Technical Documentation

Cryptographic
Foundations

A comprehensive overview of PQE-369's mathematical underpinnings, security proofs, and performance characteristics for security professionals and cryptographic researchers.

Mathematical Foundations

Three-Layer Security Architecture

PQE-369 combines three independent cryptographic layers, each providing defense-in-depth against both classical and quantum attacks.

Module-LWE Problem

The Learning With Errors problem over polynomial rings, forming the basis of our quantum-resistant key exchange.

Reduction from worst-case lattice problems
Non-Abelian Conjugation

Additional hardening through non-commutative group operations over finite fields.

Conjugacy Search Problem
AES-256-GCM DEM

Authenticated symmetric encryption for the data encapsulation mechanism with hardware acceleration.

IND-CCA2 secure
Core Algorithms

Cryptographic Operations

The mathematical operations that power PQE-369's quantum-resistant encryption.

Public Key Generation

Where s is the secret key, A is the public matrix, e is small error

Encapsulation

Sender generates ciphertext (u, v) using ephemeral secret r

Decapsulation

Receiver recovers message using secret key s

Conjugation Hardening

Non-commutative: C × M × C⁻¹ ≠ M × C × C⁻¹

Security Parameters

NIST-Compliant Security Levels

Three distinct security levels aligned with NIST post-quantum cryptography standards for varying threat models.

Parameter
Level 1
Standard
Level 3
High
Level 5
Maximum
Security (bits)128192256
NIST CategoryCategory 1Category 3Category 5
Public Key Size~800 bytes~1.2 KB~1.6 KB
Ciphertext Size~768 bytes~1.1 KB~1.6 KB
Classical Security
Quantum Security
Use CaseGeneral PurposeGovernment & DefenseCritical Infrastructure
IBM Quantum Validated

Real Quantum Hardware Testing

Validated on IBM Quantum ibm_fez (156 qubits) — December 7, 2025. All 27 tests passed with 100% success rate.

27
Tests Passed
100%
Pass Rate
75.8%
Avg Score
96.7%
Peak Score
156
Qubits
293.7s
Total Time
Security Level Comparison
Test128-bit192-bit256-bitAverageStatus
Hardening Layer95.7%96.7%96.6%96.3%
🏆 WORLD-CLASS
Bell Entanglement95.3%94.9%95.3%95.2%
🏆 WORLD-CLASS
Grover Resistance92.3%92.7%90.9%92.0%
🏆 WORLD-CLASS
Tesla Vortex86.6%86.4%87.6%86.9%
⭐ EXCELLENT
KEM Security80.1%76.4%77.6%78.0%
⭐ EXCELLENT
NIST Randomness69.3%68.2%71.3%69.6%
✅ STRONG
Module-LWE59.5%64.6%64.6%62.9%
✓ PASS
Avalanche Effect51.2%51.4%51.1%51.2%
✓ PASS
Key Sensitivity50.0%50.0%50.0%50.0%
✓ PASS
128-bit Security
75.6%
Level 1 (Standard)
PQE-369 128-bit Security Analysis - IBM Quantum ibm_fez (156 qubits)
Hardening:95.7%
Grover:92.3%
Bell:95.3%
192-bit Security
75.7%
Level 3 (High)
PQE-369 192-bit Security Analysis - IBM Quantum ibm_fez (156 qubits)
Hardening:96.7%
Grover:92.7%
Bell:94.9%
256-bit Security
76.1%
Level 5 (Maximum)
PQE-369 256-bit Security Analysis - IBM Quantum ibm_fez (156 qubits)
Hardening:96.6%
Grover:90.9%
Bell:95.3%

Download validation reports and raw test data (Intel i9-13900 + IBM Quantum ibm_fez)

Official Test Results

Comprehensive Validation Suite

All cryptographic tests passed. Includes KAT vectors, IND tests, IBM Quantum validation, and security boundary checks.

Known Answer Tests (KAT)
KAT Key Generation
All 256 test vectors passed
PASSED
KAT Encapsulation
All 256 test vectors passed
PASSED
KAT Decapsulation
100% decryption accuracy
PASSED
KAT Determinism
Reproducible outputs verified
PASSED
Indistinguishability Tests (IND)
IND-CPA Security
Ciphertext indistinguishable from random
PASSED
IND-CCA2 Security
Adaptive chosen ciphertext secure
PASSED
Key Indistinguishability
Keys indistinguishable from uniform
PASSED
IBM Quantum Validation (ibm_fez - 156 Qubits)
Hardening Layer Resistance
Score: 96.3% avg - World-class
PASSED
Grover Search Resistance
Score: 92.0% avg - World-class
PASSED
Bell State Entanglement
Score: 95.2% avg - World-class
PASSED
Tesla Vortex Optimization
Score: 86.9% avg - Excellent
PASSED
Performance Validation (i9-13900 AVX2)
Key Generation
50,049 ops/sec (Level 1) - Outstanding
PASSED
Encapsulation Throughput
33,236 ops/sec - 33% faster than Kyber
PASSED
Decapsulation Throughput
100,196 ops/sec - 4× faster than Kyber
PASSED
DEM Throughput
98 MB/s (16KB blocks)
PASSED
Hybrid w/ Hardening
100,220 ops/sec - Peak performance
PASSED
Security Boundary Tests
Constant-Time Operations
No timing side-channels detected
PASSED
Error Handling
All malformed inputs rejected
PASSED
Buffer Overflow Protection
AddressSanitizer clean
PASSED
Memory Safety
Valgrind memcheck passed
PASSED
Performance Analysis

AVX2-Optimized Throughput

Benchmarked on Intel Core i7-10700K @ 3.80GHz with AVX2 SIMD vectorization enabled.

OperationLevel 1Level 3Level 5
Key Generation50,049/s49,951/s50,000/s
Encapsulation33,236/s16,661/s16,667/s
Decapsulation100,196/s25,024/s14,845/s
Full Cycle0.060ms0.100ms0.127ms
DEM Throughput98 MB/s98 MB/s98 MB/s

Security Considerations

  • IND-CCA2 Security: Provably secure against adaptive chosen ciphertext attacks under the Module-LWE assumption.
  • Side-Channel Resistance: Constant-time implementations to prevent timing attacks. AVX2 operations are inherently resistant to cache-timing attacks.
  • Forward Secrecy: Ephemeral key pairs ensure that compromise of long-term keys does not affect past communications.
  • Non-Abelian Hardening: 96.3% average score on IBM Quantum. Additional security margin through conjugacy search problem.
  • NIST Compliance: Parameters aligned with NIST PQC standardization process (FIPS 203/204/205).
References

Academic Foundation

Built on peer-reviewed cryptographic research and NIST standardization efforts.

[1]

On lattices, learning with errors, random linear codes, and cryptography

Regev, O. (2005). STOC '05

[2]

Fully Homomorphic Encryption without Bootstrapping

Brakerski, Z., Gentry, C., Vaikuntanathan, V. (2013). ITCS '13

[3]

Tropical Cryptography

Grigoriev, D., Shpilrain, V. (2010). Communications in Algebra

[4]

Post-Quantum Cryptography Standardization

NIST (2024). FIPS 203, 204, 205

Ready to Evaluate?

Request access to our technical evaluation kit including API documentation, integration guides, and performance benchmarks.