XDC XDC Innovation Labs
GitHub
XDC PQ Initiative โ€” v1.0 ยท March 2026

The world's enterprise trade blockchain is hardening every cryptographic surface against quantum computing โ€” from XDPoS 2.0 validator consensus to 30-year RWA document signatures โ€” before Q-Day arrives.

$5T
trade gap targeted
30yr
doc longevity
2030
EU PQC deadline
108
masternodes

Frequently Asked Questions:
Post-Quantum Blockchain Security

Everything you need to know about quantum computing threats to XDC Network, post-quantum cryptography standards, migration timelines, and what it means for your tokens, dApps, and enterprise integrations.

Last updated: March 2026 ยท 26 questions answered
Quantum Computing Basics
What is quantum computing?+

Quantum computing leverages quantum mechanics principles (superposition and entanglement) to perform certain computations exponentially faster than classical computers. While classical bits are either 0 or 1, quantum bits (qubits) can exist in multiple states simultaneously, enabling massive parallelism for specific problem classes.

Key point: Quantum computers aren't faster at everything โ€” they excel at specific tasks like factoring large numbers (breaking RSA/ECDSA) and searching unstructured databases (weakening hash functions). Most everyday computing (video rendering, database queries, web browsing) sees little-to-no quantum advantage.

Is XDC vulnerable to quantum attacks today?+

Not yet. Breaking XDC's ECDSA (secp256k1) requires ~4,000+ logical qubits running Shor's algorithm. Today's quantum computers (IBM Condor: 1,121 qubits, Google Willow: 105 qubits) are still in the NISQ (Noisy Intermediate-Scale Quantum) era โ€” physical qubits with high error rates, not the error-corrected logical qubits needed for cryptographic attacks.

However, "harvest now, decrypt later" is the real threat: adversaries can capture encrypted trade finance documents today and decrypt them when quantum computers mature in 8-12 years. Since XDC trade documents have 20-30 year legal lifespans, starting the migration now is critical.

When will quantum computers actually break ECDSA?+

Most credible timelines converge on the early-to-mid 2030s:

  • IBM (2033): 100,000+ qubit system on their roadmap
  • DARPA (2033): CRQC (Cryptographically Relevant Quantum Computer) benchmark target
  • Global Risk Institute (2031): 1 in 7 chance; 50% chance by 2037
  • NIST (2035-2040): Conservative estimate for RSA-2048 breaking

The critical insight: lead time matters more than threat date. Migrating a decentralized network like XDC takes 7-10 years (multi-client coordination, wallet updates, enterprise integration testing). Starting in 2026 means being ready by 2033-2035 โ€” right when the threat materializes.

Cryptographic Threats
What is ECDSA and why is it vulnerable?+

ECDSA (Elliptic Curve Digital Signature Algorithm) is the cryptographic scheme XDC uses to sign transactions. Your private key generates signatures proving you own an address without revealing the key itself. XDC uses the secp256k1 curve (same as Bitcoin/Ethereum).

Why it's quantum-vulnerable: Shor's algorithm can solve the Discrete Logarithm Problem (DLP) โ€” the mathematical foundation of ECDSA โ€” in polynomial time. A sufficiently powerful quantum computer can derive your private key from your public key, allowing attackers to forge signatures and steal funds.

Attack requirement: ~4,000 logical qubits with low error rates. Classical computers would need billions of years; a quantum computer could do it in hours.

What about hash functions like Keccak-256? Are those safe?+

Mostly safe, but weakened. Grover's algorithm provides a quadratic speedup for searching unstructured data, reducing the effective security of a 256-bit hash from 256 bits to ~128 bits. This is still computationally infeasible with current tech (would require trillions of qubits).

Practical impact on XDC:

  • Keccak-256 (used for addresses): Still secure โ€” 128-bit post-quantum strength is adequate
  • SHA-3 (used in state trees): Similarly weakened but acceptable
  • Mining/Ethash: Not applicable (XDC uses XDPoS, not PoW)

Bottom line: Hash functions aren't the urgent threat โ€” signature schemes are. That's why XDC's migration focuses on replacing ECDSA with ML-DSA/Falcon, not upgrading hash functions.

