u/ChillerID

Factoring $2048$ bit RSA integers with a half-million-qubit modular atomic processor

Modular neutral atom architecture for breaking RSA-2048 with half million qubits.

arxiv.org
u/ChillerID — 9 days ago
▲ 22 r/QRL+1 crossposts

Technical Review: PQ Signature Schemes Across 10 Blockchain Projects

Project Descriptions

1. QRL (Quantum Resistant Ledger)

QRL is the benchmark for this entire comparison. It is the only blockchain that has used a completely NIST-standardized PQ signature scheme (XMSS, SP 800-208) for every single transaction since its genesis block in June 2018, backed by multiple independent security audits before and after launch — Red4Sec, x41 D-Sec, Halborn (completed April 2026 with zero cryptographic findings), and Trail of Bits (ongoing full protocol audit). Seven years of live operation without a single signature failure or security incident. The primary honest limitation is XMSS statefulness: each wallet has a finite number of one-time signing keys, requiring users to track their usage index, and funds in a fully-exhausted wallet are permanently lost. QRL has mitigated this effectively through tooling, but it creates real friction for automated systems and DeFi.

QRL 2.0 (Project Zond) directly addresses both major gaps simultaneously. It replaces PoW with PoS, adds a full EVM-compatible smart contract layer via the Hyperion compiler (Solidity-compatible), and upgrades the signature scheme to ML-DSA-87 (NIST FIPS 204, stateless, lattice-based) at launch — with SLH-DSA/SPHINCS+ (FIPS 205) and Falcon-1024 (P2P layer) to follow via the crypto-agile 3-byte address descriptor system. No official mainnet date has ever been announced, so there has been no formal delay — but QRL 2.0 represents the most carefully constructed PQ blockchain upgrade in the space, audited by the best firms.

2. Mochimo

Mochimo is the other genuinely PQ-native chain from 2018, using standalone WOTS+ for every transaction since its genesis block on June 25, 2018 — one day before QRL. WOTS+ is the foundational building block inside NIST FIPS 205 (SLH-DSA), and Mochimo's implementation was audited by Dr. Andreas Hülsing, the algorithm's inventor, who found no bugs in the core WOTS+ code. The "first PQ blockchain" claim is disputed by QRL team members, who allege Mochimo moved its launch date forward specifically to beat QRL's announced date, launching as an MVP with the Peach mining algorithm not deployed until a year later. More technically significant is the ChainCrunch mechanism: every 256 blocks, all transaction history is permanently and by design destroyed, replaced by a snapshot of current balances only. The genesis block, original distribution of the 4.76M MCM premine (6.34% of supply), and all early coin provenance are completely unauditable — a fundamental and irreversible transparency problem.

The 2018 Hülsing audit also found three application-level concerns (message compression weaknesses, hash seed reuse across keys, direct C struct hashing) and recommended incorporating the pseudorandom R parameter used by SPHINCS+. Whether these were subsequently fixed is not publicly documented, which means the security quality gap relative to QRL is real but of uncertain magnitude. Mochimo's marketing also conflates "WOTS+ is inside FIPS 205" with "Mochimo uses FIPS 205," which is misleading — the complete NIST construction includes FORS, Merkle hypertrees, and the R randomizer that Mochimo lacks.

3. Abelian

Abelian is the most credible project in this series that QRL and Mochimo fans might not know about. It launched its actual L1 mainnet in April 2022 (not a placeholder ERC-20), has used custom lattice-based constructions for every transaction since genesis, and was built by a team of genuine academic lattice cryptographers: Professors Duncan Wong, Huaxiong Wang, Khoa Nguyen, and Guomin Yang — the same mathematical hardness assumptions (Module-LWE and Module-SIS) that underlie NIST's own Dilithium/ML-DSA standard. The multi-layer privacy system (fully private, pseudonymous, and auditable modes) is technically sophisticated, and the hybrid PoW consensus functions correctly. The strongest gap is that Abelian's signature constructions are novel academic work, not the FIPS 204 standardized algorithm itself — meaning there's no NIST endorsement of the specific scheme as deployed, and there's been no public independent audit.

4. QANplatform

QANplatform has the best NIST alignment of any project in this series for its chosen algorithm: it uses ML-DSA-65 directly from FIPS 204, not a component or variant. Its XLINK hybrid protocol cross-signs ECDSA keys with ML-DSA-65 keys from the same BIP-39 mnemonic, allowing users to migrate without creating new wallets. A November 2025 Hacken audit found no cryptographic vulnerabilities in the cross-signing flow. The major and disqualifying gap is that absolutely nothing is live: QANplatform exists on testnet only, with a mainnet target of 2026 that has been revised multiple times since 2021. Every technical claim is correct about what QANplatform will do; none of it is operational yet. Until mainnet launches and survives real-world operation, QANplatform's technically superior algorithm alignment cannot be credited as a working system.

