🔐Post-Quantum Cryptography
🛡️ Principle: Quantum Resistance is Non-Negotiable
The cryptography of today won’t survive the quantum world of tomorrow.
JamLiquor integrates post-quantum cryptography (PQC) by design—not as a patch, but as a core modular extension that keeps the network resilient into the 2030s and beyond.
This document outlines how PQC works in JamLiquor, and how it can be adopted without sacrificing JAM compatibility.
⚠️ The Threat of Quantum Computing
Algorithms like Shor’s and Grover’s could soon break:
RSA, ECDSA
sr25519 (used in most Substrate-based chains)
BLS and SNARK-based crypto
Quantum-resilient systems need to:
Use lattice-based or hash-based cryptography
Prepare for migration paths today—not after compromise
✅ JamLiquor's PQC Strategy
JamLiquor uses modular PQC extensions:
1. Dilithium (CRYSTALS)
Lattice-based digital signature
NIST-standardized (2022, 2024)
2–4KB signature size (vs. 64B for ECDSA)
Suitable for JAM validators, work reports, judgments
2. Kyber (optional key exchange)
Module for encrypted messaging or shared secrets
JAM doesn’t require this, but future parachains might
3. XMSS (Hash-Based)
Stateless variant for resource-constrained validators
Very fast signing, longer verification
Used in certain bootstrapping tasks
🔄 JAM Compatibility
PQC support lives in
jamliquor-pqc/
Signature schemes are interchangeable via runtime contexts
Work Reports, validator judgments, and transaction signers can toggle PQ or classical modes
On-chain verifiers are optimized for batch validation
JAM’s modular signature layers make it ideal for cryptographic flexibility.
🧪 Module: jamliquor-pqc
jamliquor-pqc
Rust-first (via
pqcrypto
,orion
,dilithium
,kyber
)Selectable via Cargo feature flags (e.g.
--features pq-dilithium
)Signature abstraction implements JAM-style
Signer
/Verifier
traits
Storage Impact
Public key: 1–2KB
Signature: ~2.4–4KB
Performance:
Sign: ~1–2ms
Verify: ~2–5ms
🔐 Use Cases
🔒 Validator Judgments
Validators sign reports using Dilithium
Proofs are verifiable by importers
🔏 Quantum-Safe Work Reports
Authorers can sign blocks or extrinsics with PQ keys
🗃 Future Key Migration
Dual-signature support enables hybrid rollout
Classical + PQ keys for seamless transition
🛠 Deployment Tips
Use secure RNG hardware for PQ key generation
Limit bandwidth overhead by batching PQ signatures
Compress keys/signatures for gossip propagation
✅ Summary
Quantum attacks are not theoretical—they’re inevitable.
JamLiquor doesn’t wait for catastrophe. It makes PQC native, modular, and future-safe.
Security delayed is security denied.
Last updated