Satoshi is SHA-256: SS256 Roadmap Fundamental Policy
SS256 is not a project aimed at short-term narratives or one-time “quantum resistance” claims. Instead, it addresses real and present cryptographic structural issues faced by currently operating blockchain systems, and establishes a foundation that can evolve in a verifiable and sustainable manner toward future quantum computing environments.
This roadmap is built on a clear separation between problems that can already arise today and problems that will inevitably emerge in the future, and addresses them in a staged and rational sequence.
2026 Q1 - Q2 Phase 1:
Directly Addressing the SHA-256 Problem
At the core of many Proof-of-Work blockchains, SHA-256 presents challenges that are independent of signature schemes and Shor’s algorithm. From a structural perspective, SHA-256-based systems exhibit strong affinity with quantum search algorithms (Grover’s algorithm) and quantum annealing approaches.
In this phase, SS256 focuses on:
- Re-examining the search-problem structure inherent in SHA-256-based designs
- Analyzing structural advantages and biases in mining and transaction verification processes
- Gradual migration toward hash designs that are inherently unfavorable to quantum search and quasi-quantum optimization techniques
This approach does not rely on the assumption that “quantum computing is still far away.” Instead, it treats risks that arise naturally from current computational progress and theoretical developments as practical engineering concerns.
2026 Q2 - Q4 Phase 2:
Transition Away from SHA-256 Dependency
(Including Practical SHA-256 Life-Extension Mechanisms)
Based on the findings and implementations from Phase 1, SS256 will proceed with a gradual transition away from dependency on SHA-256.
In this phase, SS256 also introduces practical life-extension mechanisms for SHA-256, designed to enable a controlled and economically stable transition without disrupting existing ecosystems.
Key considerations in this phase include:
- Hash designs that do not assume fixed internal structures or fixed output lengths
- Preventing reduction of the problem space to simple minimum-value search formulations
- Security evaluation frameworks that remain practical and implementable
- Life-extension techniques for SHA-256 that allow phased migration without immediate replacement
These life-extension mechanisms are not treated as a trivial “hash swap.” SS256 explicitly recognizes that SHA-256 is deeply embedded in economic incentives, consensus mechanisms, and operational infrastructure.
Accordingly, SS256 designs transition paths that:
- Minimize economic disruption for miners, operators, and users
- Preserve network stability during migration
- Allow coexistence of extended SHA-256-based mechanisms and next-generation hash designs during defined transition periods
The objective of this phase is to enable realistic and economically viable migration, rather than abrupt replacement, while preparing the system for full independence from SHA-256.
After 2027 Phase 3:
Continuous Research and Implementation of Quantum-Resistant Cryptographic Hash Functions
Within SS256, quantum resistance is not treated as a single, final destination.
Given the ongoing evolution of:
- Quantum computing hardware and architectures
- Search algorithms and optimization methods
- Developments within the cryptographic research community
SS256 formally commits to the continuous research, validation, and implementation of quantum-resistant cryptographic hash functions.
This phase also considers:
- Compatibility with post-quantum signature schemes
- Performance, size, and verification costs in real-world operation
- Long-term adaptability to emerging standards and best practices
- All designs in this phase assume long-term operation and gradual evolution, rather than static completion.
Design Philosophy of This Roadmap
SS256 does not claim “absolute quantum security” or “perfect resistance against all quantum attacks.” Instead, it adopts the following principles:
- Clearly identifying where the real problems lie
- Addressing solvable issues with verifiable solutions
- Preserving architectural flexibility to adapt to future uncertainties
Addressing the SHA-256 problem and pursuing quantum-resistant cryptographic hash development are not separate initiatives, but consecutive stages of a single, coherent technical challenge.
Notes
Specific timelines and milestones for each phase will be disclosed as verification and implementation progress allows.
Technical details will be published with transparency whenever feasible.