Internet Computer has the most interesting crypto stack in the batch, with BLS12-381 threshold signatures, Ed25519, ECDSA, and Schnorr stitched together by Chain Key. Shor breaks all four. One compromised BLS12-381 subnet key forges every signature that subnet ever issued.
Summary
Internet Computer has the richest crypto stack in this batch (BLS12-381 threshold + ECDSA + Schnorr via Chain Key) but every primitive is Shor-exposed. Strong NNS governance provides above-average migration architecture. DFINITY has discussed PQC publicly but no production deployment or dated roadmap. Threshold crypto makes subnet-key compromise particularly severe post-Shor. Band 2 Acknowledged.
What the gates say
- Hybrid: FAIL. No hybrid plan on file.
- Evidence: PASS. Sources reconstructable by third party.
- Primitive naming: PASS. Named primitives at every scored sub-level.
Burn-vs-rescue policy on file
undeclared
Seven dimensions
Each dimension scores 0-100 internally; the weighted roll-up produces the QRI on the left. Open a row to read the sub-score detail.
1 Cryptographic Exposure 30 / 100
Rich cryptographic stack with threshold crypto (Chain Key).
BLS12-381 threshold signatures (Chain Key) · Ed25519 (user wallets) · ECDSA secp256k1 (threshold for Bitcoin integration) · Schnorr (Taproot integration) · SHA-256 · SHA-3Multiple ECC families but no PQC family.
No NIST PQC primitives deployed
2 HNDL Exposure 18 / 100
Chain Key threshold derives user keys — pubkey exposure depends on derivation path. Threshold BLS12-381 keys are quantum-exposed for subnet signatures.
Active since May 2021. 4+ years of cold keys + threshold ECDSA for Bitcoin.
Threshold signatures signed over long-term subnet assets.
TLS + vetKeys for some confidential computing. No PQC KEM.
3 Metadata & Privacy Exposure 30 / 100
Internet Identity pseudonymous; canister calls have some privacy via threshold derivation.
Subnet node providers run most boundary nodes. Growing diversity.
Chain Key Bitcoin/Ethereum integration correlates cross-chain activity.
Chain Key threshold shares vulnerable to Shor would reveal all subnet signing operations.
4 Migration Architecture 40 / 100
IC NNS-controlled protocol upgrades. Threshold crypto scheme pluggable. Strong governance-level agility.
Canisters can manage custom authentication. Internet Identity supports multi-key rotation.
Frequent NNS-initiated subnet upgrades. ~4 years of continuous protocol evolution.
No hybrid PQC envelope deployed. DFINITY has published PQC research discussions.
5 Deployment Execution 8 / 100
no public artifact found — no NIST PQC in production
no public artifact found
no public artifact found
DFINITY has discussed PQC publicly but no dated milestone roadmap found.
Some 'post-quantum ready' phrasing from ecosystem without concrete deployment.
6 Supply Chain Vendor Readiness 10 / 100
7 Governance & Coordination 45 / 100
~1,400 subnet nodes across ~130 independent node providers. DFINITY retains significant influence via NNS.
Weekly NNS proposals for subnet upgrades. Strong coordination via protocol-level governance.
DFINITY Foundation (Dominic Williams). Research team active on cryptography. No named PQC lead.
NNS governance attacks have been handled (e.g., proposal voting integrity).
The X + Y vs Z inequality
X (data shelf life): 7-15 (4+ years threshold keys, long-lived subnet sigs)
Y (migration time): 8-12 (strong NNS governance could accelerate)
Z10 (10% CRQC year): 2036 · Z50 (50%): 2041
Verdict: X+Y > Z (danger).
Four-scenario grid
| Scenario | Value preserved | Privacy preserved |
|---|---|---|
| quantum never | 100% | 100% |
| arrives suddenly pre migration | 5% | 10% |
| arrives slowly post migration | 85% | 70% |
| arrives slowly mid migration | 45% | 35% |
Peers in the L1 profile
Order-book view of the 9 chains closest to Internet Computer by QRI.
Public artifacts used for this scorecard
Each entry below is a sub-score citation. Clicking the link takes you to the public source. A third party should be able to reconstruct every number on this page from these URLs in 48 hours.
Rich cryptographic stack with threshold crypto (Chain Key).
IC NNS-controlled protocol upgrades. Threshold crypto scheme pluggable. Strong governance-level agility.
Supply chain snapshot
A chain's supply chain cannot migrate faster than its slowest dependency. Zero PQC roadmaps in any of the four categories is a structural blocker, not a lagging indicator.
Analyst notes on the scoring
Threshold crypto amplifies HNDL risk: compromising one BLS12-381 subnet key grants signing authority over entire subnet. Strong governance (NNS) is the standout positive. DFINITY's research culture suggests faster-than-average migration feasibility if prioritized.
Scorecard metadata
- Profile: L1
- Scored: 2026-04-18 by
layerqu-v2-scoring-agent-3 - v1 reference:
chainscreen-v1-archive - QRI raw: 23 · after caps: 23
- Confidence interval: ±10
- PQC washing ratio: 1.3x
- Burn-vs-rescue: undeclared
Caps triggered
- Mosca (5a<20% → QRI max 60)
- Sutor (5d count=1 — Migration Stage max 2)
- Casado (3+ vendor tiles pqc=0 → migration_stage max 3)
- Hybrid gate FAIL → QRI cap 60