What is the "harvest now, decrypt later" threat?+

Nation-states and sophisticated adversaries are capturing encrypted communications and blockchain transactions today, storing them in massive data warehouses, and planning to decrypt them when quantum computers mature in 8-15 years.

Why this matters for XDC:

  • Trade finance documents have 20-30 year legal validity periods
  • Bills of lading signed on-chain today may be referenced in 2045 litigation
  • Enterprise contracts often include confidential pricing/terms

If XDC doesn't adopt PQ signatures before quantum computers arrive, all historical transactions become retroactively vulnerable. This isn't theoretical โ€” the NSA's Utah Data Center reportedly stores yottabytes of encrypted traffic for future decryption.

Post-Quantum Cryptography
What is post-quantum cryptography?+

Post-quantum cryptography (PQC) consists of algorithms designed to resist attacks from both classical and quantum computers. Unlike quantum key distribution (QKD), which requires specialized hardware, PQC runs on regular computers and blockchains.

NIST's standardized PQ algorithms (2024):

  • ML-KEM (FIPS 203): Key encapsulation (replacing ECDH for encryption)
  • ML-DSA (FIPS 204): Digital signatures based on lattices (Dilithium)
  • SLH-DSA (FIPS 205): Stateless hash-based signatures (SPHINCS+)
  • FN-DSA (FIPS 206): Compact signatures (Falcon) โ€” ideal for bandwidth-constrained systems like XDPoS 2.0

XDC's strategy uses ML-DSA for user wallets (widely compatible) and Falcon for validator consensus (smallest signatures for 108-node gossip).

Why did NIST choose these specific algorithms?+

NIST ran an 8-year competition (2016-2024) evaluating 82 candidate algorithms across three rounds. The winners balance security, performance, and mathematical diversity:

  • ML-DSA/ML-KEM (lattice-based): Fast, small keys, well-studied โ€” the "workhorse" algorithms
  • SLH-DSA (hash-based): Most conservative cryptographic assumptions โ€” the "fallback" if lattices break
  • Falcon (NTRU lattice): Smallest signatures โ€” critical for real-time systems like blockchain consensus

Mathematical diversity matters: If a breakthrough attack breaks lattice-based schemes, hash-based SLH-DSA provides a backup. This is why XDC uses both ML-DSA and Falcon in different contexts.

How much bigger are post-quantum signatures compared to ECDSA?+
SchemeSignature Sizevs ECDSA
ECDSA (secp256k1)65 bytesbaseline
Falcon-512 (FIPS 206)666 bytes10.2ร—
ML-DSA-65 (FIPS 204)3,309 bytes50.9ร—
SLH-DSA-128s (FIPS 205)7,856 bytes120.9ร—

Why this matters: XDPoS 2.0 validators must gossip 108 signatures per block. Using ML-DSA would increase signature size by ~3.6ร— vs Falcon (and ~37ร— vs current ECDSA). Falcon keeps bandwidth manageable while providing quantum resistance.

XDC's PQ Strategy
What is XDC doing about quantum threats?+

XDC Network is implementing a 5-phase post-quantum migration over 2026-2035, co-led by Ritesh Kakkad (XDC Core) and the XDC Innovation Labs team:

  • Phase 0 (2026 Q2): Research + XDSS-PQ standard with ITFA/ICC
  • Phase 1 (2027): Hybrid wallets (ECDSA + ML-DSA dual-signing)
  • Phase 2 (2028-2029): Smart contract PQ support via EVM precompiles
  • Phase 3 (2030-2031): XDPoS 2.0 validator Falcon migration
  • Phase 4 (2032-2035): Full PQ-only mode (ECDSA deprecated)

Key design principle: No flag-day cutover. Every phase uses hybrid approaches where classical and PQ crypto coexist, giving users and validators time to upgrade at their own pace.

