3. Technical Implementation
3.1 Post-Quantum Algorithms
Dilithium3 (Digital Signatures)
Specification: NIST FIPS 204 (ML-DSA-65)
Parameters:
Public key: 1,952 bytes
Private key: 4,000 bytes
Signature: 3,293 bytes
Security level: NIST Level 3 (comparable to AES-192)
Performance (Apple M1, single-core):
Key generation: ~1.2ms
Signing: ~2.5ms
Verification: ~1.0ms
Use Cases:
Document signing
Certificate authorities
Code signing
Blockchain transaction signing
Kyber768 (Key Encapsulation)
Specification: NIST FIPS 203 (ML-KEM-768)
Parameters:
Public key: 1,184 bytes
Private key: 2,400 bytes
Ciphertext: 1,088 bytes
Shared secret: 32 bytes
Security level: NIST Level 3
Performance (Apple M1, single-core):
Key generation: ~0.8ms
Encapsulation: ~1.0ms
Decapsulation: ~1.2ms
Use Cases:
TLS 1.3 post-quantum handshakes
Secure messaging
Encrypted storage
VPN key exchange
3.2 API Design
Authentication
Multi-modal authentication supports diverse use cases:
JWT (OAuth 2.0 / OIDC)
Enterprise integration
Web applications
Mobile apps
Chain Signature (Web3)
Ethereum (ECDSA)
Cosmos (Secp256k1)
Solana (Ed25519)
Development Mode
Owner header for testing
Disabled in production
Endpoints
Key Generation:
Digital Signing:
Key Encapsulation:
Full API docs coming - This is a high-level whitepaper.
3.3 Key Management Modes
Mode 1: Session Keys (Default)
Design Philosophy: Keys that never touch persistent storage
Benefits:
✅ Zero persistence risk
✅ Automatic expiration
✅ Memory zeroed on cleanup
✅ Perfect for short-lived operations
Use Cases:
Real-time signing
API authentication
Temporary credentials
Development/testing
Mode 2: Derived Keys
Design Philosophy: Deterministic key generation from master seed
Benefits:
✅ Stateless (no storage needed)
✅ Reproducible keys
✅ Master seed rotation possible
✅ Scales infinitely
Use Cases:
Deterministic wallets
Backup-less key recovery
Multi-device sync
Mode 3: Time-Limited Keys
Design Philosophy: Persistent keys with automatic expiration
Benefits:
✅ Survives restarts
✅ Automatic cleanup
✅ Configurable lifetime
✅ Best-effort secure deletion
Use Cases:
Certificates
Temporary access tokens
Audit-required operations
Mode 4: CloudHSM Keys (Phase 2)
Design Philosophy: Hardware-isolated key storage with FIPS certification
Benefits:
✅ FIPS 140-2 Level 3 certified
✅ Physical tamper resistance
✅ Keys never in software
✅ Compliance requirements met
✅ True key deletion
Limitations:
⚠️ Cost: $1,152+/month for HA setup
⚠️ Latency: ~5-10ms per operation
⚠️ No PQC support yet (awaiting NIST FIPS modules)
Use Cases:
Financial institutions
Certificate authorities
Government/defense
Regulatory compliance (PCI-DSS, HIPAA)
Last updated
