Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Guides

How to Plan a Phased PQC Adoption for Your Mainnet

A technical guide for blockchain core developers and architects on executing a structured, low-risk rollout of post-quantum cryptographic algorithms across a live network.
Chainscore © 2026
introduction
IMPLEMENTATION GUIDE

How to Plan a Phased PQC Adoption for Your Mainnet

A structured approach to integrating post-quantum cryptography into a live blockchain network, minimizing risk and ensuring backward compatibility.

Adopting Post-Quantum Cryptography (PQC) is a critical, multi-year undertaking for any mainnet. A phased approach is essential to manage the immense technical complexity and avoid network disruption. This guide outlines a practical, four-phase strategy: Assessment & Planning, Hybrid Cryptography Implementation, Controlled Activation & Monitoring, and Full Migration. The goal is to systematically replace vulnerable algorithms like ECDSA and SHA-256 with quantum-resistant alternatives such as CRYSTALS-Dilithium and CRYSTALS-Kyber, as standardized by NIST, while maintaining network consensus and user asset security throughout the transition.

Phase 1: Assessment & Planning

Begin by conducting a comprehensive cryptographic inventory of your blockchain. Map every component that relies on classical cryptography: digital signatures (e.g., for transactions and consensus), key encapsulation mechanisms (for encrypted mempools or state channels), and hash functions. For Ethereum Virtual Machine (EVM) chains, this includes precompiles like ecrecover. Establish a cryptographic agility framework—a system design that allows cryptographic algorithms to be upgraded via governance or a hard fork without requiring a full client rewrite. This phase also involves selecting specific PQC algorithms, with a strong recommendation to start with NIST's primary standards: ML-DSA (formerly Dilithium) for signatures and ML-KEM (formerly Kyber) for key encapsulation.

Phase 2: Hybrid Cryptography Implementation

In this development phase, implement hybrid cryptographic schemes. Instead of replacing algorithms outright, combine a classical algorithm with a PQC algorithm. For example, a transaction signature could be a concatenation of both an ECDSA signature and an ML-DSA signature (Sig = ECDSA_Sig || ML-DSA_Sig). This ensures backward compatibility—nodes running older client software can still validate the classical portion of the signature. Implement this at the protocol level, updating serialization formats (like RLP or SSZ) and validation logic. Crucially, design a clear versioning or flagging mechanism within transactions or blocks to signal the use of hybrid or pure PQC signatures, allowing the network to manage the transition smoothly.

Phase 3: Controlled Activation & Monitoring

Activate the new hybrid cryptography via a scheduled network upgrade (hard fork). Initially, configure the network to accept both hybrid and classical signatures, but only require hybrid signatures for new transactions after a specific block height. This creates a grace period. Deploy extensive on-chain and off-chain monitoring: track the adoption rate of hybrid transactions, validator participation using PQC keys, and any impact on block propagation times or gas costs. Use a testnet or a shadow fork of the mainnet to run the new client software in parallel with real mainnet data, providing a final staging environment before full mainnet deployment.

Phase 4: Full Migration & Legacy Decommissioning

The final phase involves deprecating classical cryptography. After a long-term monitoring period confirms stability, schedule a subsequent hard fork to make PQC signatures mandatory for all new transactions. Define and execute a legacy transaction sunset policy, giving users and applications a final deadline to migrate. Update all network infrastructure, including block explorers, indexers, and wallet providers, to fully support the new PQC primitives. The transition is complete when the protocol validation rules no longer accept the old classical signatures, and the cryptographic agility framework is proven, enabling future algorithm upgrades with minimal friction.

prerequisites
STRATEGY

Prerequisites for a PQC Upgrade Plan

A successful transition to post-quantum cryptography (PQC) requires a structured, phased approach. This guide outlines the essential prerequisites for planning a secure and manageable PQC upgrade for a blockchain mainnet.

The first prerequisite is a comprehensive cryptographic inventory. You must audit your entire protocol stack to identify every component that relies on classical public-key cryptography. This includes signature schemes like ECDSA or EdDSA for transaction signing, key exchange mechanisms such as ECDH for secure channels, and any use of hash-based commitments. Tools like dependency scanners and manual code reviews are necessary. For example, you need to check consensus clients, RPC layers, wallet software, and smart contract libraries. Documenting each component's role, library dependencies, and integration points is critical for assessing the scope of the upgrade.