Read Ritesh Kakkad's full research: XDC's Unbreakable Future

Will my XDC tokens be safe during the migration?+

Yes โ€” by architectural design. The migration uses a hybrid dual-signature model:

  • Phase 1-2: Wallets sign transactions with both ECDSA and ML-DSA. Older nodes verify ECDSA; upgraded nodes verify both.
  • Phase 3: Validators dual-sign blocks with Falcon + ECDSA during a 12-month transition window
  • Phase 4: Only after >95% network upgrade does ECDSA get deprecated

Your action required: Upgrade your wallet software when Phase 1 releases (2027). The wallet will automatically generate PQ keys and dual-sign. Your funds remain accessible with your existing seed phrase โ€” no token migration or new addresses needed.

If you don't upgrade? Your ECDSA transactions continue working through Phase 3 (~2031), giving you 4+ years to migrate. But quantum-resistant security requires the upgrade.

What is XDSS-PQ and why does it matter?+

XDSS-PQ (XDC Digital Signature Standard - Post-Quantum) is an open industry standard co-authored by XDC, ITFA (International Trade and Forfaiting Association), ICC (International Chamber of Commerce), and TradeTrust for signing trade finance documents with quantum-resistant cryptography.

What it specifies:

  • Dual ML-DSA + Falcon signature schema for 30-year document validity
  • Metadata standards (originator, timestamp, jurisdiction, legal validity assertions)
  • EU 2030 Digital Identity Wallet compliance + NIST FIPS 203/204/206 alignment
  • Backward compatibility with existing MLETR (Model Law on Electronic Transferable Records)

Strategic moat: By making XDC the reference implementation of XDSS-PQ, it creates a network effect no competitor can easily replicate. Banks/enterprises adopting the standard automatically favor XDC โ€” similar to how SWIFT messaging standards locked in correspondent banking.

Why Falcon for validators instead of ML-DSA?+

Bandwidth. XDPoS 2.0 has 108 masternodes signing every block, and those signatures must be gossiped to all other validators in real-time (2-second block time).

  • Falcon-512: 666 bytes/signature โ†’ 72 KB per block
  • ML-DSA-65: 3,309 bytes/signature โ†’ 357 KB per block

At 30 blocks/minute, ML-DSA would add 10.7 MB/min gossip overhead vs Falcon's 2.2 MB/min โ€” a 5ร— difference that compounds across 108 globally distributed nodes.

Real-world precedent: Polkadot chose Falcon (June 2025) for identical reasons. Ethereum's J* fork is evaluating Falcon for validator signatures in their PQ roadmap. XDC is following proven technical decisions, not inventing untested approaches.

Will the PQ migration disrupt dApps or smart contracts?+

No disruption through Phase 2. Existing contracts continue working unchanged โ€” they don't directly validate ECDSA signatures; the EVM does that at the transaction level.

Phase 2 additions (2028-2029):

  • New EVM precompiles for ML-DSA/Falcon signature verification (similar to ecrecover for ECDSA)
  • Optional: Smart contracts can add PQ signature checks for enhanced security
  • Example: A trade finance dApp verifying bill of lading signatures could use mldsaRecover() precompile

Developer action: If your dApp needs to verify signatures on-chain (beyond basic transaction auth), you'll want to add PQ signature support when precompiles launch. Otherwise, no code changes required.

Comparisons & Ecosystem
What are other blockchains doing about quantum threats?+

Most are still in early research. XDC's 5-phase roadmap (starting 2026) puts it among the leaders:

  • Ethereum: J* fork research (2024-2026) exploring Falcon + STARK aggregation. No firm timeline yet.
  • Bitcoin: Taproot soft fork (2021) added Schnorr, but PQ migration blocked by governance deadlock. Some proposals for pay-to-quantum-resistant (P2QR) addresses.
  • Algorand: FALCON/SPHINCS+ research (2023), state proof aggregation. Timeline unclear.
  • Polkadot: Falcon signatures for validators (June 2025 implementation). Most concrete progress after XDC.
  • QRL (Quantum Resistant Ledger): Built PQ-native from day 1 (XMSS signatures), but low adoption/liquidity.

XDC's advantage: Enterprise partnerships (banks, Deutsche Telekom, SWIFT integration) create regulatory pressure (DORA, EU Digital Identity mandates) that consumer chains don't face. This urgency accelerates XDC's timeline.

