Solution report blog — Timeless innovators

It is time to move beyond the theoretical “quantum threat” and into the actual gears of the internet. If we want a future where DNS remains the trust anchor of the web, we have to start breaking things today to see how they’ll hold up tomorrow.

Our team, Timeless Innovators, took this literally. Using the AIORI infrastructure, we built a fully functional Post-Quantum DNSSEC (PQ-DNSSEC) testbed under a delegated .iem.lab domain. We didn’t just read the drafts; we implemented Dilithium3, Falcon-512, and SPHINCS+ to see what happens to a DNS packet when it’s carrying a signature designed to withstand a quantum computer.

1. The Blueprint: Topology of a Quantum-Safe Zone

Modern DNSSEC assumes signatures are small. Quantum-safe signatures are… not. To test this fairly, we architected a three-tier system on a Proxmox hypervisor that separates the heavy lifting of PQC verification from the standard recursive resolution.

The Network Stack

  • Tier 1 (Client): Custom dashboards and dig scripts firing concurrent queries.
  • Tier 2 (Resolver/Middleware): The “Brain.” An Unbound resolver paired with our custom Python Middleware (using dnslib + liboqs). This middleware handles the PQC heavy lifting that standard resolvers can’t yet digest.
  • Tier 3 (Authoritative): A multi-instance PowerDNS setup. Each algorithm (Falcon, Dilithium, SPHINCS) lives in its own isolated zone with a dedicated MySQL backend.

2. The Contenders: A Tale of Three Algorithms

We didn’t just want “security”; we wanted to measure the cost of that security. Here is how the NIST finalists performed in the specialized arena of DNS:

Algorithm Signature Size Verdict
Falcon-512 ~666 bytes The Goldilocks Choice. Fits comfortably in EDNS0 buffers; lowest latency.
Dilithium3 ~3.3 KB The Heavyweight. Requires careful UDP fragmentation handling or TCP fallback.
SPHINCS+ ~7.8 KB+ The Mammoth. Stable, but pushes the limits of traditional DNS transport.

3. Implementation Deep-Dive

Building this wasn’t as simple as flipping a switch. We had to bridge the gap between high-level crypto libraries and low-level DNS protocols.

The Middleware Logic

Since standard resolvers like Unbound don’t natively “speak” Dilithium yet, our middleware acts as a high-speed translator.

  1. It intercepts the response from the PQC-signed zone.
  2. It extracts the RRSIG and DNSKEY records.
  3. Using liboqs bindings, it validates the signature.
  4. If valid, it asserts the AD (Authenticated Data) flag and passes it back to the client.

Concurrent Performance

We pushed the system with varying loads (1, 5, and 10 concurrent queries). Interestingly, Falcon-512 showed almost no degradation, maintaining a solid 260 QPS even at higher concurrency. SPHINCS+, despite its massive packet size, remained stable, proving that while the “pipes” get full, the crypto itself is remarkably resilient.

 

4. Key Takeaways for the IETF & Beyond

Our sprints lead to a few “hard truths” for the future of PQ-DNSSEC:

  • Fragmentation is the New Normal: If we move to Dilithium or SPHINCS, we must optimize for TCP fallback and large UDP buffers.
  • Falcon is the Frontrunner: For general-purpose DNS, Falcon’s signature size makes it the most “drop-in” ready candidate.
  • Middleware is a Viable Bridge: We don’t need to rewrite every resolver on day one. Proxy-based PQC verification can secure the path while standards mature.

 

5. Open Source & Future Sprints

We believe in “show, don’t just tell.” All our C boilerplates for key generation, our Python middleware, and our performance datasets are being polished for the community.

What’s next?

We’re looking toward Hybrid Signatures—combining classical ECDSA with PQC to ensure that even if one algorithm fails, the chain of trust remains unbroken.

Read the full report

Author

Facebook
Twitter
LinkedIn
WhatsApp

Search

Authors List

Authors

  • Advanced Internet Operations Research in India

    View all posts
  • I’m a tech entrepreneur and researcher who thrives on pushing boundaries and finding innovative solutions in the ever-evolving digital landscape. Currently, I’m deeply immersed in the fascinating realm of Internet resiliency, harnessing my expertise to ensure a robust and secure online space for all. 🚀

    View all posts
  • admin
  • I am a researcher working on security, networks, protocols and DNS. I am a quantum computing enthusiast, a fan of Linux and an advocate for Free & Open Source Softwares. #FOSS

    View all posts
  • A Information Technology Practitioner with leadership experience in IT Public Policy, Corporate Industry Forums, Information Technology Standards, & Program Implementation. An experienced Information Technology trainer, keynote speaker, panelist, leader and key influencer for advocacy and outreach, with wide international exposure across stakeholder groups. Finance Degree from ICAI & ICWAI, India; IT Security Degree from ISACA, USA & Internet Governance Certification from University of Aarhus, Germany & Next Generation Leaders Program of Internet Society in association with DIPLO Foundation.

    View all posts
  • Aindri Mukherjee
  • Debayan Mukherjee

Tag Cloud

Newsletter

Leave a Reply

Your email address will not be published. Required fields are marked *