12. February 2026 | Print article |

Post-Quantum Cryptography and Bitcoin: Shaping the Security Architecture of the Future

2 min Reading Time

Quantum computers threaten the cryptography that underpins our digital infrastructure – from TLS to VPNs and Bitcoin. Yet the crypto community is responding faster than expected. A look at the post-quantum strategies that are currently shaping tomorrow’s security architecture.

TL;DR

  • NIST finalized the first post-quantum cryptography standards in 2024 (CRYSTALS-Kyber, CRYSTALS-Dilithium)
  • Bitcoin is preparing for the transition with Taproot and Schnorr signatures
  • The threat is real but not immediate – “Harvest now, decrypt later” is the actual risk
  • Companies should create a crypto inventory now and plan their migration

Why Quantum Computers Threaten Cryptography

The security of modern cryptography relies on mathematical problems that are practically unsolvable for classical computers: factoring large numbers (RSA) and the discrete logarithm problem on elliptic curves (ECDSA). Quantum computers could solve these problems with Shor’s algorithm in polynomial time.

This affects more than just Bitcoin: TLS, SSH, VPNs, digital signatures, certificates – the entire PKI infrastructure of the internet is based on these assumptions. If they fall, everything falls with them.

NIST PQC: The New Standards

The National Institute of Standards and Technology published the first post-quantum standards in 2024 after an eight-year evaluation process:

  • ML-KEM (CRYSTALS-Kyber): Key encapsulation for encrypted communication
  • ML-DSA (CRYSTALS-Dilithium): Digital signatures – the likely successor to ECDSA
  • SLH-DSA (SPHINCS+): Hash-based signatures as a conservative alternative

Google, Cloudflare, and Apple are already testing hybrid TLS implementations that combine classical and post-quantum algorithms. Chrome has supported ML-KEM since version 124.

Bitcoin and Post-Quantum: More Robust Than Expected

Bitcoin has an often-overlooked advantage: addresses that have never sent a transaction are protected by SHA-256 and RIPEMD-160 – hash functions that can withstand quantum computers (Grover’s algorithm only halves the effective key length).

The risk primarily affects “exposed” public keys – addresses that have already sent transactions. The Bitcoin community is discussing several migration paths:

  • Soft fork with PQC signatures: CRYSTALS-Dilithium or SPHINCS+ as a new signature type
  • Address migration: users move coins to new, PQC-secured addresses
  • Hybrid signatures: a combination of ECDSA and PQC for the transition period

Notably, the same cryptographic principles that have secured Bitcoin for 15 years – hash-based commitments, Merkle Trees, defense in depth – are the very concepts on which post-quantum security is also built.

“Harvest Now, Decrypt Later”: The Real Risk

State actors could record encrypted communications today and decrypt them in 10-15 years with quantum computers. For companies with long-term sensitive data (patents, trade secrets, health data), this is a concrete risk – today.

The BSI (Federal Office for Information Security) has recommended since 2024: start immediately with an inventory of your cryptographic procedures. Identify where RSA and ECDSA are used. Plan the migration to post-quantum-capable algorithms.

What Companies Should Do Now

  1. Create a crypto inventory: Where are RSA, ECDSA, and DH used? (TLS certificates, VPNs, code signing, email encryption)
  2. Plan for crypto agility: design systems so that cryptographic algorithms are interchangeable
  3. Test hybrid methods: evaluate NIST PQC algorithms in parallel with classical methods
  4. Prioritize long-term data: migrate data with >10 years of protection need to PQC first
  5. Follow BSI recommendations: the technical guideline TR-02102 is regularly updated

Key Facts

NIST PQC Standards: Finalized in 2024 after 8 years of evaluation

Threat Horizon: 10-20 years until cryptographically relevant quantum computers (estimate)

Harvest Now, Decrypt Later: The risk already exists today for long-term sensitive data

Bitcoin Protection: Unused addresses are quantum-safe due to hash functions

Chrome PQC Support: ML-KEM since version 124 (2024)

Fact: IBM plans, according to its Quantum Roadmap, to have an error-corrected quantum computer with over 100,000 qubits by 2029 – a potential risk for today’s cryptography standards like ECDSA.

Fact: The BSI warns in its 2025 crypto guide about “Harvest Now, Decrypt Later” attacks and recommends switching to post-quantum algorithms by 2030 at the latest.

Frequently Asked Questions

When will quantum computers be able to break encryption?

The most credible estimates are 10-20 years for cryptographically relevant quantum computers. But “harvest now, decrypt later” attacks make the problem relevant today for data with long-term protection needs.

Should I replace my TLS certificates now?

Not immediately, but prepare: yes. Google and Cloudflare are already testing hybrid TLS configurations. The transition will be gradual – similar to the migration from SHA-1 to SHA-256. Companies should ensure that their infrastructure is “crypto-agile.”

Can existing wallets be upgraded to post-quantum algorithms?

Yes, technically a migration is possible, but it requires a soft or hard fork in the respective blockchain protocol. Bitcoin developers are already working on proposals like BIP-360, which aim to enable a gradual migration to post-quantum-secure signature methods. Users would need to actively transfer their coins to new, quantum-safe addresses.

Further Articles

Bitcoin and Cryptography: A Masterpiece of IT Security

Blockchain Cryptography for the Security Industry

Planning Your Security Budget for 2025

Related Articles

More from the MBF Media Network

Header Image Source: Pexels

Tobias Massow

About the author: Tobias Massow

More articles by

Also available in

FrançaisEspañolDeutsch
A magazine by Evernine Media GmbH