Cryptographic Layers
εβισαα implements a multi-tiered cryptographic strategy combining symmetric and asymmetric algorithms with post-quantum cryptography. Our infrastructure is designed to maintain security under both traditional and quantum computing threats.
Symmetric Cryptography
- AES-256-GCM encryption for data at rest
- SHA-3-512 for cryptographic hashing
- ChaCha20-Poly1305 stream cipher for wire traffic
Post-Quantum
- CRYSTAL-Kyber 768 key exchange
- Dilithium-2 digital signatures
- Spinning qubits detection layer
Key Management System
Hardware Security Modules
FIPS 140-3 Level 4 certified HSM deployment
🔐
Master key hierarchy with YubiHSM 2 devices
Security Features
- Dual control key activation
- Air-gapped key storage
- FIPS 140-3 certified key lifecycle
Cryptographic Protocol Stack
Layer 1 - Transport
- → TLS 1.3 with quantum-grade key exchange
- → XChaCha20-Poly1305 encryption
- → 3072-bit RSA key signatures
Layer 2 - Authentication
- → FIDO2/Webauthn protocol
- → HSM-backed key material
- → PBKDF2 + Argon2 hybrid hashing
Layer 3 - Application
- → BLS signature aggregation
- → Secure multi-party computation
- → Differential private queries