Next, establish a clear risk assessment and prioritization framework. Not all cryptographic uses carry the same quantum risk. Immediate threats are to digital signatures, as a quantum computer could forge them to steal funds. Longer-term threats may involve encrypted data at rest. Prioritize upgrading components that protect live assets, such as transaction validation and wallet key generation. You should also evaluate the cryptographic agility of your current system—how easily can algorithms be swapped? Systems with hardcoded algorithms or monolithic architecture will require more extensive refactoring before PQC migration can begin.

The third prerequisite is selecting and testing PQC algorithm candidates. Rely on standards from NIST, which has finalized algorithms like CRYSTALS-Kyber for key encapsulation and CRYSTALS-Dilithium for digital signatures. However, blockchain systems have unique constraints like signature size and verification speed, which directly impact gas costs and block propagation. You must run extensive benchmarks in a testnet environment. For instance, a Dilithium2 signature is ~2.5KB, compared to 64-72 bytes for ECDSA. This 40x increase can significantly bloat transaction size, requiring protocol-level adjustments to block gas limits and state storage costs.

Finally, plan for backward compatibility and a hybrid transition period. A sudden, hard-fork switch to PQC algorithms could break existing wallets and tooling. A phased plan often starts with implementing hybrid signatures, where a transaction is signed with both a classical algorithm (e.g., ECDSA) and a PQC algorithm (e.g., Dilithium). This dual-signature scheme maintains compatibility while introducing quantum resistance. Your upgrade plan must define the phases: testnet deployment, optional hybrid mode on mainnet, mandatory hybrid mode, and finally, deprecation of the classical algorithm. Each phase requires clear communication, developer tooling updates, and defined activation epochs or block heights.

key-concepts
MAINNET MIGRATION

Core PQC Upgrade Concepts

A structured, phased approach is critical for mainnet security. These concepts outline the key planning stages for integrating Post-Quantum Cryptography.

01

Establish a Cryptographic Inventory

The first step is a complete audit of all cryptographic primitives in your protocol. This includes:

  • Digital signatures (ECDSA, EdDSA) for transactions and consensus.
  • Key encapsulation mechanisms (KEMs) for encrypted peer-to-peer communication.
  • Hash functions used in Merkle proofs and commitment schemes.

Map each primitive to its specific function and associated risk level. For example, a signature scheme securing a $1B bridge is a higher priority than a hash function for internal logging.

02

Define a Hybrid Cryptography Strategy

A direct cutover to PQC algorithms is risky. Implement a hybrid mode that runs classical and post-quantum algorithms in parallel.

Example: For signatures, a transaction could include both an ECDSA signature and a Dilithium signature. The network validates both during a transition period. This provides cryptographic agility and allows for a rollback if vulnerabilities are discovered in the new PQC standard, such as those selected by NIST (ML-DSA, SLH-DSA, Falcon).

03

Create a Staged Rollout Roadmap

Break the upgrade into isolated, testable phases to minimize systemic risk.

Phase 1 (Testnet): Deploy hybrid cryptography in a controlled environment like a dedicated testnet or devnet. Monitor performance impact (e.g., larger signature sizes increasing block weight). Phase 2 (Mainnet, Opt-in): Enable hybrid cryptography behind a governance-gated feature flag. Allow validators/node operators to opt-in. Phase 3 (Mainnet, Enforcement): After sufficient uptime and security review, activate the upgrade via a hard fork, making PQC mandatory.

04

Plan for Key and State Migration

PQC upgrades often require new key formats. You must design a secure migration path for existing user assets and validator states.

  • User Accounts: Provide tools for users to re-secure wallets with PQC keys, potentially using a key rotation transaction that signs with the old key to authorize the new one.
  • Validator Sets: Coordinate a validator upgrade schedule, ensuring the network maintains finality during the transition. This may involve temporary increases in the governance voting period to ensure broad participation.
05

Integrate with External Dependencies

Your mainnet does not exist in a vacuum. Audit and coordinate with critical infrastructure.

  • Oracles & Bridges: Ensure providers like Chainlink and cross-chain bridges (e.g., Wormhole, LayerZero) support the new signature schemes for verifying state proofs.
  • Wallets & Explorers: Work with wallet providers (MetaMask, Phantom) and block explorers (Etherscan, Solscan) to ensure they can parse, display, and validate PQC transactions and addresses.
  • Custodians & Exchanges: Provide advanced notice to institutional partners for integration into their signing systems.
06

Implement Continuous Monitoring & Rollback Plans

Post-upgrade, establish enhanced monitoring for network health and security.

