BenchmarksStack Ranking
APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key
Security 14 min read

NIST Post-Quantum Cryptography for Tamper-Proof Audits

What makes an audit trail truly tamper-proof versus merely tamper-evident. Classical signatures have an expiration date. Three post-quantum signature families do not.

Eric Beans CEO, H33.ai

The phrase "tamper-proof" is used casually in security marketing. Append-only databases are called tamper-proof. Immutable ledgers are called tamper-proof. Hash chains are called tamper-proof. Blockchain records are called tamper-proof. Most of these systems are, at best, tamper-evident — they make tampering detectable rather than impossible. And many of them depend on classical cryptographic assumptions (RSA, ECDSA, SHA-256 without post-quantum signatures) that have an expiration date. When quantum computers break the underlying signature schemes, "tamper-evident" becomes "undetectably tamperable." The detection mechanism itself is compromised.

True tamper-proof means something specific and demanding: an adversary cannot produce a forged record that passes verification, regardless of their computational resources, regardless of their access to the verification infrastructure, regardless of future advances in computing technology (within the bounds of the mathematical assumptions stated). This is a cryptographic guarantee, not an operational one. It does not depend on who controls the database, who has administrative access, or who operates the logging system. It depends only on the mathematical hardness of specific problems and the custody of specific keys.

This post is about what true tamper-proof means for audit trails, why classical cryptographic tamper-proofing has an expiration date, how NIST post-quantum cryptography removes that expiration date, and how the H33-74 construction implements three-family post-quantum tamper-proofing at a fixed persistent footprint of 74 bytes per record.

Tamper-evident versus tamper-proof

The distinction is important and frequently confused. A tamper-evident system detects tampering after the fact. A tamper-proof system prevents tampering from producing a valid forgery in the first place. These are different security properties with different guarantees and different threat models.

An append-only database is tamper-evident if it has integrity checks (checksums, hash chains) that detect when records are modified or deleted. But "detects" means "detects if someone checks, and the checking mechanism itself is intact." If an adversary modifies both the record and the integrity check, the tampering is undetectable. If an adversary compromises the system that performs integrity verification, the tampering is undetectable. If an adversary can forge the cryptographic signatures that protect the integrity checks, the tampering is undetectable.

A cryptographically signed record is tamper-proof to the extent that the signature scheme is secure. Given a record signed with a digital signature scheme, an adversary who does not possess the signing key cannot produce a modified record that passes signature verification — this is the EUF-CMA (Existential Unforgeability under Chosen Message Attack) property of the signature scheme. The tamper-proofing does not depend on database permissions, access controls, or operational security. It depends on one thing: the computational hardness of forging a signature without the signing key.

This is a strictly stronger guarantee than operational tamper-evidence. Database access controls can be bypassed by insiders. Hash chains can be recomputed from scratch if the starting point is known. Append-only flags can be overridden by administrators. But a valid digital signature cannot be produced without the signing key, period. The mathematical guarantee holds regardless of who controls the infrastructure.

The expiration date on classical tamper-proofing

Here is the problem: digital signatures based on RSA or ECDSA — the signatures that currently protect audit trails, legal documents, financial records, and compliance decisions — rely on mathematical problems (integer factoring, elliptic curve discrete logarithm) that quantum computers solve efficiently. Shor's algorithm factors integers and computes discrete logarithms in polynomial time on a quantum computer. When sufficiently powerful quantum computers exist, RSA and ECDSA signatures become forgeable.

This means that every audit trail currently protected by RSA or ECDSA signatures has a tamper-proof guarantee with an expiration date. The guarantee holds until quantum computers capable of running Shor's algorithm at sufficient scale exist. After that date, the signatures become forgeable, and the "tamper-proof" guarantee evaporates. An adversary with quantum computing access can take any signed audit record, modify it arbitrarily, and produce a new valid signature on the modified record. The forged record is cryptographically indistinguishable from the original. No verification procedure can detect the forgery because the forgery satisfies all the same mathematical checks as the original.

For records with short lifetimes, this may not matter. A session token that expires in 15 minutes does not need to survive quantum computers. But audit trails are specifically designed for long-term retention. Seven years. Ten years. Permanently, in some categories. An audit trail signed with RSA-2048 in 2026 needs to remain tamper-proof through at least 2033. The most credible estimates for quantum computing capability suggest that RSA-2048 may be breakable in that timeframe. "May be" is sufficient to invalidate the tamper-proof guarantee — if there is a non-negligible probability that the signature can be forged within the record's retention period, the record is not tamper-proof for the duration of its required retention.

