The Problem Is Not Tomorrow - It Is Today

The standard framing of quantum computing risk focuses on a future date when a sufficiently large quantum computer can break elliptic curve cryptography. Current estimates place this somewhere between 2030 and 2040, depending on the research you read. But this framing misses the immediate threat: Harvest Now, Decrypt Later (HNDL).

HNDL attacks involve adversaries capturing encrypted data and signed transactions today with the intention of decrypting them once quantum computers become capable. For settlement infrastructure, this is not a theoretical concern. Settlement records contain legally binding financial agreements. A transaction signed with ECDSA or Ed25519 today may need its cryptographic integrity verified years or decades from now - for audits, disputes, or regulatory investigations.

If the signature scheme that secured a settlement can be broken retroactively, the entire evidential chain collapses. This is why the migration timeline for settlement infrastructure is not "when quantum computers arrive" but "now."

What NIST Standardization Means

In 2024, NIST finalized its first set of post-quantum cryptographic standards: ML-KEM (based on CRYSTALS-Kyber) for key encapsulation and ML-DSA (based on CRYSTALS-Dilithium) for digital signatures. These algorithms are designed to resist attacks from both classical and quantum computers.

For settlement infrastructure, Dilithium is particularly relevant. It provides digital signatures that serve the same function as Ed25519 - authenticating transactions and proving that a specific party authorized a settlement - but with security guarantees that hold even against quantum adversaries.

The challenge is practical: Dilithium signatures are significantly larger than Ed25519 signatures (approximately 2,420 bytes versus 64 bytes), and key sizes are correspondingly larger. For systems processing thousands of settlements per second, this is not trivial.

The Dual-Signature Approach

JIL Sovereign implements a dual-signature architecture that provides quantum resistance without sacrificing the performance and ecosystem compatibility of classical cryptography. Every settlement transaction carries two signatures:

  • Classical signature (Ed25519): Provides immediate compatibility with existing blockchain ecosystems, wallets, and verification tools. This is the primary signature used for real-time settlement validation.
  • Post-quantum signature (Dilithium): Provides long-term cryptographic assurance. This signature ensures that even if Ed25519 is eventually broken, the settlement record remains cryptographically verifiable.

The dual-signature model means that the system does not depend on a single cryptographic assumption. If either algorithm is compromised, the other still provides security. This is sometimes called "hybrid cryptography" and aligns with guidance from NIST, the NSA (CNSA 2.0 suite), and the European Union Agency for Cybersecurity (ENISA).

Key Encapsulation and Secure Channels

Signatures are only half the picture. Settlement infrastructure also needs secure channels for transmitting sensitive data between validators, between clients and the network, and across bridge operations. JIL uses Kyber (ML-KEM) for key encapsulation in these channels.

When two validators establish a secure session - for example, during a cross-jurisdiction settlement that requires consensus from nodes in multiple compliance zones - the key exchange is performed using Kyber. This means that even if an adversary records the encrypted traffic today, they cannot decrypt it with a future quantum computer.

This is especially important for bridge operations, where settlement data crosses between JIL's network and external chains like Ethereum. The bridge relayer uses Kyber-encapsulated keys for its internal communications, ensuring that the coordination layer between chains is quantum-resistant even if the external chains themselves are not.

Performance Considerations

A common objection to post-quantum cryptography is performance overhead. Dilithium signature generation is approximately 3-5x slower than Ed25519, and verification is roughly 2x slower. For a settlement system targeting sub-2-second finality, does this matter?

In practice, the overhead is manageable for several reasons:

  • Parallel execution: The classical and post-quantum signatures can be generated in parallel, so the wall-clock time increase is the difference between the two, not the sum.
  • Batched verification: Validators can batch-verify post-quantum signatures asynchronously. The classical Ed25519 signature provides immediate consensus, while Dilithium verification can complete within a slightly wider window without blocking settlement finality.
  • Hardware acceleration: As PQC adoption increases, hardware vendors are adding dedicated instructions for lattice-based operations. ARM and Intel have both published roadmaps for PQC hardware acceleration.

JIL's 800ms cryptographic finality target accounts for dual-signature overhead. The settlement confirmation time includes both signature operations and validator consensus propagation across the 14-of-20 quorum.

The Migration Question

Most blockchain networks face a difficult migration problem: retrofitting post-quantum security into protocols designed around elliptic curve cryptography requires either a hard fork or a complex overlay system. Address formats change. Transaction sizes increase. Wallet software needs updates. The entire ecosystem has to move in concert.

JIL has the advantage of building PQC in from the beginning rather than retrofitting it. The dual-signature model is native to the protocol, not an afterthought. This means there is no migration event to coordinate - the quantum-resistant signatures are already present in every settlement from day one.

For institutional participants, this eliminates a category of operational risk. They do not need to plan for a future protocol upgrade that could disrupt their settlement workflows. The quantum-resistant foundation is already in place.

What This Means for Institutions

For regulated financial institutions evaluating settlement infrastructure, post-quantum readiness is increasingly becoming a due diligence requirement. The U.S. government has mandated that federal agencies begin migrating to PQC by 2035 (NSA CNSA 2.0). Financial regulators are expected to follow with similar guidance for the private sector.

Building on settlement infrastructure that already incorporates PQC means institutions avoid the cost and risk of future migration. Every settlement record created today will remain cryptographically verifiable under any foreseeable computational threat model.

The question for institutional participants is not whether to adopt post-quantum security, but when. For settlement infrastructure - where records must maintain integrity for years or decades - the answer is now.