Skip to content

Latest commit

 

History

History
175 lines (125 loc) · 8.6 KB

File metadata and controls

175 lines (125 loc) · 8.6 KB

QRTB: Quantum-Resistant Temporal Blockchain

Consensus of Measurement | 16M TPS | SHA3-256 Only | Quantum Irrelevant

Author: Andrew Dorman (ACD421)


Overview

QRTB is a post-quantum security primitive and blockchain built on SHA3-256 (FIPS 202). No elliptic curves. No RSA. No lattices. Quantum computers are structurally irrelevant -- Shor has no algebraic structure to attack, and breaking a single commitment within the 60-second protocol window requires 1.93 x 10^78 fault-tolerant qubits (1.9% of all atoms in the observable universe). Currently ~1,200 exist.

The protocol introduces Consensus of Measurement, a new consensus family where validators collectively measure physical network round-trip times and reach consensus through that collective act. The measurement process IS the consensus process. The only strategy indistinguishable from honest behavior is honest behavior.

Key Properties

  • 16M TPS on consumer hardware (6 zones x 15 shards x ~173K TPS/shard integrated on RTX 4070)
  • SHA3-256 only: One primitive. FIPS 202 standardized. No algebraic structure to break.
  • Quantum irrelevant: No algebraic structure for Shor. Grover gives 2^128 -- physically impossible.
  • 1022+2 key design: Unlimited wallet lifetime with forward secrecy. 1022 transaction keys + 2 reserved rotation keys per batch. No key exhaustion.
  • Anti-centralization: RTT measurement detects co-located validators. Datacenter concentration is slashable.
  • Epoch-atomic finality: Nothing committed until end-of-epoch BFT consensus. Eliminates quantum observation windows.
  • DoD forward secrecy: Meets CNSA 2.0, NIST SP 800-208, FIPS 202.

Architecture

Python Implementation (src/)

Module Lines Description
crypto.py 514 SHA3-256/512, WOTS+ (67 chains, w=16, n=32), Merkle trees, TemporalAuthTree (1022+2), secure key wipe via ctypes
transaction.py 895 8 transaction types (TRANSFER, STAKE, UNSTAKE, SLASH, COINBASE, DATA, REGISTER, ROTATE_AUTH), UTXO model, AuthRegistry, TransactionValidator
wallet.py 895 KeyManager with batch-based temporal auth, registration/rotation lifecycle, transaction building
consensus.py 530 BFT three-phase voting, deterministic proposer selection, equivocation detection, registered-stake enforcement
measurement.py 401 RTT measurement protocol, commit-reveal scheme, 6 geographic zones with 30 cities
detection.py 353 Four-signal adversary detection: ratio analysis, triangle inequality, variance, path consistency
epoch.py 428 15-minute epoch lifecycle, four-source entropy well (network, blockchain, external beacons, historical)
block_producer.py 552 Block templates, coinbase, parallel zone production, block finalization
validator.py 405 Complete validator node coordinating all subsystems
network.py 493 Multi-validator testnet simulation with zone-based message routing
storage.py 688 SQLite-backed persistence: blocks, transactions, state, auth registry
performance.py 777 Batch WOTS+ verification, sharded UTXO (256 shards), parallel Merkle, transaction pipeline

Native Implementation (native/)

  • Rust (native/src/): WOTS+, SHA3, Merkle trees, TemporalAuthTree with zeroize, end-to-end TPS benchmark with rayon
  • C (native/csrc/): SHA3 (Keccak-f[1600]), WOTS+, Merkle tree, TemporalAuthTree -- portable C99
  • CUDA (native/cuda/): GPU-parallel WOTS+ batch verification, custom Keccak kernel
  • Cross-validation: Rust, C, and Python produce bit-identical output for all operations (verified via FFI test harness)

Benchmarks

All measured on a single laptop (16-core CPU, RTX 4070 GPU, 8 GB VRAM).

Throughput

Platform Verify/s Per-Shard TPS 90-Shard TPS
Python (1 core) 2,721 2,715 244,350
Python (8 cores) 13,673 13,541 1,218,690
Rust (16 cores, rayon) 53,472 51,160 4,604,400
CUDA RTX 4070 177,260 ~173,000 ~15,570,000

Native Cryptographic Primitives (Rust, Criterion-verified)

Operation Time Throughput
SHA3-256 (32B) 273 ns 3.7M ops/s
WOTS+ Keygen 285 us 3,500/s
WOTS+ Sign 147 us 6,800/s
WOTS+ Verify 119 us 8,400/s
Merkle Build (1024 leaves) 527 us 1,900/s
Merkle Proof Verify 2.6 us 385K/s

Integrated Pipeline (full validation stack)

Per-shard throughput includes: structure validation, UTXO check, WOTS+ signature verification, temporal auth Merkle proof verification, value conservation, and UTXO state update. Auth proof adds 2.3% overhead to WOTS+ verify.