NIST post-quantum signatures: removing the expiration date

NIST's post-quantum cryptography standards — FIPS 204 (ML-DSA), FIPS 205 (SLH-DSA), and FIPS 206 (FN-DSA, based on FALCON-512) — are digital signature schemes whose security rests on mathematical problems that are believed to be hard for both classical and quantum computers. There is no known quantum algorithm that efficiently solves the Module Learning With Errors problem (ML-DSA), the Short Integer Solution problem over NTRU lattices (FALCON-512), or the hash pre-image problem (SLH-DSA). These problems remain hard under the full computational model that includes quantum computers.

A record signed with a NIST post-quantum signature scheme does not have an expiration date on its tamper-proof guarantee (assuming the mathematical hardness assumptions hold, which is the standard assumption for all cryptographic security). The guarantee holds against classical adversaries today and quantum adversaries in the future. The record remains tamper-proof for its entire retention period regardless of advances in quantum computing. This is what "post-quantum" means in this context: the tamper-proof property survives the transition to quantum computing.

Three families: assumption diversity for maximum durability

NIST standardized three signature schemes rather than one because no single mathematical assumption has been tested as thoroughly as the classical assumptions it replaces. Integer factoring has been studied for centuries. The MLWE problem has been studied for thirty years. This is substantial cryptanalytic attention, but not enough to be certain that no efficient attack exists.

H33's approach is to use all three NIST families simultaneously in the H33-74 substrate. Every attestation carries signatures from:

ML-DSA-65 (FIPS 204): Security based on Module Learning With Errors (MLWE) and Module Short Integer Solution (MSIS). Hardness assumption: solving structured lattice problems over module lattices.

FALCON-512 (FIPS 206): Security based on the Short Integer Solution problem over NTRU lattices. Hardness assumption: solving lattice problems over a different lattice structure than ML-DSA. A breakthrough against module lattices does not automatically break NTRU lattices.

SLH-DSA-SHA2-128f (FIPS 205): Security based on the pre-image resistance and collision resistance of SHA-256. Hardness assumption: finding pre-images of a hash function that has been studied for over twenty years with no meaningful degradation. This assumption is independent of any algebraic structure — it relies only on the combinatorial properties of a hash function, not on any number-theoretic or lattice problem.

To forge an H33-74 attestation — to produce a modified audit record that passes verification — an adversary must simultaneously produce valid forgeries under all three signature schemes. This requires breaking MLWE lattices AND NTRU lattices AND hash function pre-image resistance. Three independent mathematical catastrophes, not one. The probability of all three assumptions failing within the retention period of any given record is the product of three independent failure probabilities — astronomically smaller than any single failure probability.

This is what makes H33-74 attestations truly tamper-proof in the strongest sense available: the tamper-proof guarantee does not expire unless three independent areas of mathematics simultaneously collapse. This has never happened in the history of cryptography and there is no indication it will happen in the future.

The verification process

Tamper-proofing is only meaningful if verification is independent — if it can be performed by anyone, without trusting the system that produced the record. H33-74 verification satisfies this requirement completely.

Given a record and its 74-byte H33-74 substrate, verification proceeds as follows:

Step 1: Content binding. The verifier takes the original record, computes its SHA3-256 hash, and checks that the hash matches the 32-byte content hash in the substrate. This confirms that the substrate attests to this specific record and not some other record. Any modification to the record — even a single bit flip — produces a different SHA3-256 hash and fails this check.

Step 2: Signature bundle retrieval. The verifier retrieves the full signature bundle (approximately 21KB) from the bundle storage location. This bundle contains the three post-quantum signatures.

Step 3: Bundle commitment check. The verifier computes SHA3-256 over the concatenated signature bundle and checks that it matches the 32-byte commitment in the compact receipt (the second part of the 74-byte substrate). This confirms that the signatures in the bundle are the same signatures that were produced at attestation time.

Step 4: Three-family signature verification. The verifier checks each of the three signatures (ML-DSA-65, FALCON-512, SLH-DSA-SHA2-128f) against the signer's published public keys, over the substrate's canonical encoding. All three must pass. If any signature fails, the attestation is rejected as invalid or tampered.

This verification process requires: the original record, the 74-byte substrate, the signature bundle, and the signer's public keys. It does not require any API call to H33. It does not require any network connectivity. It does not require trust in any server, database, or infrastructure operator. It is a pure cryptographic computation that any party can perform independently. The verification crate is source-available for audit.

