How Fhenix and Ethereum Are Racing a Quantum Clock Nobody Can See

What if the quantum attack on today’s encrypted internet had already started, and nobody told you?


That was the framing Fhenix pressed during its recent X Space on post-quantum cryptography, hosted by Founder Guy Zyskind with Ethereum Foundation developer Nicolas Serrano, Fhenix researcher Doron Zarchy, and Michael Cowart of VenturemindAI. The panel’s argument was uncomfortable in a specific way. The post-quantum transition is no longer a product roadmap waiting on a breakthrough. It is a migration the industry has already fallen behind on.

What was said, stripped down

Zyskind set the stakes: replacing the cryptography that underpins the internet is not a feature update, and the probability of a cryptographically relevant quantum computer arriving is no longer negligible. Serrano broke the threat into two distinct vectors. Zarchy surveyed the gap between standards and deployment, noting that most systems in production today are not post-quantum secure. Cowart grounded the conversation in enterprise risk.

https://x.com/fhenix/status/2044794366406095317?s=46&t=sTtv9w6thA6BUx_tq2fBWA&embedable=true


Guy Zyskind, Founder of Fhenix, explains,

We don’t know when it hits, and that is exactly why it is dangerous. It could be a decade away or much sooner. The same math behind FHE is likely to underpin post-quantum cryptography.


The context outside the livestream backs the urgency. In February 2026, Vitalik Buterin published a full quantum roadmap for Ethereum naming four vulnerable components: consensus-layer BLS signatures, KZG-based data availability, ECDSA account signatures, and zero-knowledge proofs. The Ethereum Foundation stood up a dedicated Post-Quantum team in January 2026, and Buterin has publicly said quantum risk could surface before the 2028 US election.

The attack already underway

Serrano’s sharpest point was that the quantum threat is not one event. It is two.


The first is harvest-now-decrypt-later. Adversaries intercept and archive encrypted traffic today, counting on a quantum machine capable of breaking it to arrive inside the shelf life of the data. The US Federal Reserve, NSA, CISA, and the EU’s cyber agency all now cite this as the working threat model. Expert analysis suggests harvested records could begin being decrypted around 2030.


Example, concrete: a trading firm routes encrypted order flow today. An attacker captures the traffic and stores it. In 2030, a quantum machine breaks the session keys. The firm’s strategies from 2026 become readable. No intrusion alert ever fires.


The second vector is signature forgery. Once attackers can derive private keys from exposed public keys, they sign transactions as the original holder. For public chains, that is the end of custody as it exists today.

The standards-adoption gap

Zarchy’s contribution was procedural. The mathematics is not the problem anymore.


NIST finalised its first three post-quantum standards in August 2024: FIPS 203 (ML-KEM, for key encapsulation), FIPS 204 (ML-DSA, for digital signatures), and FIPS 205 (SLH-DSA, a hash-based backup). A fifth algorithm, HQC, was selected in March 2025. The NSA’s CNSA 2.0 framework mandates post-quantum deployment for new classified systems by 2027 and full transition by 2035.


Standards are not the bottleneck. Implementation is. Historical cryptographic migrations take five to ten years. Every wallet, every HSM, every TLS endpoint, every smart contract has to move, and most operators are not talking publicly about their timelines.


The gap shows up in cost. On Ethereum, verifying an ECDSA signature today costs roughly 3,000 gas. A quantum-resistant check is estimated at 200,000 gas, a 66-fold jump. Buterin’s proposal uses recursive STARK aggregation to compress that overhead into one proof per tick. Most other Layer 1s have not published a plan at all.


Why FHE and post-quantum cryptography are converging

Fhenix has a commercial interest in this argument, but the technical claim stands on its own. The lattice-based mathematics beneath Fully Homomorphic Encryption, the primitive Fhenix uses to run encrypted computation on Ethereum, is the same family that secures CRYSTALS-Kyber and CRYSTALS-Dilithium in the NIST standards.


That matters for two reasons. First, building FHE-native systems today positions a protocol to be post-quantum-ready by construction, not by retrofit. Second, encrypting mempools with post-quantum primitives tackles front-running, MEV extraction, and quantum exposure at the same time. Zyskind has argued in earlier interviews that the privacy stack and the post-quantum stack are on track to collapse into a single layer.

Final thoughts

The value of the Fhenix conversation was not the warning. Warnings about quantum are cheap. The value was the honest framing of the bottleneck. The math exists. The standards exist. What does not exist is a migration path the broader ecosystem has agreed on, staffed for, and begun executing. Ethereum has at least named the four components at risk and sketched a multi-year path through them. Bitcoin is a harder coordination problem with no equivalent plan yet. Most consumer-facing infrastructure sits in the same position, only quieter about it.


The takeaway for builders is narrower than “add post-quantum to the roadmap.” It is to decide now whether the data and signatures a protocol handles today will still be sensitive in 2035, and to assume an attacker is collecting everything they can in the meantime. On that test, projects built on FHE-compatible foundations have an accidental head start. Everyone else faces a migration whose hardest part is not cryptography. It is persuading every wallet, every integrator, and every user to move at once.


Don’t forget to like and share the story!

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.