Quantum computers will eventually break the public-key cryptography securing every blockchain in production today. The question is not whether migration pressure will arrive — it is whether a protocol can absorb it safely. URUZ was designed to reduce retrofit risk at core trust boundaries.
The risk is concentrated in public-key cryptography — specifically digital signatures. A sufficiently powerful quantum computer running Shor's algorithm could recover private keys from public keys. For a blockchain, this means one thing: an attacker who holds your public key can forge your signature and take your funds.
Every chain in production today uses ECDSA or BLS signatures. Both are broken by Shor's algorithm. Bitcoin, Ethereum, Solana, and every chain launched in the last decade share the same vulnerability. The question is not which chains are at risk — all of them are. The question is which chains can actually fix it.
Most engineering roadmaps place cryptographic relevance in the early-to-mid 2030s. Breaking elliptic-curve cryptography would require thousands of stable logical qubits. That is approximately 8–12 years away — which sounds comfortable until you consider how long it takes to upgrade a decentralized global protocol.
For encrypted data, the threat is immediate: an adversary can record encrypted traffic today and decrypt it once quantum hardware exists. For blockchains, the threat is different. Blockchains are integrity systems built on digital signatures — past transactions remain safe. But once a cryptographically relevant quantum computer exists, any exposed public key can be used to derive the corresponding private key and authorize new transactions.
Every address that has ever sent a transaction has its public key exposed on-chain. Permanently.
Migrating an established blockchain to post-quantum cryptography is one of the most technically and politically difficult problems in distributed systems. The Ethereum Foundation has acknowledged it will take many years and requires coordination across hundreds of client teams, wallet developers, exchanges, and users.
URUZ uses ML-DSA (Module-Lattice Digital Signature Algorithm), standardized as FIPS 204 by NIST in 2024. It is designed for resistance against both classical and quantum adversaries.
URUZ applies post-quantum signatures to its canonical trust anchors so that long-term history integrity remains protected under the same cryptographic assumptions.
Checkpoints define irreversible history. Protecting them with post-quantum signatures secures the highest-value trust boundary for long-term network integrity.
NIST FIPS 204 (ML-DSA / Dilithium) is the same standard being evaluated by Ethereum, the US federal government, and financial infrastructure providers for post-quantum migration. URUZ is aligned with that direction from genesis at core trust anchors.
Future work expands post-quantum coverage and efficiency while preserving cryptographic agility and operational safety. See the Roadmap for phased milestones.