Solana Co-Founder Warns AI Could Break Post-Quantum Cryptography, Calls for Multi-Sig Safeguards

2 hour ago 2 sources neutral

Key takeaways:

  • Yakovenko's AI warning shifts crypto security focus from future quantum to present machine learning threats.
  • Solana's PDA-based PQC solution could create a competitive advantage over Ethereum L2s in post-quantum readiness.
  • Developer velocity on Solana's formal verification suggests short-term network upgrades are more actionable than abstract quantum risks.

Solana co-founder Anatoly Yakovenko has issued a stark warning that artificial intelligence could crack cryptographic signature schemes designed to resist quantum computers. In a series of posts on X, Yakovenko argued that the crypto industry does not fully understand the implementation vulnerabilities in post-quantum cryptography (PQC) and that AI-powered attacks pose a more immediate threat than hypothetical quantum machines.

The discussion began when developer @shek_dev posted on X that Solana was about to get “quantum-mogged,” referencing a live GitHub pull request from contributor abishekk92 that introduced a formal verification suite for a Falcon-512 signature verifier—a quantum-resistant signature scheme. The pull request involved thousands of lines of formal verification, including Lean proofs, Kani harnesses, and Miri memory safety checks, covering byte-level codec canonicality and NTT kernel correctness.

Yakovenko responded directly, stating that the biggest current risk is AI breaking PQC signature schemes. He noted that the industry has limited understanding of both the mathematical attack surface and the real-world deployment gaps. He proposed two countermeasures: 2-of-3 multi-signature wallet support for PQC, and native protection built directly into the transaction processor through Program Derived Addresses (PDAs). In a separate reply, he suggested a syscall to lift PDA is_signer status to the transaction processor level, with fees charged to valid signers at the end of each block.

Benchmarks from the formal verification branch showed zero change in compute units against master—195,786 CUs on both sides. The new try_prepare_pubkey function costs approximately 99k CUs, similar to the original. However, Yakovenko emphasized that formal verification does not yet cover whole-pipeline NTT correctness as a formal statement, leaving gaps that AI could exploit.

Yakovenko also criticized Ethereum layer-2 networks on May 2, stating: “Ethereum L2s are not quantum safe, abandon all hope.” He pointed out that most L2 wallets still rely on the Elliptic Curve Digital Signature Algorithm (ECDSA) with the secp256k1 curve, which becomes vulnerable once public keys are exposed on-chain. This opens the door to “harvest now, decrypt later” attacks, where adversaries collect encrypted data today and decrypt it once quantum computing—or AI-powered decryption—evolves sufficiently.

Falcon-512 is being adopted because it resists attacks from quantum computers using Shor’s algorithm. However, Yakovenko’s broader message is that even next-generation cryptographic solutions are not foolproof, and the industry must prepare for unexpected risks as AI continues to advance.

Previously on the topic:
Apr 28, 2026, 7:49 a.m.
Solana Prepares for Quantum Threats with Falcon Signature Scheme
Disclaimer

The content on this website is provided for information purposes only and does not constitute investment advice, an offer, or professional consultation. Crypto assets are high-risk and volatile — you may lose all funds. Some materials may include summaries and links to third-party sources; we are not responsible for their content or accuracy. Any decisions you make are at your own risk. Coinalertnews recommends independently verifying information and consulting with a professional before making any financial decisions based on this content.