The long-standing debate in the crypto world over whether quantum computers represent an existential threat to blockchains is now more urgent than ever. Experts are warning that advances in artificial intelligence are accelerating this challenge and forcing a fundamental rethink of digital security.
The convergence of quantum computing and AI
Researchers specializing in both post-quantum cryptography and blockchain security emphasize that the landscape is changing at a record pace. While artificial intelligence is providing attackers with powerful new tools, it is also strengthening developer defenses—and playing a pivotal role in speeding up quantum computing research itself.
Major tech companies and researchers are sounding alarms that quantum computers with the potential to break cryptography could arrive sooner than anticipated. Artificial intelligence is widely seen as the key driver behind this accelerated timeline.
“The future security environment will definitely look nothing like today. We expect the combination of AI and quantum to force us to revisit all our assumptions about security,” explains Alex Pruden, CEO of Project Eleven.
Investigators highlight that machine learning systems are already delivering efficiency gains, especially when it comes to solving technical hurdles like quantum error correction.
“Collect now, decrypt later”: New threats and an urgent data race
Experts believe the threat of quantum computers is no longer just a theoretical concern. In particular, governments and major actors are reportedly collecting encrypted internet traffic now, hoping to decrypt it in the future when quantum computers mature—a strategy known as “collect now, decrypt later.”
Within the crypto industry, the biggest risk is that most blockchains rely heavily on elliptic curve cryptography. If a sufficiently powerful quantum computer emerges, attackers could use public keys to derive private keys, opening the door to stealing wallet funds.
Mini glossary: Post-quantum cryptography is a new generation of encryption algorithms designed to withstand both traditional and future quantum computers.
AI as both attack vector and defense tool
AI models now outperform traditional methods in spotting software vulnerabilities and code flaws. Some security experts anticipate that AI will drive a spike in cyberattacks by uncovering weaknesses more quickly and even launching direct cryptographic attacks.
Alex Pruden points out, “Thanks to AI, we can expect more attacks to emerge. These models can identify weaknesses, whether they’re buried in core cryptography code or exposed at the application level.”
On the other hand, developers are increasingly harnessing AI for code audits, automated testing, and formal verification. Particularly in post-quantum systems, AI is streamlining mathematical validation, making processes faster and more effective.
Blockchains seek post-quantum security
Researchers now broadly agree that security can no longer be viewed as a static structure fixed for years at a time. Ethereum, Zcash, Solana, Ripple, and NEAR are among the leading platforms actively developing strategies for a post-quantum future.
The NEAR team recently announced plans to incorporate post-quantum encryption directly into its account system, allowing users to upgrade cryptographic methods without needing to change wallets. NEAR co-founder Illia Polosukhin expects that classic encryption methods may require more frequent updates as the technology landscape shifts.
Polosukhin comments, “Current post-quantum cryptography systems are large in size and quite slow compared to today’s standards.”
| Blockchain Network | Post-quantum Step | Migration Difficulty |
|---|---|---|
| Ethereum | Prototype research underway | High |
| NEAR | Direct integration into accounts planned | Medium |
| Zcash | Development and testing phase | High |
| Solana | Experimental solutions | High |
Experts stress that encryption can no longer guarantee security for extended periods; both AI and quantum computing are rapidly transforming the threat landscape. As a result, security is expected to become a constantly evolving process that requires ongoing updates and adaptation.




