System Architecture

How Rudra Works

A visual breakdown of the three core pillars: The Presentation Layer, the Off-Chain Prover, and the On-Chain Verifier.

1. Next.js Dashboard

Presentation layer. Orchestrates demo beats and visualizes protocol state.

2. Node.js Prover

Off-chain SDK. Handles WOTS signature generation and Merkle proofs.

3. Solana Verifier

On-chain BPF program. Executes WOTS verification & CPI upgrades.

Deep Dive: The Cryptographic Core

WOTS+ (Winternitz One-Time Signatures)

To survive the quantum threat, Rudra discards Ed25519 in favor of hash-based signatures. The Node SDK generates ephemeral WOTS+ keys, meaning every signature is purely derived from quantum-resistant cryptographic hashes (SHA-256).

Merkle Trees

Because WOTS keys can only be used once, Rudra aggregates thousands of single-use public keys into a single Merkle Root stored on-chain, dramatically saving rent costs.

On-Chain CPI

Upon successful verification, the Rust program executes a secure Cross-Program Invocation (CPI) to the BPF Loader, deploying the new bytecode safely.

Root Rotation

When the tree is exhausted or an engineer's laptop is compromised, the consortium uses a specialized rotate_root instruction to seamlessly migrate to a new Merkle tree without breaking the upgrade authority.