ML-DSA signature is about 2,420 bytes with a 1,312-byte public key. Under Ethereum's current rules, each non-zero calldata byte costs 16 gas, so signature payloads that are tens of times larger translate into real fee increases, block propagation overhead, and mempool changes. You can mitigate some of this with aggregation or contract-level verifiers, but those add their own verification costs and UX complexity.

Then there is verification itself. EVM precompiles and opcodes assume specific math paths, so rolling in ML-DSA or SLH-DSA likely requires new precompiles or highly optimized in-EVM verifiers. Client teams must implement these consistently or risk version skew that can lead to forks or consensus failures

L2s have parallel concerns. A rollup's sequencer or fraud-proof system would need to validate PQC inside proofs or add precompiles to keep PQ verification from becoming a throughput bottleneck. This additional burden will likely interfere somehow with the scaling benefits that L2s are touted for, and it's presently unclear how much that interference will change or diminish the value proposition for using them, if it does at all. 

Before getting more granular, it helps to keep two main points at the top of mind: 

  • PQC signature sizes are materially larger than ECDSA, which increases calldata and fees under current gas pricing.

  • Verification needs efficient precompiles or optimized contracts, otherwise signature checks become cost and latency hotspots.

These are both very solvable issues, but not with a casual or improvisational effort.

Account Abstraction Makes PQ Wallets Practical

One reason EVM's benefits still outweigh the risks substantially is that wallets can adopt PQ signatures before the base protocol does.

Ethereum's ERC-4337 enables account abstraction without protocol changes by sending user operations to an entry point contract where smart accounts define their own signature checks. That means wallets can adopt ML-DSA or SLH-DSA at the account level, aggregate signatures in custom ways, and use paymasters to offset fee bloat.

Newer proposals go even further. 

The upshot is that wallets, custodians, and dApps can start migrating users to PQ accounts without waiting for a precompile, then converge on standardized verifiers when clients land them.

A reasonable skeptic might ask whether this just shifts costs to end users; it does, somewhat, but it also accelerates learning and avoids a single, risky L1 cutover. In a world where attackers can already scrape public keys, reducing ECDSA reuse through account abstraction is progress.

Expect Hybrid Solutions

Ideally, Ethereum would ship a shared PQC standard via an upgrade, clients would add precompiles, and all EVM chains would follow in lockstep. That would minimize fragmentation, stabilize gas economics, and anchor toolchains to one set of cryptographic assumptions. Given NIST's position on ML-DSA and SLH-DSA, a coordinated path is feasible on paper.

In practice, differences across chains will matter, and there is practically zero chance that multiple EVM chains will coordinate their PQC mitigations. That'll end up breaking some assumptions held by EVM developers as well as investors, as their default expectations are likely that there will be (approximately) uniformity across the back end. It's difficult enough to get the developer community of individual chains to agree on doing anything, nevermind doing cross-chain diplomacy and planning.  

Take a closer look at the practical barriers to one-size-fits-all solutions. 

  • OP Stack chains levy L1 data fees and run a slightly different mempool model than mainnet. 

  • Arbitrum's roadmap includes performance features like Stylus for Rust and Wasm, which complicates uniform verification paths. 

  • Polygon is pressing EVM-equivalence on zkEVM.

  • BNB Chain and Avalanche C-Chain tune block gas, validator policies, and fee markets differently via their EVM-compatible stacks and C-Chain design.

There are also fresh EVM-compatible designs that change assumptions at the edges. Circle's Arc network is positioned as an EVM-compatible Layer-1 with deterministic sub-second settlement powered by the Malachite consensus engine. That design choice implies different gas and fee dynamics for signature sizes and verification latency than probabilistic chains. There's simply no way to square all of these circles at the same time. 

Therefore, investors should expect a hybrid outcome. Common algorithms and libraries will continue to be shared across the EVM world, coupled with chain-specific tuning of fees, precompiles, and client schedules during the PQC mitigation process. That may create a temporary patchwork that's irritating to developers, but it also limits systemic risk if one path underperforms.

Where This Leaves Investors And Developers

So, can EVM chains be secured against quantum risk? Yes, but not with a single clean patch. Don't hold your breath on it being cheap, easy-to-implement, or happening anytime soon. 

The prudent plan is to adopt shared PQC standards where possible, lean on account abstraction for wallet-level transitions, and allow chain-specific tweaks to fee markets and verification paths. That still leaves difficult governance choices and some operational debt. 

There's one final tidbit to keep track of; hardware timelines are uncertain, but policy and vendor moves suggest you do not want to be the last EVM chain migrating off ECDSA. 

The quiet risk is not a sudden five-alarm fire event, it's a long tail of exposed addresses and contracts that never rotate. Quantum threats to EVM deserve attention precisely because the ecosystem's strengths can slow the very coordination it now needs.

To keep up with the latest in blockchain technology and quantum computing, join us on X and .

Sources:

Christopher Smith's close up photo
Editor-in-Chief
Christopher Smith

Serial Entrepreneur, Hacker, Engineer, Musician.
With a rich career in AI leadership, blockchain innovation, and quantum technology, Chris brings a unique blend of technical mastery and philosophical insight. He continues to push the boundaries of what's possible, driven by a belief that technology, wielded thoughtfully, can redefine humanity's future for the better.

Related Insights

quantum canary's logo

Sponsored by: