Cryptographic Compliance

Security & Cryptographic Compliance

All algorithms approved by international standards bodies (NIST, BSI, ANSSI, CRYPTREC, SOG-IS). No custom cryptography.

Security Principles

Three principles govern the cryptographic architecture.

No Custom Cryptography

All algorithms are standard NIST/IETF choices implemented via Node.js crypto (OpenSSL). The system contributes architecture, not cryptography.

Three-Layer Integrity

Hash chains ensure records cannot be altered. Digital signatures (Ed25519) prove who created each record. Canonical JSON (JCS) ensures consistent formatting.

No Secrets in Verification

Certificate verification requires only a public key. No platform account, library, or cooperation needed. Anyone verifies independently.

Cryptographic Algorithm Suite

The system supports 30 algorithm combinations. Each record chain selects its algorithms at creation — they cannot be changed afterward.

Hash Functions6 algorithms
AlgorithmStandardSecurity
SHA-256FIPS 180-4128-bit
SHA-384FIPS 180-4192-bit
SHA-512FIPS 180-4256-bit
SHA3-256FIPS 202128-bit
SHA3-384FIPS 202192-bit
SHA3-512FIPS 202256-bit
Digital Signature Algorithms5 algorithms
AlgorithmStandardSecurity
Ed25519RFC 8032128-bit
Ed448RFC 8032224-bit
ECDSA P-256FIPS 186-5128-bit
ECDSA P-384FIPS 186-5192-bit
ECDSA P-521FIPS 186-5256-bit
Standard Format
JCSRFC 8785
Standardized JSON

30 combinations (6 hashes × 5 signatures × 1 standard format) — each chain locks its algorithms at creation.

Research Foundation

The cryptographic architecture is grounded in a formal threat model derived from a systematic review of academic and industry agent accountability approaches.

AEGIS: AI Agent Accountability Threat Model

Defines 8 threat classes (T1–T8) and 7 evaluation dimensions (D1–D7), providing the rationale for the hash chain, signature, and verification architecture.

Read the full paper

DOI: 10.5281/zenodo.18955103

LLM Exposure Monitoring: Platform Openness & Recording Depth

Systematic analysis of AI platform recording capabilities across openness tiers. Establishes the evidence basis for the attestation source model (gateway_observed, platform_verified, agent_reported, cross_verified).

Read the full paper

DOI: 10.5281/zenodo.19112060

Legal Framework Alignment

Designed to meet legal evidence requirements across jurisdictions.

EU AI Act

Art. 12, 19, 26, 73

Automatic logging, retention, incident reporting

eIDAS

Art. 26 (Advanced Electronic Signatures)

Ed25519 satisfies advanced e-signature requirements

China E-Signature Law

Article 13

Compatible with electronic signature recognition

Open Specification & Verification

The provenance specification is open source. Anyone can inspect the cryptographic architecture, build independent verifiers, or audit the protocol.

Open Provenance Specification

Complete specification for hash chains, certificates, verification protocols, and event schemas. Published under Apache 2.0 with Issuance Rights.

Apache 2.0JavaScript SDKPython SDK

Cryptographic Compliance Statement

Detailed compliance tables for every algorithm against BSI, CRYPTREC, NIST, ANSSI, and SOG-IS standards.

BSI TR-02102CRYPTRECNISTANSSISOG-IS

Independent verification

Every provenance certificate can be independently verified using only a public key. No account required.