XDV Cryptographic Architecture - Classical, Post-Quantum, and Cross-Domain Cryptography.
Specification: XDV-031
Status: Normative (Draft)
Depends On: XDV-001 through XDV-030
xdv-crypto implements the Cryptographic Architecture of XDV, providing:
- Classical cryptography (SHA-256/384/512, ECDSA, RSA, AES-256-GCM, HMAC)
- Post-quantum cryptography (ML-DSA, SLH-DSA, ML-KEM, Kyber)
- Hybrid key derivation combining classical and PQ cryptography
- Cross-domain authentication for K/Q/Φ domains
- Capability token security
- Hardware attestation interface
Cryptography in XDV protects capability tokens, domain authentication, resource contracts, orchestration logs, and Virtual Hybrid Machine (VHM) isolation.
Cryptographic operations in XDV SHALL satisfy:
- Deterministic verification behavior - identical inputs produce identical outputs
- Post-quantum resilience - resistant to quantum adversaries
- Capability confinement - keys isolated per process/VHM
- Replay compatibility - verification logic reproducible under replay
- Domain separation - cryptographic isolation across domains
xdv-crypto/
├── LICENSE # Dust Open Source License (DOSL)
├── State.toml # Workspace manifest
├── README.md # This file
├── src/
│ ├── crypto_bridge.ds # Main entry point
│ ├── classical/
│ │ ├── crypto_classical.ds
│ │ ├── hash.ds # SHA-256/384/512
│ │ ├── signature.ds # ECDSA, RSA
│ │ ├── symmetric.ds # AES-256-GCM
│ │ └── mac.ds # HMAC
│ ├── postquantum/
│ │ ├── crypto_postquantum.ds
│ │ ├── signature_pq.ds # ML-DSA, SLH-DSA
│ │ ├── kem_pq.ds # ML-KEM, Kyber
│ │ └── hash_pq.ds # PQ-resistant hashing
│ ├── hybrid/
│ │ ├── crypto_hybrid.ds
│ │ └── key_derivation.ds # KDF(K_classical || K_postquantum)
│ ├── capability/
│ │ └── crypto_capability.ds # Token signing/verification
│ └── attestation/
│ └── hw_attestation.ds # Hardware provider authentication
└── docs/
└── cryptographic_architecture.md
| Category | Algorithms |
|---|---|
| Hashing | SHA-256, SHA-384, SHA-512 |
| Signatures | ECDSA (P-256, P-384), RSA-2048/4096 |
| Symmetric | AES-256-GCM |
| MAC | HMAC-SHA256, HMAC-SHA384 |
Signature verification and hashing MUST produce identical results for identical inputs. Cryptographic randomness SHALL NOT influence:
- Authorization decisions
- Scheduler behavior
- Event ordering
| Category | Algorithms |
|---|---|
| Signatures | ML-DSA-44/65/87, SLH-DSA-SHA2/SHAKE |
| KEM | ML-KEM-512/768/1024, Kyber-512/768/1024 |
| Hashing | SHAKE-256, SHA-3 |
Compromise of classical keys SHALL NOT compromise PQ-protected assets. PQ adoption SHALL NOT weaken deterministic orchestration.
Hybrid key derivation combines classical and PQ cryptography:
K_H = KDF( K_classical || K_postquantum )
For identical inputs, random seeds, and negotiation parameters, derived keys SHALL be identical.
For domain binding:
- Present cryptographic identity
- Provide hardware/firmware attestation
- Validate signature chain
- Confirm capability scope
- Log authentication event
Tokens include:
- Domain identity
- Cryptographic signature (PQ)
- Version metadata
- Hardware attestation proof
- Logical timestamp
Capability tokens SHALL:
- Be cryptographically signed
- Include domain identifiers
- Include scope restrictions
- Include expiration
- Include logical timestamp
Forgery SHALL be cryptographically infeasible.
Q and Φ hardware providers SHALL:
- Present signed attestation (PQ signature)
- Declare supported operations
- Declare resource limits
- Support PQ signature verification
Hardware SHALL NOT gain access without successful authentication.
Cryptographic verification SHALL be replay-compatible:
- Signature validation outcomes reproducible
- Authentication decisions reproducible
- Key derivation steps reproducible (deterministic inputs)
- Capability validation results reproducible
Randomness used in cryptographic generation SHALL NOT affect replay of verification logic.
cd xdv-crypto/src
dust buildAn implementation is compliant if:
- Classical crypto is modern and secure
- Post-quantum primitives are supported
- Hybrid key derivation is deterministic
- Cross-domain authentication is mandatory
- Cryptographic verification is replay-safe
- Capability tokens are cryptographically protected
- XDV-001 through XDV-030 (prerequisites)
- XDV-034 (Audit & Attestation - uses xdv-crypto)
- XDV-040 (Cross-Domain Network Stack - uses xdv-crypto)
- XDV-060 (Q Hardware Provider Interface)
- XDV-061 (Φ Hardware Provider Interface)