Key Generation & Distribution

Cipher Cryptography Documentation

Cipher relies exclusively on elliptic curve cryptography for identity and authentication. Each user generates a unique key pair using the secp256k1 curve — the same curve used in the Ethereum ecosystem — ensuring compatibility, high entropy, and minimal footprint.

Local & External Generation

Key pairs can be generated directly within the Cipher interface or externally through any tool supporting secp256k1. This includes Ethereum-compatible wallets, cryptographic libraries, and secure hardware devices.

  • Private Key: Held only by the user. Never transmitted. Used exclusively to decrypt incoming data and sign outgoing transmissions.

  • Public Key: Shared with correspondents. Used by recipients to validate sender identity and ensure data integrity.

Cryptographic Identity

Cipher does not store or manage any user credentials. Instead, it recognizes a valid identity solely through possession of the corresponding private key. This eliminates the need for traditional authentication systems, login databases, or email verification.

The system recognizes:

  • Public Key: The user identifier

  • Private Key: The authentication token

No fallback. No recovery mechanism. Full responsibility — and full control — remains with the user.

Key Distribution Model

In practical use, users exchange their public keys directly through secure external channels (in-person, encrypted messaging, etc.). This decentralized exchange model avoids exposure to centralized interception points and supports flexible pairing with Cipher's structured channel system.

In combination with structured passphrases, these keys form the dual core of Cipher's encryption handshake — creating a dynamic, non-reproducible AES layer via zero-knowledge derivation.

Last updated