Quantum computing has emerged as a pressing concern for many within the financial technology sector, particularly for those invested in cryptocurrencies like XRP and Bitcoin. This growing apprehension is rooted in recent assertions by Google, which suggested that a sufficiently powerful quantum machine could compromise legacy blockchains more easily than originally predicted.
For XRP holders, the situation seems somewhat less precarious compared to Bitcoin, thanks in part to the architecture of the XRP Ledger (XRPL). XRP operates on this open-source, decentralized blockchain, which was co-founded by Ripple, a prominent fintech company.
The core issue at hand revolves around the fundamental cryptographic structures shared by major blockchains. Each utilizes a private key—a confidential password that signs and executes transactions—derived from a public key, which is shared to receive funds. The crux of the quantum vulnerability is identified in the potential of a quantum computer running Shor’s algorithm to reverse-engineer the private key from the public one, thereby allowing access to funds stored in the wallet.
This week, XRP Ledger’s validator, Vet, conducted a quantum vulnerability audit of the ledger. The audit revealed that approximately 300,000 XRP accounts, containing a total of 2.4 billion XRP, have never sent any funds and thus have not exposed their public keys. Consequently, these accounts are considered quantum-safe by default. Interestingly, there are also dormant accounts that have previously transacted and have exposed their public keys; however, most of these transactions occurred over five years ago, making them inactive and vulnerable.
Notably, Vet identified two such accounts in the XRP Ledger, which together hold 21 million XRP. While this amount may appear significant, it represents only 0.03% of XRP’s circulating supply. The risk of quantum exposure increases for accounts that have not utilized the “key rotation” feature offered by XRPL, which allows users to change their signing key without moving funds—akin to changing a home’s lock without relocating.
Mayukha Vadari, a staff software engineer at Ripple, highlighted additional defenses against quantum risks, such as the “escrow feature.” This feature secures funds with a time lock, preventing withdrawal until a specified duration elapses. While this method isn’t foolproof—since a quantum attacker could potentially gain control of the account—it does offer a layer of protection against immediate threats.
When comparing XRP to Bitcoin in terms of quantum vulnerability, Bitcoin appears significantly more at risk. Early forms of Bitcoin utilized a format that directly exposed public keys in transaction outputs. Estimates suggest that approximately 6.9 million BTC are vulnerable, accounting for nearly 35% of Bitcoin’s circulating supply, a stark contrast to XRP’s 0.03%.
Bitcoin holders face additional challenges due to the blockchain’s lack of a key rotation feature, which means that those aware of potential risks can only move their funds to a new, unexposed address. However, while transferring funds, the transaction temporarily resides in a memory pool for about ten minutes, during which the public key of the old address is still exposed, creating an opening for quantum exploitation.
Although the threat posed by quantum computing remains largely theoretical at this stage, it underscores the structural vulnerabilities that Bitcoin holders face, prompting developers to explore initiatives aimed at enhanced quantum resistance. Meanwhile, XRP holders can take comfort in a design that may afford them a greater degree of safety amid evolving technological challenges.


