The Quantum Threat

Shor's algorithm, running on a sufficiently large quantum computer, can factor integers and compute discrete logarithms in polynomial time. This breaks RSA, ECDSA, and every widely-deployed public-key cryptosystem. Grover's algorithm provides a quadratic speedup for brute-force search, effectively halving symmetric key lengths.

The timeline is uncertain, but the threat is not: “harvest now, decrypt later” attacks mean that data encrypted today with vulnerable algorithms may already be at risk.

NIST Post-Quantum Standards

In 2024, NIST finalized three post-quantum cryptographic standards after an eight-year evaluation process. These algorithms are built on mathematical problems believed to be hard for both classical and quantum computers.

Standard Algorithm Type Hard Problem
FIPS 204 ML-DSA (Dilithium) Digital Signature Module-LWE
FIPS 203 ML-KEM (Kyber) Key Encapsulation Module-LWE
FIPS 205 SLH-DSA (SPHINCS+) Digital Signature Hash functions

Lattice-Based Cryptography

The dominant approach to post-quantum cryptography is built on lattice problems. A lattice is a regular grid of points in high-dimensional space. Two problems form the security foundation:

ML-DSA-44 (the smallest parameter set) produces signatures of 2,420 bytes with public keys of 1,312 bytes — significantly larger than ECDSA's 64-byte signatures and 33-byte keys. This size increase is the primary engineering challenge for adoption.

Blockchain Integration: Tezos tz5 Addresses

Blockchain systems face an acute PQC challenge: addresses are derived directly from public keys, and transactions are authenticated by digital signatures. Every on-chain asset is ultimately protected by the signature scheme.

Tezos is actively developing tz5 addresses based on ML-DSA (Dilithium) for quantum-resistant account security. Key developments:

We track tz5 development through the Tezos GitLab, monitoring merge requests, protocol proposals, and test network deployments.

Current Address Types in Tezos

Prefix Curve / Algorithm Status
tz1Ed25519Active (most common)
tz2secp256k1Active
tz3P-256 (NIST)Active
tz4BLS12-381Active (consensus)
tz5ML-DSA-44 (Dilithium)In development

The Transition Challenge

Migrating to post-quantum cryptography is not a simple algorithm swap. It requires:

Key Resources