Antigravity Q&A
If quantum computers break current keys, could attackers drain player wallets before the migration finishes?
Answered by claude-haiku-4-5 · 3 May 2026
Answer
# Quantum Computing & Wallet Security: The Real Timeline
Your question touches a genuine concern, but the threat landscape is more nuanced than "quantum breaks cryptography → wallets drain immediately."
The core vulnerability is real but distant. Current cryptocurrency wallets rely on elliptic-curve cryptography, which Shor's algorithm can crack—but only on a quantum computer powerful enough to run it reliably [AG-2024.05-2225]. As of now, "quantum computers that are powerful enough are likely to be available in a couple of years," though this timeline has been repeatedly pushed back [AG-2024.05-2225]. More soberly, assessments suggest quantum computers remain "not believed to currently pose security risks" to cryptographic systems because their maturity is insufficient for large-scale cryptanalysis [AG-2024.01-2022].
A "harvest now, decrypt later" attack is the real risk. Attackers could collect encrypted blockchain transactions today and wait to decrypt them once quantum computers become capable—but this doesn't instantly drain wallets because the attacker still needs to forge a valid transaction and broadcast it to the network. The harder immediate problem is migration coordination: if only *some* wallets switch to quantum-resistant keys (like lattice-based Kyber or Dilithium [AG-2024.05-2225]), then older wallets remain exposed.
Migration is the practical bottleneck. The blockchain community is already studying post-quantum alternatives [AG-2024.02-1291], and standardization bodies are moving forward [AG-2024.05-2225]. The real scenario isn't a sudden drain but a transition period where legacy wallets become high-value targets. Most proof-of-work systems, including Bitcoin, are vulnerable to quantum attacks in principle [AG-2024.02-1707], but executing such an attack would require "an extremely fast and fault-tolerant quantum computer" that remains years away.
The provided preprints don't directly address transition timelines or wallet-specific migration strategies.
Sources · 8
- 56%cs.CRPost-Quantum Security: Origin, Fundamentals, and AdoptionAG-2024.05-2225
- 54%quant-ph51% Attack via Difficulty Increase with a Small Quantum MinerAG-2024.03-1707
- 53%cs.CRTowards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacksAG-2024.02-1291
- 53%quant-phAssessing the Benefits and Risks of Quantum ComputersAG-2024.01-2022
- 51%quant-phQuantum Truncated Differential and Boomerang AttackAG-2024.07-2243
- 50%quant-phCan Quantum Computers Do Nothing?AG-2024.06-2229
- 49%cs.CRA Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time PadAG-2024.01-1977
- 48%cs.CRSecurity Attacks Abusing Pulse-level Quantum CircuitsAG-2024.06-1682
Keep exploring
- How would a "harvest now, decrypt later" attacker actually forge a valid transaction without the private key?
- Why do proof-of-work systems like Bitcoin remain vulnerable even if quantum computers can't execute attacks for years?
- Could a blockchain network fork to enforce quantum-resistant signatures before attackers gain the ability to decrypt harvested transactions?
This is a research aid — not a peer review. Verify sources before citing.