<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: German</title>
    <description>The latest articles on DEV Community by German (@pqbuilder).</description>
    <link>https://dev.to/pqbuilder</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3946071%2F91040bd0-0bb6-434d-961d-890fdc9e109d.jpg</url>
      <title>DEV Community: German</title>
      <link>https://dev.to/pqbuilder</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/pqbuilder"/>
    <language>en</language>
    <item>
      <title>Why I built a post-quantum signing API (and why JWT is on borrowed time)</title>
      <dc:creator>German</dc:creator>
      <pubDate>Fri, 22 May 2026 12:36:31 +0000</pubDate>
      <link>https://dev.to/pqbuilder/why-i-built-a-post-quantum-signing-api-and-why-jwt-is-on-borrowed-time-1d65</link>
      <guid>https://dev.to/pqbuilder/why-i-built-a-post-quantum-signing-api-and-why-jwt-is-on-borrowed-time-1d65</guid>
      <description>&lt;p&gt;JWT with RS256/ES256 is everywhere. It's also going to be broken.&lt;/p&gt;

&lt;p&gt;Not today. But the clock is ticking — and the timeline is shorter than most developers think.&lt;/p&gt;

&lt;h2&gt;
  
  
  The problem with classical signatures
&lt;/h2&gt;

&lt;p&gt;Every JWT signed with RS256 or ES256 relies on RSA or ECDSA. These algorithms are vulnerable to Shor's algorithm running on a sufficiently powerful quantum computer. NIST finalized the post-quantum replacements in August 2024 — but most developers haven't started migrating yet.&lt;/p&gt;

&lt;p&gt;The threat isn't just future decryption. Nation-state actors are already harvesting signed traffic today to decrypt and forge once quantum computers arrive. "Harvest now, decrypt later" is a real attack pattern.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I built
&lt;/h2&gt;

&lt;p&gt;I built &lt;a href="https://fipsign.dev" rel="noopener noreferrer"&gt;FIPSign&lt;/a&gt; — a signing API built on ML-DSA-65 (NIST FIPS 204). The idea is simple: you call &lt;code&gt;/sign&lt;/code&gt; with any payload, get back a quantum-resistant token. No infrastructure to manage, no keys to generate or rotate, no DevOps.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight typescript"&gt;&lt;code&gt;&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nx"&gt;token&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="k"&gt;await&lt;/span&gt; &lt;span class="nx"&gt;pq&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;sign&lt;/span&gt;&lt;span class="p"&gt;({&lt;/span&gt;
  &lt;span class="na"&gt;sub&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;user_123&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
  &lt;span class="na"&gt;role&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;admin&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
  &lt;span class="na"&gt;expiresInSeconds&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mi"&gt;3600&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
&lt;span class="p"&gt;})&lt;/span&gt;

&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nx"&gt;valid&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;payload&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="k"&gt;await&lt;/span&gt; &lt;span class="nx"&gt;pq&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;verify&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;token&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Not just for auth
&lt;/h2&gt;

&lt;p&gt;Most post-quantum signing tools focus only on user authentication. FIPSign lets you sign anything — the only required field is &lt;code&gt;sub&lt;/code&gt;, any string identifying the entity:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;sub: "user_123"&lt;/code&gt; — user sessions&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;sub: "order_456"&lt;/code&gt; — payment intents&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;sub: "doc_789"&lt;/code&gt; — document certification&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;sub: "device_iot_001"&lt;/code&gt; — IoT firmware&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How revocation works
&lt;/h2&gt;

&lt;p&gt;Revocation is built in. When you revoke a token, we store a SHA-256 hash of the ML-DSA-65 signature as a blacklist entry in Cloudflare D1. Every remote &lt;code&gt;/verify&lt;/code&gt; call checks that blacklist. Entries expire automatically when the original token would have expired.&lt;/p&gt;

&lt;p&gt;Local verification (&lt;code&gt;localVerify: true&lt;/code&gt;) runs entirely in memory at ~1ms with no API call — but doesn't check revocation. Use remote verification for payments and admin actions.&lt;/p&gt;

&lt;h2&gt;
  
  
  The pricing model
&lt;/h2&gt;

&lt;p&gt;No monthly subscriptions. 10,000 free tokens/month that reset automatically. Each sign, verify, or revoke costs 1 token. For most projects, 10,000 tokens/month is enough to never pay anything. If you need more, token packs never expire and accumulate across purchases.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why ML-DSA-65 specifically?
&lt;/h2&gt;

&lt;p&gt;ML-DSA-65 is NIST security level 3 — the right balance between security and signature size for API use cases. ML-DSA-44 is faster but lower security. ML-DSA-87 produces larger signatures with no practical benefit for most applications.&lt;/p&gt;

&lt;p&gt;The implementation uses &lt;a href="https://github.com/paulmillr/noble-post-quantum" rel="noopener noreferrer"&gt;@noble/post-quantum&lt;/a&gt; — a widely audited library you can verify independently.&lt;/p&gt;

&lt;h2&gt;
  
  
  Try it
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npm &lt;span class="nb"&gt;install &lt;/span&gt;fipsign-sdk
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Full guide at &lt;a href="https://fipsign.dev/guide" rel="noopener noreferrer"&gt;fipsign.dev/guide&lt;/a&gt;. Free account at &lt;a href="https://app.fipsign.dev" rel="noopener noreferrer"&gt;app.fipsign.dev&lt;/a&gt; — no credit card.&lt;/p&gt;

&lt;p&gt;Happy to answer any questions about the cryptography, the architecture, or the migration path from JWT.&lt;/p&gt;

</description>
      <category>security</category>
      <category>webdev</category>
      <category>api</category>
      <category>opensource</category>
    </item>
  </channel>
</rss>
