Math Behind emRA.ls

Explore the cryptographic foundations and mathematical principles that power decentralized identity, secure communication, and trustless verification in emRA.ls.

🔐 Dive Into Cryptography
Core Mathematical Concepts

Symmetric Key Algorithms

emRA.ls leverages AES-256 for secure data encryption at rest. Every user's private key is encrypted with a password-derived key using PBKDF2-HMAC-SHA256.

AES-256 Encryption Formula (simplified):

C = Ek(P) ⊕ IV
where k ∈ 𝔽2256, P = plaintext, IV = initialization vector

Zero-Knowledge Proofs

Our ZKP system (based on zk-SNARKs) enables authentication without identity leakage. The protocol ensures:

  • 🔐 Completeness

    If statement is true, verifier will be convinced

  • 🚫 Soundness

    Prover cannot convince verifier of false statement

Byzantine Fault Tolerance

We utilize a modified Practical Byzantine Fault Tolerance (PBFT) protocol with threshold signature schemes for decentralized consensus.

Consensus Requirements:

  • 3f + 1 replicas required for f faults
  • View changes with leader rotation
  • Digital signature aggregation

Ready to Deep-Dive?

Review the mathematical foundations, cryptographic libraries, and consensus algorithms we use to keep your data private and secure.

📚 View Full Specifications