Everyone talks about quantum computing as an existential risk to blockchain. Few ask the right question: what should we be doing now? The reality is the threat is already here: vast amounts of encrypted data are being harvested today, ready to be decrypted once the hardware catches up.
The surprise is that blockchains don’t need quantum computers to be quantum-safe. Classical math already gives us the tools. Post-quantum cryptography (PQC) schemes have existed for decades but many were dismissed as impractical. Now, new approaches like Random Linear Network Coding (RLNC) are changing that equation.
What’s at Stake
A very real strategy called harvest now, decrypt later is already in play. Sophisticated actors, including nation-states, are quietly collecting encrypted data with the sole intention of unlocking it once quantum computing matures. Because organizations are legally required to store identity logs, records, and sensitive data for years, that data remains vulnerable to future decryption.
Blockchains are uniquely exposed. Unlike ephemeral messaging, blockchains permanently secure money, identity, contracts, and governance. Without proactive defenses now, we risk leaving the very foundation of decentralized finance and governance open to tomorrow’s quantum-powered attacks.
If blockchains are to serve as the backbone of finance, governance, and identity, they must be designed for the quantum decade, not with exotic hardware, but with better math.
A Shift in Cryptography
Traditional cryptography, like RSA, relies on the difficulty of factoring very large prime numbers. For decades, that computational hardness was enough. But in 1994, MIT’s Peter Shor showed that a quantum computer could solve these problems exponentially faster, turning “hard” puzzles into solvable ones.
Post-quantum cryptography (PQC) emerged as a response. Instead of relying on the hardness of a single puzzle, PQC hides data in ways that force attackers to make an infeasible number of guesses. The classic McEliece cryptosystem, introduced in 1978, is still considered one of the strongest PQC approaches. But it comes with a cost: encrypting and decrypting everything under McEliece is so computationally heavy that it’s been like a cure that nearly kills the patient along with the disease.
In blockchain, there are few and parsed early but vital moves that blockchain developers have taken to pragmatically address post quantum cryptography. The Ethereum Foundation has backed a research group called ZKnox, working on open-source post-quantum solutions that could reduce gas fees by up to 12× while protecting Ethereum’s future against quantum threats while Algorand is securing its entire chain history with FALCON signatures for its post-quantum resilience.
An MIT Coding Breakthrough: RLNC
Here’s the key insight: you don’t need to encrypt all the data to make it quantum safe. Decrypting everything is computationally hard and very expensive.
Random Linear Network Coding (RLNC), a coding method developed over two decades in my MIT lab “Network Coding and Reliable Communications Group” offers a proven alternative. RLNC takes data and splits it into coded equations, which can then be mixed and recombined as they travel through the network.
Traditional PQC is costly because it requires encrypting and decrypting all the data. With PQC encryption via RLNC you only need to encrypt a fraction — say, one out of ten coded equations – and the entire dataset inherits its quantum-safe protection.
With RLNC, encrypting 10% of the data effectively protects 100% of the dataset, while cutting 90% of the computational burden. And more importantly, it’s all based on pure math.
RLNC-based Encryption and Blockchain Security
Because RLNC consists of encoding and decoding data into packets it can be embedded at any level of the Web3 stack enabling quantum-safe, scalable performance of decentralized systems.
At the application level the math is applied at the software layer and managed locally, representing the fastest pace to adoption. At the infrastructure level, we have done synthesis of RLNC in hardware chips at MIT, showing that this can scale down to silicon and into the core of blockchain nodes, ensuring long-term systemic resilience with minimal cost.
Ultimately, RLNC can also be leveraged as a “quantum-safe memory layer” for blockchains. A way to ensure that data propagation, storage, and writing to the chain inherits quantum security without every transaction being painfully encrypted end to end.
The Call to Action
What’s important to understand is that we don’t need to wait for a visible hack. By then, it’s too late; the data will already have been harvested.
Institutions won’t put their financial systems, identity systems, or governance models on public blockchains unless those systems are provably future-proof. And we don’t need to wait for quantum computers to arrive before defending against them.
As I like to remind people: there’s nothing quantum about post-quantum security. It’s all coding. Pen-and-paper math. Despite what you might think, you don’t need a quantum machine to be quantum safe.
If blockchains are to serve as the backbone of finance, governance, and IoT, they must be designed not only to scale but to last against quantum threats. And with RLNC, we finally have a way to make quantum safety both practical and performant.