Why is XDC's risk higher than Ethereum or Bitcoin?+

Two institutional factors unique to XDC:

  1. 30-year document lifespans: Trade finance bills of lading have multi-decade legal validity. A document signed in 2026 may be cited in 2050 litigation. Ethereum NFTs or Bitcoin payments don't have this long-term legal requirement.
  2. Regulatory compliance: XDC's enterprise partners face:
    • EU DORA (Digital Operational Resilience Act): Mandatory PQ risk assessments by 2025
    • EU Digital Identity Wallet (2030): Requires PQ-compliant signatures
    • NIST SP 800-208: US federal agencies must migrate to PQC by 2035

If XDC isn't PQ-safe by 2030-2033, it becomes a compliance liability for Deutsche Telekom, SWIFT members, and regulated banks โ€” risking its entire enterprise value proposition. Bitcoin/Ethereum don't face this deadline pressure.

How does XDC benefit from Ethereum's PQ research?+

Directly, via EVM compatibility. Ethereum's open-source PQ toolchain ports to XDC with minimal changes:

  • leanSig: Compact PQ signature serialization (reducing ML-DSA overhead)
  • leanSpec: Formal verification framework for PQ precompiles
  • leanMultisig: PQ-safe multi-signature wallets
  • STARK aggregation: Batching validator signatures to reduce on-chain data

The XDC PQ team collaborates with the Ethereum Foundation's PQ working group (pq.ethereum.org) as a research partner. XDC contributes trade finance use cases; Ethereum shares cryptographic engineering โ€” mutual benefit without duplication.

Cost savings: Ethereum's $20M+ PQ research budget (funded by grants, Protocol Guild, etc.) subsidizes XDC's development. XDC focuses budget on trade finance-specific features (XDSS-PQ, document signing) rather than reinventing base-layer crypto.

Technical Details
What are "logical qubits" vs "physical qubits"?+

Physical qubits: The actual quantum hardware โ€” superconducting circuits, ion traps, etc. They have high error rates (0.1-1% per operation) due to decoherence and environmental noise.

Logical qubits: Error-corrected qubits created by redundantly encoding information across many physical qubits. Quantum error correction (QEC) codes like surface codes require ~1,000 physical qubits per logical qubit to achieve fault-tolerant computation.

Breaking ECDSA requirement:

  • ~4,000 logical qubits running Shor's algorithm
  • Translates to ~4,000,000 physical qubits (assuming 1,000:1 overhead)

Where we are today (2026): IBM Condor has 1,121 physical qubits; Google Willow has 105. Both are NISQ devices โ€” not error-corrected. The gap between current tech and cryptographic threat is still wide, but narrowing fast.

Can I use my existing seed phrase after the PQ migration?+

Yes. XDC's hybrid wallet design preserves BIP-39/BIP-44 seed phrase compatibility:

  • Your 12/24-word seed phrase derives both ECDSA and ML-DSA key pairs
  • Derivation path: m/44'/550'/0'/0/x for ECDSA (XDC standard) + m/44'/550'/1'/0/x for ML-DSA
  • One seed phrase โ†’ dual-signature security

Backup strategy: If you have your seed phrase backed up today, it will work with PQ wallets in 2027+. No need to generate new mnemonics or migrate funds to new addresses.

Hardware wallet support: Ledger/Trezor firmware updates will add ML-DSA signing. Your Ledger device stores both key types, signed by the same seed.

What is the performance impact of PQ signatures on transaction throughput?+

Minimal for XDC's architecture. Unlike proof-of-work chains where signature verification is compute-heavy, XDPoS 2.0's bottleneck is network gossip and state database I/O, not signature validation.

Benchmarks (single-core):

  • ECDSA (secp256k1): ~20,000 verifications/sec
  • Falcon-512: ~9,000 verifications/sec (~2ร— slower)
  • ML-DSA-65: ~4,800 verifications/sec (~4ร— slower)

Impact on XDC: At 2,000 TPS (XDC's current capacity), signature verification takes <1% of CPU time on modern hardware. Even a 4ร— slowdown is negligible. The real bottleneck remains state trie updates and network latency โ€” unchanged by PQ crypto.