  • Fork Monitors: Deploy tools to detect chain splits caused by node version inconsistencies.
  • Performance Metrics: Track block propagation times, signature verification latency, and mempool size to catch performance degradation.
  • Clear Rollback Triggers: Define objective metrics (e.g., >33% of validators offline, critical vulnerability disclosure) and a pre-approved governance proposal to execute an emergency rollback to the classical cryptography fork.
NETWORK UPGRADE COMPARISON

PQC Upgrade Paths: Hard Fork vs. Soft Fork vs. Hybrid

A comparison of the primary mechanisms for implementing a post-quantum cryptography (PQC) upgrade on a blockchain mainnet.

FeatureHard ForkSoft ForkHybrid Approach

Consensus Break

Partial

Backward Compatibility

Network Split Risk

High

Low

Medium

Node Upgrade Coordination

Mandatory for all nodes

Only for miners/validators

Phased by node type

Typical Timeline

Single activation block

Gradual activation (e.g., 95% threshold)

Multi-phase over 6-18 months

PQC Algorithm Rollout

Full replacement at fork

Coexistence period (e.g., BIP-340)

Dual-signing during transition

Developer Impact

High (requires client updates)

Low (backwards-compatible)

Medium (targeted library updates)

Example Protocol

Monero (regular hard forks)

Bitcoin (SegWit activation)

Ethereum (post-merge upgrades)

phase-1-testnet-deployment
IMPLEMENTATION BLUEPRINT

Phase 1: Testnet Deployment and Algorithm Testing

The first phase of a Post-Quantum Cryptography (PQC) migration focuses on deploying and rigorously testing new cryptographic primitives in a controlled, isolated environment before any mainnet changes.

Begin by establishing a dedicated testnet or a forked version of your mainnet state. This environment must mirror your production chain's architecture, including its consensus mechanism, virtual machine, and transaction types. The primary goal is to integrate candidate PQC algorithms—such as CRYSTALS-Kyber for key encapsulation or CRYSTALS-Dilithium for digital signatures—into your node software. This involves modifying core libraries like libp2p for peer identity, transaction serialization formats, and block validation logic. Use this phase to identify any fundamental incompatibilities, such as increased signature sizes breaking block gas limits or slower verification times impacting consensus finality.

Algorithm testing is not a single evaluation but a multi-faceted process. You must benchmark performance across critical metrics: signature generation/verification latency, key pair generation time, and the size overhead for keys and signatures. For example, a Dilithium2 signature is ~2.5KB, compared to ~64 bytes for secp256k1. Test how this impacts block propagation and storage. Furthermore, conduct cryptographic agility tests by implementing a hybrid mode, where transactions can be signed with either the classical (e.g., ECDSA) or the new PQC algorithm. This ensures backward compatibility and a smoother transition path, allowing you to measure the system's behavior under mixed cryptographic regimes.

Finally, this phase must include comprehensive security and failure analysis. Subject the PQC-integrated testnet to adversarial testing, including fuzzing transaction inputs and simulating network partitions. Monitor for unexpected crashes, memory leaks, or consensus failures. It is also crucial to test rollback procedures. Document and practice a clear process for reverting the testnet to its pre-PQC state in case of critical vulnerabilities. The deliverable of Phase 1 is a hardened, benchmarked testnet deployment with defined performance baselines, a list of required protocol adjustments (like increasing block size), and a validated rollback plan, providing the empirical data needed to proceed to Phase 2.

phase-2-wallet-sdk-upgrade
PHASE 2: WALLET AND SDK UPGRADES

How to Plan a Phased PQC Adoption for Your Mainnet

This guide details the second phase of a Post-Quantum Cryptography (PQC) migration, focusing on upgrading wallet software and developer SDKs to prepare for a secure mainnet transition.

After completing the foundational signature scheme audit in Phase 1, the next critical step is to upgrade the ecosystem's wallet software and Software Development Kits (SDKs). This phase directly impacts developers and end-users, requiring careful coordination to maintain functionality and security. The primary goal is to integrate the new PQC signature algorithms—such as CRYSTALS-Dilithium or SPHINCS+—into the libraries that applications use to generate keys, sign transactions, and verify signatures. This creates a parallel, quantum-safe environment that can operate alongside the existing classical one.

