Skip to main content

Security and Cryptographic Architecture

This is one of the most scientifically rigorous parts of the system.

Symmetric Encryption

AES-256-GCM is applied at the field level for sensitive data.

Homomorphic Encryption (Paillier)

Chosen for its:

  • Additive homomorphism
  • Maturity
  • Interoperability
  • Efficient key sizes

Used for:

  • Privacy-preserving analytics
  • Summations
  • Aggregations

Differential Privacy

Noise is added to aggregated outputs using ε-bounded parameters. This prevents leakage through statistical queries.

Post-Quantum Cryptography

Vektagraf incorporates:

  • Kyber for Post-Quantum key exchange
  • Dilithium for Post-Quantum signatures

These represent leading NIST PQC standards.

Motivation:

Future-proofing high-value identity and financial systems where data remains sensitive beyond the advent of practical quantum computing.

Cryptographic Provenance

Each object version includes:

  • Hash of previous version
  • Hash of object state
  • Timestamp
  • Actor/tenant context

This forms a verifiable chain:

$$ H_n = \text{Hash}(H_{n-1} \parallel \text{ObjectState}_n) $$

This makes tampering detectable and auditable.