5. Minima

Minima occupies a unique niche in this comparison: it is not primarily a "PQ blockchain" but an "IoT/edge blockchain that happens to use PQ cryptography." Every transaction uses WOTS in a Merkle Signature Scheme since its native mainnet launched (circa 2024), and the cooperative PoW architecture genuinely enables full node operation on smartphones and microchips. The enterprise partnerships are the most credible in the entire series — ARM (chip design), Siemens Cre8Ventures, University of Southampton, Volvo EV charging — suggesting real industrial deployment interest. The technical PQ gaps are meaningful: Minima uses plain WOTS rather than the stronger WOTS+ variant used by Mochimo and embedded in NIST standards, the MSS construction is custom and unstandardized, and there has been no independent security audit. For its primary use case of IoT data attestation and machine-to-machine payments, these gaps may be acceptable; for high-value financial security, they are not.

6. Algorand

Algorand is the most externally validated project in this series and has the most PQ code deployed in any major general-purpose blockchain. Falcon-1024 (NIST-selected, being standardized as FIPS 206) has protected the entire chain's historical record via state proofs since September 2022, and opt-in Falcon transactions have been possible since November 2025. The team credentials are unmatched — Algorand's CSO Chris Peikert co-designed the GPV lattice trapdoor framework that underlies Falcon itself, and Algorand researchers found a bug in Falcon's own reference implementation. Google's quantum AI research cited Algorand 32 times in March 2026; Coinbase's Quantum Advisory Board named it one of only two L1s best prepared for quantum. The honest assessment is that all of this protects history and opt-in accounts — but the consensus layer (block proposals, committee voting, VRF-based validator selection) all remain Ed25519, and the vast majority of ALGO value sits in classically-vulnerable wallets. Algorand's position is a defensible lead, not a finished job.

7. Nexus NXS

Nexus is a technically interesting project that has largely failed commercially. It does offer Falcon signatures (NIST-selected) as an option within its Signature Chain architecture since the Tritium upgrade in 2019, and the SigChain key-rotation mechanism provides meaningful quantum attack window reduction even for classical signatures by never persistently exposing public keys on-chain. However, Falcon is opt-in and BRAINPOOL ECDSA remains the alternative default — an independent academic paper explicitly classifies Nexus as "non-quantum-secure" offering PQC as an optional feature. More critically, the project is near-dormant: CoinGecko has reported trading stopped on listed exchanges, market cap is under $2M, and all documentation describing Falcon still uses the inaccurate phrase "second-round contender" for an algorithm NIST selected in 2022. The ambitious satellite network and 3DC architecture remain unfinished after a decade of development.

8. Quip Network

Quip Network is genuinely a different kind of project from the rest of this list — it does not attempt to be a PQ-native blockchain but rather a WOTS+ security wrapper that can be deployed on top of existing classical chains (Ethereum, Solana, Bitcoin via Arch Network). The hybrid design requiring both a classical and a WOTS+ signature to spend funds is architecturally sound and the open-source approach is commendable. The fundamental limitation, articulated clearly by Jameson Lopp, is that Bitcoin mainnet public keys are still exposed the moment any on-chain transaction occurs, and Quip only narrows the attack window to roughly two blocks — it doesn't eliminate it. As of May 2026 the entire project is testnet-only (launched April 2026), no audit has been completed, no token exists, and the mainnet target is Q2 2026. A further concern: CTO Dr. Richard Carback co-founded the XX Network, the most misleadingly marketed project in this series. The D-Wave compute layer, while genuinely interesting for optimization workloads, has no relation to the cryptographic threat model and creates confusing narrative overlap.

9. Cellframe

Cellframe is the most problematic technically sound project in this comparison. Dilithium (now ML-DSA, NIST FIPS 204) is available as the default signature scheme, which is legitimately good. But Cellframe's "crypto-agility" portfolio still lists SIDH (Super-Singular Isogeny Diffie-Hellman) as a "most promising" algorithm — the same algorithm that was completely broken by a classical computer attack in July 2022 in roughly one hour. The team has made no public statement addressing this. The root ZeroChain consensus layer runs on Proof of Authority controlled by the development team, explicitly acknowledged with PoS migration promised "in the future." In April 2025 a vulnerability allowed mCELL tokens to be minted without backing, requiring the team to activate centralized blacklists and key revocation — the exact centralization failure mode PoA enables. The full mainnet remains incomplete after years of promises.

10. XX Network

XX Network is the most dishonest project in this comparison. The entire premise of the project — that cMixx provides quantum-resistant private messaging — is false. cMixx's mixing operation uses ElGamal partially homomorphic encryption, whose security rests on the Decisional Diffie-Hellman problem in a cyclic group, directly broken by Shor's algorithm. The marketing claims "quantum-resistant mixnet" while the core operation is actively quantum-vulnerable. User wallets use Ed25519. There is no public audit. The claim that "symmetric key precomputation is quantum-resistant" applies only to a narrow initialization step, not to the actual mixing — the framing intentionally obscures this distinction for non-expert readers. The network is live and functional as a privacy communication system, but its quantum resistance claims are marketing rather than engineering.

https://preview.redd.it/jnelo0gwbpzg1.png?width=799&format=png&auto=webp&s=963df1587ee8708688b21a3a18b6335c2632e68a

Full credit to Robyer for the research and technical analysis. Posting on his behalf.