Begin by forking and upgrading your core cryptographic libraries. For an Ethereum Virtual Machine (EVM) chain, this means modifying libraries like ethers.js, web3.js, or viem to support PQC algorithms. The implementation must expose new API endpoints for PQC key generation (generatePQCKeyPair) and signing (signPQCTransaction). Simultaneously, wallet providers like MetaMask or Rabby need to integrate these updated libraries into their extension codebase to allow users to create and manage PQC-secured accounts. This stage requires extensive unit and integration testing in a dedicated devnet environment.

A key technical challenge is managing key and signature size. PQC algorithms like Dilithium2 produce signatures ~2KB in size, compared to ECDSA's 65 bytes. Your upgraded SDKs and wallet backends must handle this increased data load for transaction serialization, RPC calls, and block propagation. You'll need to update serialization formats (e.g., RLP, SSZ) and ensure network clients and RPC nodes can process the larger payloads without performance degradation. This often involves protocol-level changes that must be backward-compatible during the transition.

Developer education and tooling are crucial for adoption. Update all documentation, release migration guides for dApp developers, and provide clear examples of how to sign transactions with the new PQC APIs. Establish a testnet faucet that dispenses PQC-secured test tokens, allowing developers to experiment. Host workshops and office hours to address integration issues. The success of this phase is measured by the number of dApps and infrastructure projects successfully building and testing on the PQC-enabled devnet.

Finally, plan a dual-signature period for the mainnet launch. During this time, the network should accept both classical (ECDSA/secp256k1) and PQC signatures for transaction validation. This grace period allows users and applications to migrate at their own pace without breaking existing functionality. Your upgraded wallets should support both signature schemes, clearly indicating which account type is being used. This phased approach within Phase 2 minimizes disruption and provides a clear, testable path toward a fully quantum-resistant mainnet.

phase-3-consensus-layer-fork
EXECUTION

Phase 3: Coordinating the Consensus Layer Fork

This phase details the technical execution of the mainnet hard fork to activate post-quantum cryptography (PQC) at the consensus layer, requiring precise coordination across node operators and client teams.

The consensus layer fork is a coordinated network upgrade that activates the new PQC signature scheme (e.g., CRYSTALS-Dilithium) for block proposers and attesters. This requires a hard fork because it modifies core consensus rules, specifically the BLSSignature domain and the signature verification logic within the beacon state transition function. All consensus clients (e.g., Prysm, Lighthouse, Teku) must run a compatible version that includes the PQC libraries and updated BLS12-381 to PQC wrapper logic. The fork is triggered by a specific epoch number, defined in the fork configuration (e.g., PQC_FORK_EPOCH) that is agreed upon by client developers and communicated through channels like Ethereum Improvement Proposals (EIPs) or network upgrade announcements.

Node operators must prepare their infrastructure for the fork. This involves:

  • Upgrading all consensus and execution clients to the PQC-compatible versions before the fork epoch.
  • Verifying the new PQC public keys for their validators are correctly loaded into the validator client.
  • Ensuring sufficient disk space and memory for potential increases in state size or computational overhead from PQC operations. Coordination is critical; a significant minority of nodes failing to upgrade will cause a chain split. Tools like Ethereum Node Tracker can help monitor upgrade adoption. A successful fork requires >66% of the network's stake to be running the new software, maintaining finality.

Post-fork, immediate monitoring is essential. Client teams and community members should watch for:

  • A sudden drop in participation rate, indicating validators with outdated software.
  • An increase in missed blocks or attestations due to PQC signature performance issues.
  • Any inconsistencies in fork choice rule behavior. Slashing protection must be rigorously tested, as validators running mixed software (old and new) could be slashed for signing conflicting messages. The fork also establishes a new signing_domain for PQC signatures, segregating them from classical BLS signatures in the consensus protocol. This phase concludes when the network achieves finality with the new rules and demonstrates stable block production with PQC signatures, paving the way for the final integration phase.
phase-4-smart-contract-transition
PHASE 4

Smart Contract and dApp Transition

This phase involves upgrading the application layer, including smart contracts, wallets, and decentralized applications, to be compatible with the new post-quantum cryptographic primitives.

The transition of your smart contract ecosystem is the most complex and critical phase of PQC adoption. Unlike protocol-level changes, this requires coordination with external developers and dApp teams. The primary goal is to ensure all on-chain logic that verifies signatures or uses cryptographic functions—such as multi-signature wallets, token vesting contracts, or identity protocols—is updated to use the new PQC algorithms. This is not a simple library swap; it requires a meticulous audit of every contract's cryptographic dependencies and a clear migration path for live applications.

