Key Generation & Distribution
Cipher Cryptography Documentation
Cipher relies exclusively on elliptic curve cryptography for identity and authentication. Each user generates a unique key pair using the secp256k1
curve — the same curve used in the Ethereum ecosystem — ensuring compatibility, high entropy, and minimal footprint.
Local & External Generation
Key pairs can be generated directly within the Cipher interface or externally through any tool supporting secp256k1
. This includes Ethereum-compatible wallets, cryptographic libraries, and secure hardware devices.
Private Key: Held only by the user. Never transmitted. Used exclusively to decrypt incoming data and sign outgoing transmissions.
Public Key: Shared with correspondents. Used by recipients to validate sender identity and ensure data integrity.
Cryptographic Identity
Cipher does not store or manage any user credentials. Instead, it recognizes a valid identity solely through possession of the corresponding private key. This eliminates the need for traditional authentication systems, login databases, or email verification.
The system recognizes:
Public Key: The user identifier
Private Key: The authentication token
No fallback. No recovery mechanism. Full responsibility — and full control — remains with the user.
Key Distribution Model
In practical use, users exchange their public keys directly through secure external channels (in-person, encrypted messaging, etc.). This decentralized exchange model avoids exposure to centralized interception points and supports flexible pairing with Cipher's structured channel system.
In combination with structured passphrases, these keys form the dual core of Cipher's encryption handshake — creating a dynamic, non-reproducible AES layer via zero-knowledge derivation.
Last updated