Disclaimer from Robyer: The analysis was done primarily by LLM (Claude), and since I don't have deep knowledge about the other protects, I'm unable to verify correctness of all the claims. Take this as a general comparison and do your own research.

reddit.com
u/ChillerID — 9 days ago

Pentagon Preparing F-35 Encryption for Quantum Threats While Lockheed Martin Patent Implements Quantum-Resistant Blockchain Technology

According to a recent report, the F-35 program is upgrading encryption systems with quantum-resistant cryptography to prepare for future quantum computing threats.

Source:
https://defence-blog.com/pentagon-prepares-f-35-for-quantum-computing-threat/

As the article states:
"The quantum computing threat to military cryptography has been moving from a distant concern to an active planning requirement faster than many expected. The core problem is that the encryption algorithms currently protecting most secure communications and data — including those on military platforms — were designed under the assumption that no computer could factor large numbers or solve discrete logarithm problems in any practical timeframe."

This stood out to me because discussions around quantum risk in crypto are still relatively niche, yet defense and cybersecurity sectors already appear to be preparing for long-term implications.

Separately, Lockheed Martin has a patent titled:

“Quantum Resistant Ledger for Secure Communications”

Patent source (US20240048369A1):
https://patents.google.com/patent/US20240048369A1/en

The patent discusses:

  • quantum-resistant cryptography
  • secure communications
  • distributed ledger systems
  • post-quantum security architecture

One interesting detail is that the patent text references a “Quantum Resistant Ledger” approach in the context of secure communications. This could mean that quantum-resistant blockchains might have a growing demand in real world use cases in the future.

It seems notable that a major defense contractor is researching quantum-resistant architectures while much of the broader crypto space remains focused on scalability, ETFs, and regulation.

Curious to hear different perspectives on this:

  • How significant do you think the quantum threat really is for crypto?
  • Do you think the crypto industry is underestimating the long-term impact of quantum computing?
u/ChillerID — 15 days ago

Harvard Researchers: Quantum Computing Advancing Faster Than Expected

Harvard researchers are now saying quantum computing is advancing 5–10 years faster than expected due to major breakthroughs in fault tolerance.

For years, many people in crypto treated the quantum threat like a distant sci-fi scenario that wouldn’t matter for decades. But now we’re seeing top researchers openly discussing the possibility of early large-scale fault-tolerant quantum systems arriving before the end of this decade.

The article also highlights how serious the industry has become:

  • billions in private investment
  • rapid commercialization
  • quantum startups being acquired
  • commercial quantum systems already being deployed
  • accelerating breakthroughs in quantum networking

Why does this matter for crypto?

Because much of today’s blockchain infrastructure relies on ECC (Elliptic Curve Cryptography). Bitcoin, Ethereum, wallets, digital signatures, and many security systems across the internet depend on cryptography that could theoretically become vulnerable to sufficiently powerful quantum computers through Shor’s algorithm.

This does NOT mean crypto suddenly becomes obsolete overnight. But it does suggest the market may eventually start paying much closer attention to quantum-resistant and quantum-safe crypto technologies.

For a long time, post-quantum security has been considered a niche topic. Most investors have focused on AI, scaling, memes, DeFi, and ETFs while quantum risk remained largely ignored. But if quantum timelines are truly accelerating faster than expected, that could eventually change the conversation dramatically.

Quantum computing may ultimately create an entirely new sector within crypto:

  • quantum-safe blockchains
  • post-quantum wallets
  • next-generation cryptographic standards
  • quantum-resistant identity systems
  • secure long-term digital asset storage

The interesting thing is that markets usually price in technological shifts long before the actual disruption arrives.

thequantuminsider.com
u/ChillerID — 16 days ago

Researcher breaks 15-bit ECC key on publicly accessible quantum hardware in a 512x jump from the previous public demonstration.

NEW YORK, April 24, 2026 /PRNewswire/ -- Project Eleven today awarded the Q-Day Prize, a one Bitcoin bounty, to Giancarlo Lelli for breaking a 15-bit elliptic curve key on a publicly accessible quantum computer. The result is the largest public demonstration to date of the attack class that threatens Bitcoin, Ethereum, and over $2.5 trillion in ECC-secured digital assets.

"The resource requirements for this type of attack keep dropping, and the barrier to running it in practice is dropping with them," said Alex Pruden, CEO of Project Eleven. "The winning submission came from an independent researcher working on cloud-accessible hardware. No national lab, no private chip. It shows that tangible progress is possible and highlights the urgency to migrate to post-quantum cryptography sooner rather than later. Google just committed to being quantum-secure by 2029. The window to get ahead of this is closing."

u/ChillerID — 28 days ago