Why Post-Quantum?
Quantum computers threaten current cryptographic algorithms. A sufficiently powerful quantum computer could break ECDSA signatures, potentially allowing attackers to forge historical attestations. SESHAT implements ANSSI-compliant hybrid signatures combining classical and post-quantum algorithms.ANSSI Requirements
The French National Cybersecurity Agency (ANSSI) recommends:- Hybrid approach: Classical + PQC combined
- Timeline: 2027 no PQC = no qualification, 2030 mandatory
- Algorithms: ML-KEM-1024 / ML-DSA-87 (NIST Level 5)
Implementation
SESHAT uses hybrid ECDSA + ML-DSA:Security Levels
| Level | Algorithm | NIST Level | Security | Use Case |
|---|---|---|---|---|
| 44 | ML-DSA-44 | 2 | 128-bit | Fast, standard security |
| 65 | ML-DSA-65 | 3 | 192-bit | Balanced |
| 87 | ML-DSA-87 | 5 | 256-bit | Maximum security (default) |
Signature File
WhenENABLE_PQC=true, bundle_release generates SIGNATURE.pqc.json:
Key Derivation
ML-DSA keys are deterministically derived from your ETH private key using HKDF:- No separate key management
- Keys can be regenerated from ETH key
- Consistent across reinstalls
Verification
To verify a hybrid signature:- Extract both signatures from SIGNATURE.pqc.json
- Verify ECDSA with standard tools (ethers.js, etc.)
- Verify ML-DSA with
@noble/post-quantum - Both must pass for valid attestation
Future SESHAT versions will include a verification tool for easy signature checking.