Bitcoin anchoring for timestamping

Tamper-proof content binding (proving that specific data was attested) is one half of the audit trail problem. The other half is timestamping — proving when the attestation was produced. The substrate contains an 8-byte millisecond timestamp, but a timestamp written by the signer is only as trustworthy as the signer. For truly independent timestamping, H33-74 supports anchoring to the Bitcoin blockchain.

Bitcoin anchoring works by including the substrate's 32-byte content hash (or a Merkle root aggregating multiple substrates) in a Bitcoin transaction's OP_RETURN output. Once the Bitcoin transaction is confirmed in a block, the block's timestamp provides an independent, publicly verifiable timestamp. The Bitcoin blockchain's proof-of-work consensus ensures that the block timestamp is approximately accurate (within the two-hour tolerance enforced by Bitcoin's consensus rules) and cannot be retroactively altered without re-mining subsequent blocks — an operation that becomes exponentially more expensive with each additional confirmation.

For audit trails, Bitcoin anchoring provides: (1) independent evidence that the attestation existed at or before the block timestamp, (2) a publicly verifiable timestamp that does not depend on any centralized time authority, and (3) a commitment that cannot be altered without reorganizing the Bitcoin blockchain. Combined with the three-family post-quantum signature, this creates a record that is both content-bound (the substrate proves what was attested) and time-bound (the Bitcoin anchor proves when it was attested), with both properties protected against quantum adversaries.

The persistent footprint of Bitcoin anchoring is 32 bytes in the Bitcoin UTXO set. Combined with the 42 bytes stored off-chain by the producer, the total persistent footprint of a Bitcoin-anchored, three-family post-quantum attestation is 74 bytes — regardless of the size of the original record being attested.

Logs versus proof

There is a conceptual distinction that matters enormously for audit trails and is frequently overlooked: the distinction between logs and proof. Logs are notes that a system writes about itself. Proof is independently verifiable evidence that a specific event occurred.

A log entry saying "wire transfer WT-001 was approved by Officer Smith at 14:32 UTC" is a note that the banking system wrote about itself. It may be accurate. It may not be. The system that produced the log entry could be compromised. The database storing it could be modified. The backup containing it could be altered. To trust the log entry, you must trust the entire chain of custody from production to presentation — every system, every operator, every backup, every restore, every migration.

A substrate attesting "the SHA3-256 hash of the canonical wire transfer authorization record is [32 bytes], signed by the three-family key set at timestamp [8 bytes]" is proof. It does not require trust in any system, operator, or chain of custody. Given the original record, the substrate, and the public keys, anyone can verify the attestation independently. The verification succeeds if and only if the record is unchanged from what was originally attested. No trust required. No chain of custody to validate. Pure mathematics.

For regulators, this distinction is the difference between "the bank says this happened" and "the bank can prove this happened." The former requires the examiner to trust the bank's systems. The latter requires the examiner to trust only the mathematics — and the mathematics is publicly auditable, independently verifiable, and not under the bank's control.

For litigation, this distinction is the difference between records that can be challenged ("how do we know this log entry wasn't modified?") and records that cannot be challenged ("the three-family post-quantum signature verifies against the published public keys, confirming this record is unchanged"). The former creates discovery disputes. The latter creates incontrovertible evidence.

The architecture of a tamper-proof audit trail

Deploying a truly tamper-proof audit trail using H33-74 involves three components: the attestation point, the storage layer, and the verification path.

Attestation point: The point in the system where records are produced and immediately attested. For maximum security, attestation should happen at the earliest possible point — before the record enters any storage system, before it is transmitted over any network, before any other component has an opportunity to modify it. The attestation API accepts the canonical record, produces a 74-byte substrate, and returns it to the caller. The substrate is then stored alongside the record.

Storage layer: The 74-byte substrates are stored in whatever database, filesystem, or archival system the organization already uses for audit records. The substrates do not require any special storage properties — they are just bytes. They do not require append-only storage, immutable storage, or any other operational property. The tamper-proof guarantee comes from the cryptographic signatures, not from the storage medium. Even if an adversary modifies the stored substrate, the modification will be detected during verification because the signatures will not match.

