All clusters use post-quantum hardened cryptography. Add benchmarks measuring:
- ML-KEM-768 key generation time
- Encapsulation/decapsulation throughput
- ML-DSA-65 signing/verification speed
- Comparison with classical alternatives
This data is needed for the security audit documentation.
References
crates/feldman-dkg/ for the DKG implementation
- Current PQ hardening covers all cluster communication paths
Suggested approach
Use criterion benchmarks with statistical analysis. Include both single-operation latency and throughput measurements across different payload sizes.
All clusters use post-quantum hardened cryptography. Add benchmarks measuring:
This data is needed for the security audit documentation.
References
crates/feldman-dkg/for the DKG implementationSuggested approach
Use
criterionbenchmarks with statistical analysis. Include both single-operation latency and throughput measurements across different payload sizes.