Trust assumptions, threat model, and security properties of the SOQ-TEC bridge.
Primary Threat: Cryptographically Relevant Quantum Computers (CRQC)
A sufficiently powerful quantum computer running Shor's algorithm can recover private keys from any ECDSA or EdDSA public key. This breaks:
Ed25519 (Solana) — every wallet, every program authority
secp256k1 (Bitcoin, Ethereum) — every address that has ever transacted
ECDH (TLS, key exchange) — retroactive decryption of recorded traffic
Timeline estimates (NIST, NSA, industry consensus):
2030–2035 : First CRQC capable of breaking 256-bit ECC
Now : Nation-state actors are performing HNDL (Harvest Now, Decrypt Later) attacks
The bridge provides a quantum-safe custody layer using NIST FIPS 204 ML-DSA-44 (Dilithium), which is based on the hardness of lattice problems — specifically, Module Learning With Errors (M-LWE). No known quantum algorithm efficiently solves M-LWE.
1. Vault Security (Soqucoin Side)
Property
Implementation
Algorithm
ML-DSA-44 (FIPS 204) — NIST Level 2
Key management
3-of-5 Dilithium multisig
Replay protection
240-block maturity + nonce tracking
Audit
Halborn security audit — completed & remediated (2026)
Key reuse
Safe — Dilithium supports unlimited signatures per keypair
2. Bridge Security (Cross-Chain)
Property
Implementation
Message authentication
Threshold signatures (3-of-5 relayer validators)
Double-spend prevention
Burn-before-release (atomic on Solana side)
Volume limits
Per-epoch circuit breaker
Emergency stop
Admin pause authority
Proof of Reserves
On-chain attestation updated by relayer consensus
3. Solana Program Security (Anchor)
Property
Implementation
PDA authority
Mint/burn authority held by program PDA, not EOA
Access control
Admin operations require multisig threshold
Upgrade authority
Program upgrade key held in cold storage
Input validation
All amounts validated, overflow checks via Rust safe math
What Must Be True for Safety
Lattice hardness holds — M-LWE is not efficiently solvable (overwhelming cryptographic consensus)
3-of-5 relayer honesty — At least 3 of 5 validators are honest (byzantine fault tolerance)
Soqucoin chain liveness — Mining network continues producing blocks
Solana program correctness — No bugs in the Anchor bridge program
What We Explicitly Don't Trust
Classical Ed25519 — the entire premise of the project
Any single relayer — threshold signature prevents unilateral theft
Solana for long-term custody — that's why users bridge to Soqucoin
"Quantum is far away" — HNDL attacks make timeline irrelevant
Limitation
Context
Mitigation
L1 is slow (~60s blocks)
Soqucoin is Dogecoin-derived, optimized for security not speed
Bridge back to Solana for speed; L2 (LatticeFold+) on roadmap
Relayer centralization
3-of-5 is not fully decentralized
Planned expansion to permissionless validator set
Bridge latency (SOQ→Solana)
240-block maturity = ~4 hours for SOQ deposits to mint pSOQ
Planned mainnet mainnet safety gate; SOQ-TEC Terminal shows status
Release latency (Solana→SOQ)
Optimistic instant release via PAUL lane manager
Sub-second on funded relayer; latency is UTXO selection, not cryptographic
Devnet demo
Hackathon demo runs on Solana devnet
Production deployment after mainnet audit
Winternitz is limited
Handles lamports only, single-use keys
We extend it, not replace it — bridge adds token support
Attack Vectors Considered
Attack
Impact
Mitigation
Relayer collusion (3+ malicious)
Unauthorized mint/release
Extend to 5-of-9, add timelock, on-chain PoR verification
Soqucoin reorg
Double-spend on release
240-block maturity (4+ hours of confirmations)
Solana program exploit
Unauthorized pSOQ mint
Anchor safety checks, audited code, pause authority
HNDL on bridge messages
Future decryption of relay data
Bridge messages are public by design — no secrets in transit
Quantum attack on vault
Private key recovery
ML-DSA-44 (NIST Level 2) — quantum-safe by construction
Audit
Scope
Status
Firm
Soqucoin L1
Consensus, wallet crypto, PAT opcodes
✅ Completed & remediated
Halborn (2026)
Bridge program
Anchor program (Solana side)
🔨 Post-hackathon
TBD
Relayer
Off-chain validator service
🔨 Post-hackathon
TBD
Standard
Compliance
NIST FIPS 204
ML-DSA-44 (Dilithium) — production implementation
NIST SP 800-208
Hash-based signatures (Winternitz reference)
CNSA 2.0
NSA Commercial National Security Algorithm Suite
FIPS 140-3
Targeted for production key management
Security issues should be reported to: security@soqu.org
Do not open public GitHub issues for security vulnerabilities.