Future optimization: AVX2/AVX-512 SIMD instructions for ML-DSA can restore near-ECDSA speeds on server-grade hardware (Intel Xeon, AMD EPYC) used by masternodes.

Ecosystem & Adoption
When should enterprise users start preparing?+

Now โ€” especially if you're in regulated industries.

2026-2027 (Phase 0-1):

  • Audit your XDC integrations: which systems sign/verify transactions?
  • Test hybrid wallet software in staging environments
  • Update internal security policies to reference NIST FIPS 203/204/206
  • If you issue/verify trade documents: join XDSS-PQ working group

2028-2030 (Phase 2-3):

  • Upgrade production wallets to PQ-enabled versions
  • If running masternodes: prepare for Falcon validator key migration
  • Update smart contracts to use PQ signature precompiles (optional)

EU DORA compliance: Financial entities must conduct PQ risk assessments by January 2025. If XDC is part of your critical infrastructure, document the migration roadmap in your compliance reports.

Will PQ wallets work with current XDC dApps?+

Yes โ€” during the hybrid phase (2027-2032). PQ wallets dual-sign transactions with both ECDSA and ML-DSA. DApps that only verify ECDSA (i.e., current MetaMask/Web3 integrations) continue working normally.

What dApp developers should do:

  • Short-term (2027-2029): Nothing required โ€” ECDSA signatures remain valid
  • Medium-term (2029-2031): Add PQ signature verification if your dApp stores/validates signatures on-chain (using new precompiles)
  • Long-term (2032+): Migrate to PQ-only signatures when ECDSA gets deprecated

Wallet UX: Users won't see "two signatures" โ€” the wallet handles dual-signing transparently. Gas costs increase slightly (~15-20%) due to larger transaction payloads, but this is marginal.

What happens if a PQ algorithm gets broken before quantum computers arrive?+

This is why NIST mandated mathematical diversity. XDC's strategy uses multiple PQ schemes:

  • ML-DSA (lattice-based): User wallets
  • Falcon (NTRU lattice): Validator consensus
  • SLH-DSA (hash-based): Emergency fallback (standardized but not deployed yet)

Scenario: Lattice-based crypto gets broken (unlikely but possible)

  1. XDC activates SLH-DSA via emergency hard fork (hash functions are quantum-resistant and well-understood)
  2. Validators roll back to ECDSA temporarily while SLH-DSA integrates
  3. Community chooses next-gen PQ algorithm from NIST's Round 4 candidates

Historical precedent: When SHA-1 was broken (2017), systems migrated to SHA-256/SHA-3 without catastrophic failure. XDC's hybrid approach ensures similar resilience.

How much will PQ transactions cost in gas fees?+

~15-25% higher during hybrid phase; target neutral by Phase 4.

Gas cost breakdown:

  • Larger transaction payload: ECDSA signature = 65 bytes; ML-DSA = 3,309 bytes โ†’ ~50ร— calldata cost increase
  • Signature verification: EVM precompiles are optimized, so verification cost comparable to ecrecover
  • Total impact: Simple transfer today ~21,000 gas โ†’ hybrid transfer ~25,000 gas

Mitigation strategies (Phase 2+):

  • STARK aggregation: Batch multiple PQ signatures into a single proof (reduces per-tx overhead)
  • EIP-4844-style blobs: Store PQ signatures in cheaper data availability layer
  • leanSig compression: Reduces ML-DSA signatures from 3,309 โ†’ ~2,400 bytes

By Phase 4 (2032+), when ECDSA is deprecated and optimizations mature, PQ transaction costs should match today's ECDSA baseline.

Where can I learn more or contribute to XDC's PQ initiative?+

Official resources:

Get involved:

  • Developers: Join #pq-dev channel on XDC Discord
  • Enterprises: Contact XDC Innovation Labs for XDSS-PQ working group
  • Researchers: Contribute to leanEthereum PQ tooling (pq.ethereum.org)
  • Validators: Test Falcon signing in Phase 3 testnets (2030 launch)

Community calls: Monthly PQ initiative updates โ€” subscribe at xdcindia.com/newsletter