Begin by creating a comprehensive inventory of all smart contract standards and critical dApps on your mainnet. Focus on contracts that perform signature verification (e.g., ECDSA ecrecover), hashing, or other crypto operations. For Ethereum Virtual Machine (EVM) chains, this includes reviewing popular libraries like OpenZeppelin and common patterns in DeFi and NFT projects. Develop and publish reference implementations of PQC-secure contracts, such as a PQC-enabled multi-sig wallet using CRYSTALS-Dilithium for signatures. Provide clear documentation and testing suites to help developers validate their upgrades.

A phased rollout is essential to avoid ecosystem-wide breakage. Implement a dual-signing period where the network accepts both classical (e.g., ECDSA) and post-quantum signatures for a defined time window. This allows dApps to transition gradually. During this period, monitor network performance closely, as PQC signatures and keys are larger, impacting gas costs and transaction throughput. Tools like Hardhat or Foundry can be used to simulate these new transaction types and their economic impact on users before mandating the change.

Finally, establish clear developer support and incentives. This includes grants for dApp teams to upgrade their contracts, hosting workshops, and providing security audit subsidies. The transition is complete when all major dApp front-ends and wallets (e.g., MetaMask integrations) support PQC transaction signing and the dual-signing period can be safely concluded, leaving the network secured against quantum threats at every layer.

STRATEGY COMPARISON

PQC Rollup Risk Mitigation Matrix

Comparison of risk mitigation strategies for a phased PQC adoption on a mainnet, focusing on operational impact and security trade-offs.

Risk FactorHybrid Signature SchemePQC-Only SidechainDelayed PQC Activation

Quantum Readiness Timeline

Immediate (6-12 months)

Immediate (3-6 months)

Deferred (24+ months)

Mainnet Consensus Risk

Requires Hard Fork

Smart Contract Compatibility Risk

Low

High

Low

Key Management Overhead

High (2x keys)

Low

Low

Average TX Cost Increase

15-30%

5-10%

0%

Third-Party Dependency (Bridge/Rollup)

Post-Quantum Security Guarantee

Conditional

Full

None

IMPLEMENTATION GUIDE

PQC Mainnet Adoption FAQ

Planning a phased transition to post-quantum cryptography for your mainnet? This FAQ addresses common technical questions and implementation hurdles faced by protocol developers.

Adopting PQC is a proactive defense against "harvest now, decrypt later" attacks. Adversaries can record encrypted blockchain transactions today and decrypt them later once a sufficiently powerful quantum computer exists. This retroactive attack vector threatens all data secured by vulnerable algorithms like ECDSA and RSA. Starting the migration now provides a crucial head start on a complex, multi-year process that involves protocol upgrades, key management changes, and community coordination. Early adopters also gain security marketing advantages and help standardize best practices for the entire ecosystem.

conclusion-next-steps
IMPLEMENTATION ROADMAP

Conclusion and Next Steps

A phased PQC adoption plan is essential for mitigating quantum risk without disrupting mainnet stability. This conclusion outlines key takeaways and actionable next steps for your team.

Successfully planning a phased PQC adoption requires a foundation of cryptographic inventory and risk assessment. Your first step is to catalog all systems using digital signatures (like ECDSA for validator keys or Ed25519 for consensus) and key encapsulation mechanisms (KEMs) used in encrypted peer-to-peer communication. Tools like Chainguard's wolfictl can help automate dependency scanning. Prioritize components based on their exposure and the value they protect; validator signing keys and cross-chain bridge authorizations are typically highest risk.

Begin the preparation phase by integrating hybrid signature schemes into your development and testing environments. For example, prototype using NIST-standardized algorithms like CRYSTALS-Dilithium alongside your existing ECDSA signatures in a Sign(ECDSA) || Sign(Dilithium) format. This maintains backward compatibility while introducing PQC. Simultaneously, engage with your validator community and infrastructure providers (e.g., node hosting services, RPC providers) to communicate the roadmap and gather requirements for client software updates.

The execution phase starts on a long-running testnet fork. Implement and activate the hybrid signatures in a controlled environment, monitoring for performance impacts on block propagation time and validator hardware requirements. Use this phase to finalize governance proposals for mainnet. The final mainnet deployment should be coordinated via a clear, scheduled hard fork. Post-upgrade, establish a crypto-agility framework—a process for future cryptographic transitions—ensuring your protocol can respond to new threats or standards without another multi-year migration.

How to Plan a Phased PQC Adoption for Your Mainnet | ChainScore Guides