Verification path: When a record needs to be verified — during an examination, during litigation discovery, during internal audit — the verifier retrieves the record, retrieves the substrate, retrieves the signature bundle, and performs the four-step verification process described above. The verification can be performed by anyone: the regulator, the opposing counsel, an independent auditor, or an automated compliance system. No dependency on H33 infrastructure. No dependency on the original attesting system. Pure cryptographic verification.

This architecture provides genuine tamper-proof rather than tamper-evident semantics. An adversary who modifies a record cannot produce a substrate that passes verification because they cannot forge the three-family post-quantum signatures. An adversary who modifies a substrate cannot make it correspond to a different record because the content hash will not match. An adversary who modifies the signature bundle cannot make it match the commitment in the substrate because the SHA3-256 hash will differ. Every modification is detectable, and no forgery is producible, regardless of the adversary's computational resources (classical or quantum).

Comparison with alternative approaches

Blockchain-only audit trails: Storing audit records directly on a blockchain provides immutability (records cannot be deleted from a sufficiently decentralized blockchain) but does not provide content-binding unless the records are also signed. An unsigned record on a blockchain proves that someone put something on the blockchain at a certain time — it does not prove who attested to what, or that the content has not been modified between production and blockchain insertion. H33-74 provides content-binding (the signature proves what was attested), identity-binding (the signature proves who attested it), and time-binding (the Bitcoin anchor proves when). The blockchain alone provides only immutability of storage.

Classical HMAC/signature-based audit trails: These provide tamper-proof semantics today but have the quantum expiration date problem. Within the record's retention period, the HMAC key may be compromised or the RSA/ECDSA signature may become forgeable. H33-74 provides the same tamper-proof semantics without the expiration date.

Hash chain / Merkle tree audit trails: These provide tamper-evidence (modifications to interior records invalidate the chain) but not tamper-proof semantics (an adversary who recomputes the chain from a modified starting point produces a valid alternative chain). They also depend on the integrity of the chain head — if the head is not independently anchored (e.g., to a blockchain or a post-quantum signed publication), the entire chain can be replaced. H33-74's Bitcoin anchoring and three-family signing address both limitations.

Performance at scale

A common objection to cryptographic audit trails is performance overhead. For H33-74, the numbers are definitive: 2,216,488 attestations per second on a single ARM server. Per-attestation latency under 42 microseconds. 74-byte persistent footprint per record. These numbers make post-quantum tamper-proof audit trails practical for any workload currently in production at any financial institution, healthcare provider, legal firm, or government agency.

For high-volume workloads, batch attestation via Merkle aggregation (Patent pending — H33 substrate Claims 124-125) further reduces overhead. One million records batched into a single Merkle tree require only one three-family signing operation. Individual records retain independent verifiability through their Merkle inclusion proofs. The amortized signing cost per record approaches zero at scale while maintaining the full three-family tamper-proof guarantee for each individual record.

The storage overhead of 74 bytes per record is negligible for any modern storage system. One billion records per year adds 74 gigabytes of attestation data — less than the storage consumed by a single day of surveillance video or a single training dataset for a machine learning model. The storage cost of tamper-proof is effectively zero.

The bottom line

Tamper-proof is a cryptographic property, not an operational one. It depends on the hardness of mathematical problems, not on access controls, database permissions, or operational procedures. Classical cryptographic tamper-proofing (RSA, ECDSA) has an expiration date because the mathematical problems it depends on will be solvable by quantum computers. Post-quantum cryptographic tamper-proofing (ML-DSA, FALCON-512, SLH-DSA) removes that expiration date because the mathematical problems it depends on resist both classical and quantum adversaries.

H33-74 provides three-family post-quantum tamper-proofing at 74 bytes per record. The three families (MLWE lattices, NTRU lattices, hash pre-image resistance) provide assumption diversity so that a breakthrough against any single mathematical foundation does not compromise the audit trail. Bitcoin anchoring provides independent timestamping. The verification path is open, independent, and requires no trust in H33 or any other infrastructure operator.

An audit trail is either tamper-proof or it is not. "Tamper-proof until quantum computers arrive" is not tamper-proof — it is tamper-proof with an expiration date. For records that need to survive seven, ten, or fifty years of verification, the only honest answer is post-quantum signatures from day one. H33-74 provides them today, at production scale, at negligible cost, with three independent mathematical guarantees backing every record.

True Tamper-Proof. No Expiration Date.

H33-74 provides three-family NIST post-quantum tamper-proofing for every audit record. 74 bytes. Independently verifiable. No quantum expiration.

Get API Key Read the Docs