Security Model

Cryptographic Foundations

  • Signing: ML-DSA (FIPS 204) — lattice-based, quantum-resistant
  • Key Exchange: ML-KEM (FIPS 203) — lattice-based encapsulation
  • Symmetric: AES-256-GCM — authenticated encryption
  • KDF: HKDF-SHA256 — key derivation from shared secrets
  • Hash: SHA3-256 — hash chains and Merkle trees

Tamper Evidence

Both the audit log and trust ledger use SHA3-256 hash chains. Each entry includes the hash of the previous entry. Breaking the chain requires recomputing all subsequent hashes.

Key Storage

Private keys are encrypted at rest using AES-256-GCM with a key derived from the system keyring or a passphrase via HKDF.