Page cover

3. Technical Implementation

3.1 Post-Quantum Algorithms

Dilithium3 (Digital Signatures)

Specification: NIST FIPS 204 (ML-DSA-65)

spinner

Parameters:

  • Public key: 1,952 bytes

  • Private key: 4,000 bytes

  • Signature: 3,293 bytes

  • Security level: NIST Level 3 (comparable to AES-192)

Performance (Apple M1, single-core):

  • Key generation: ~1.2ms

  • Signing: ~2.5ms

  • Verification: ~1.0ms

Use Cases:

  • Document signing

  • Certificate authorities

  • Code signing

  • Blockchain transaction signing

Kyber768 (Key Encapsulation)

Specification: NIST FIPS 203 (ML-KEM-768)

Parameters:

  • Public key: 1,184 bytes

  • Private key: 2,400 bytes

  • Ciphertext: 1,088 bytes

  • Shared secret: 32 bytes

  • Security level: NIST Level 3

Performance (Apple M1, single-core):

  • Key generation: ~0.8ms

  • Encapsulation: ~1.0ms

  • Decapsulation: ~1.2ms

Use Cases:

  • TLS 1.3 post-quantum handshakes

  • Secure messaging

  • Encrypted storage

  • VPN key exchange

3.2 API Design

Authentication

spinner

Multi-modal authentication supports diverse use cases:

  1. JWT (OAuth 2.0 / OIDC)

    • Enterprise integration

    • Web applications

    • Mobile apps

  2. Chain Signature (Web3)

    • Ethereum (ECDSA)

    • Cosmos (Secp256k1)

    • Solana (Ed25519)

  3. Development Mode

    • Owner header for testing

    • Disabled in production

Endpoints

Key Generation:

Digital Signing:

Key Encapsulation:

Full API docs coming - This is a high-level whitepaper.

3.3 Key Management Modes

spinner

Mode 1: Session Keys (Default)

Design Philosophy: Keys that never touch persistent storage

Benefits:

  • ✅ Zero persistence risk

  • ✅ Automatic expiration

  • ✅ Memory zeroed on cleanup

  • ✅ Perfect for short-lived operations

Use Cases:

  • Real-time signing

  • API authentication

  • Temporary credentials

  • Development/testing

Mode 2: Derived Keys

Design Philosophy: Deterministic key generation from master seed

Benefits:

  • ✅ Stateless (no storage needed)

  • ✅ Reproducible keys

  • ✅ Master seed rotation possible

  • ✅ Scales infinitely

Use Cases:

  • Deterministic wallets

  • Backup-less key recovery

  • Multi-device sync

Mode 3: Time-Limited Keys

Design Philosophy: Persistent keys with automatic expiration

Benefits:

  • ✅ Survives restarts

  • ✅ Automatic cleanup

  • ✅ Configurable lifetime

  • ✅ Best-effort secure deletion

Use Cases:

  • Certificates

  • Temporary access tokens

  • Audit-required operations

Mode 4: CloudHSM Keys (Phase 2)

Design Philosophy: Hardware-isolated key storage with FIPS certification

Benefits:

  • ✅ FIPS 140-2 Level 3 certified

  • ✅ Physical tamper resistance

  • ✅ Keys never in software

  • ✅ Compliance requirements met

  • ✅ True key deletion

Limitations:

  • ⚠️ Cost: $1,152+/month for HA setup

  • ⚠️ Latency: ~5-10ms per operation

  • ⚠️ No PQC support yet (awaiting NIST FIPS modules)

Use Cases:

  • Financial institutions

  • Certificate authorities

  • Government/defense

  • Regulatory compliance (PCI-DSS, HIPAA)

Last updated