QuStream · Operational Perfect Secrecy

Encryption you can prove.
Not hope.

The one-time pad is the only cipher Shannon ever proved unbreakable. QuStream is the first system to make it deployable — over any network, on the hardware you already have.

Harvest now · decrypt later

The archive is already full.

No one is breaking today’s encryption. They are storing it. When the math gets cheap, the archive opens.

Encrypted bytes captured · worldwide · this hour

247,938,122,483

Decryption horizon · 2029

Google Quantum AI · Jan 2026 · timeline confirmed

Intermission · 1949

“The number of different keys must be at least as great as the number of different messages.”

Claude Shannon · Communication Theory of Secrecy Systems

The industry could not distribute keys at that scale. It built on conjecture instead. Here is the one we solved.

Inside one Q-Block

A small secret pulls a pad from public noise.

The Q-Block is two megabits of quantum randomness, broadcast in the clear. Eighteen fragments of key material hidden inside — at positions only your Defragmentation Key can find.

Q-Block R2,097,152 bits
kGen fragments18 · 128–256 bits each
DFK · rUID256 bits · rotating
Hardness504-bit · non-conjectured
R · 0x000000
front
D700093365671B102F6A9B136BADE0808D157BDB47C541E98F2147AC98CDE06AD6AEA1A7
R · 0x000240
right
FDE75C2502DC27EA18315539B3CB7B9688CD6BC6899B3BCBECD93EEB256C08AAE6776ECA
R · 0x000480
back
255E835115C59B822A914AE118E56533D425FF7B91F66CFDC33A403D1F1750FF97F0AE48
R · 0x0006c0
left
616AB05BF067EABCF90D2E306FBF92BA8622699EB2184860A7C701C55A92AACFFE1E96C4
R · 0x000900
top
074D59282A45C8BD5969F689CA5E37CFF0061F138087831A6D4476E6EBE24CBD6E449923
R · 0x000b40
bottom
AA8D32DA942429E85FAAD5907F05C756A857D4FFCF07118E27B6D147244AA9AE7BE66B87
Reducing the need for trust

No master key. No certificate authority. No trusted middle.

Every hop forward-evolves its own identifier through a one-way hash, then burns the old one. There is no long-lived secret to steal — and so nothing for a compromised relay to give up. Past traffic stays sealed even when today’s identifier leaks.

rUIDₙ = H(OTC ∥ U ∥ LM ∥ n)
Measured38.2 Gbps · 40G line · 1.2% overhead

What it costs

Bytes, cycles, latency

One XOR per byte. On the hardware you already have.

Thirty-two byte signatures, not twenty-four hundred. Under a cycle per encrypted byte. It fits inside the firmware budget of a smart meter, the power envelope of a drone, and the latency floor of a 400-gigabit optical line.

Benchmarks · published figuresARM Cortex-M4 · Falcon-512 · AES-GCM SW
Signature sizeBytes per signature
QuStream
32 bytes
Falcon-512
2,420 bytes
CPU cost on Cortex-M4Cycles per signing operation
QuStream
~ thousands
Falcon-512
19,400,000
Data-plane throughputCPU cycles per encrypted byte
QuStream
0.9 cpb
AES-GCM (software)
~6.5 cpb

Figures from NIST PQC round-3 submissions and published benchmarks. QuStream numbers assume a 256-bit DFK, 2 Mbit Q-Block, and MAC-based authentication.

Fits the firmware budget of a smart meter100G · 400G · 800G line-rate
QuStreamOxford · United Kingdom