Quantum Security Posture
Cryptographic primitives and post-quantum security guarantees
Signatures
3,309 byte signatures, 1,952 byte public keys
Hashing
Poseidon2 over Goldilocks (t=16, α=7, Rf=8, Rp=14)
Proofs
100 FRI queries, blowup factor 8, 147 KB proofs
Key Exchange
Threshold encryption for MEV protection (Shamir 12/21)
Network Security Metrics
PQ-Protected Transactions
0
All signed with ML-DSA-65
Active Validators
0
All using PQ signatures
Proof Batches Verified
0
FRI-based STARK proofs
Post-Quantum Security Guarantee
All QBit cryptographic primitives are post-quantum secure. No elliptic curve, RSA, or classical cryptography is used anywhere in the protocol. Signatures use NIST-standardized ML-DSA-65 (FIPS 204), key exchange uses ML-KEM-768 (FIPS 203), and all proofs are hash-based STARKs with no trusted setup. The security floor is 120 bits, bounded by recursive STARK composition.