Quantum Security Posture

Cryptographic primitives and post-quantum security guarantees

Signatures

AlgorithmML-DSA-65
StandardFIPS 204
Security Level128-bit PQ security

3,309 byte signatures, 1,952 byte public keys

Hashing

AlgorithmSHA3-256 + Poseidon2
StandardFIPS 202
Security Level256-bit classical / 128-bit PQ

Poseidon2 over Goldilocks (t=16, α=7, Rf=8, Rp=14)

Proofs

AlgorithmFRI-based STARK
StandardPlonky3 AIR
Security Level~120-bit soundness

100 FRI queries, blowup factor 8, 147 KB proofs

Key Exchange

AlgorithmML-KEM-768
StandardFIPS 203
Security Level128-bit PQ security

Threshold encryption for MEV protection (Shamir 12/21)

Network Security Metrics

PQ-Protected Transactions

0

All signed with ML-DSA-65

Active Validators

0

All using PQ signatures

Proof Batches Verified

0

FRI-based STARK proofs

Post-Quantum Security Guarantee

All QBit cryptographic primitives are post-quantum secure. No elliptic curve, RSA, or classical cryptography is used anywhere in the protocol. Signatures use NIST-standardized ML-DSA-65 (FIPS 204), key exchange uses ML-KEM-768 (FIPS 203), and all proofs are hash-based STARKs with no trusted setup. The security floor is 120 bits, bounded by recursive STARK composition.