Platform Integrated TPS/shard 90-shard TPS
Python (single core) ~14,000 ~1,260,000
Rust (16 cores, estimated) ~272,000 ~24,500,000
CUDA RTX 4070 (estimated) ~173,000 ~15,570,000

Network Simulation

Validators Adversary % Finalization Detection False Positive
15 (3 zones) 20% 100% 100% 0.00%
90 (6 zones) 10% 100% 100% 0.25%
300 (6 zones) 25% 100% 99.4% 0.19%
300 (12 zones) 33% 100% 96.9% 0.20%

Security Properties

Quantum irrelevant -- concrete qubit math:

Breaking QRTB requires a Grover search on SHA3-256 (Keccak-f[1600]). Each oracle: ~6,000 logical qubits = ~6 million physical qubits per machine (surface code, 10^-3 error rate), ~100ms per query.

Attack Protocol Window Parallel Machines Total Qubits vs Today (~1,200)
Forge Merkle proof 60s (commit-reveal) 4.13 x 10^45 2.48 x 10^52 10^49 x gap
Forge WOTS+ signature 15 min (epoch) 1.43 x 10^69 8.6 x 10^75 10^72 x gap
Break commitment 60s (commit-reveal) 3.21 x 10^71 1.93 x 10^78 10^75 x gap

The weakest attack needs 2.48 x 10^52 qubits -- the mass of 4 billion Earths converted to fault-tolerant quantum hardware. Current trajectory: ~1M qubits by 2050. Gap: 46 orders of magnitude.

Why not lattice-based PQC (ML-DSA/Dilithium)?

NIST standardized ML-DSA as the primary post-quantum signature (FIPS 204). Multiple 2025-2026 papers demonstrate devastating side-channel attacks:

  • Full key recovery in 30-300 power traces (ePrint 2026/056, 2025/582)
  • Key recovery in under 1 minute via NTT-to-SIS attack (Keysight, Nov 2025)
  • 10-68x improvement over prior art every few months (ePrint 2026/472)
  • Hedged mode provides zero side-channel protection
  • The attack surface is structural: NTT multiplication, rejection sampling, polynomial arithmetic all leak secrets

NIST standardized SLH-DSA (hash-based) and selected HQC (code-based) explicitly as lattice insurance. QRTB builds on the same foundation as SLH-DSA -- hash functions only -- but as a complete protocol, not just a signature scheme.

QRTB has no polynomial arithmetic, no NTT, no rejection sampling, no secret-dependent branching. Hash functions are constant-time by construction. The implementation attack surface is structurally absent.

Additional properties:

  • Forward secrecy: One-way batch seed chain (SHA3-512). Past keys irrecoverable after rotation. Secure destruction via ctypes.memset (Python) / zeroize (Rust) / memset (C)
  • Epoch-atomic finality: All state tentative until BFT consensus at epoch end. No quantum observation window.
  • Self-correcting punishment: Detection -> slashing -> stake erosion -> honest convergence
  • Geometric hardness: Triangle inequality creates O(N^2) constraints from O(N) measurements

Quick Start

# Clone
git clone https://github.com/ACD421/qrtb.git
cd qrtb

# Run the live demo (registration -> transfer -> rotation)
python run_live.py

# Run the testnet simulation (6 zones, 90 validators, 10% adversary)
python run_testnet.py --full

# Run integration tests
python test_integration.py

# Run security unit tests
python tests/test_basic.py

# Python TPS benchmark (multiprocessing)
python bench_tps.py

Building Native (Rust + C)

cd native
cargo build --release
cargo run --release                    # Cross-validation + primitive benchmarks
cargo run --release --bin bench_tps    # End-to-end TPS with rayon parallel verification
cargo bench                            # Criterion benchmarks

GPU Benchmark (CUDA)

cd native/cuda
nvcc -O3 -arch=sm_89 -o wots_verify.exe wots_verify.cu
./wots_verify.exe

Whitepaper

See WHITEPAPER.md for the full technical paper including Consensus of Measurement, the 1022+2 design, security analysis, and complete benchmark data.

License

Proprietary License. See LICENSE.