Sorane utilizes a multi-layered, hybrid cryptographic architecture to ensure long-term security (Post-Quantum Resistance) and high hardware-level security (PassKey integration).
1. Hybrid Signature Model
Every "Verifiable Signature" in Sorane is Hybrid. It combines a traditional "Classic" algorithm with a "Post-Quantum" algorithm.
| Layer | Algorithm | Purpose |
|---|---|---|
| Classic | Ed25519 or P-256 | Compatibility with existing hardware (YubiKey, TouchID) and libraries. |
| PQC | ML-DSA-44 | Protection against potential future quantum computer attacks. |
Verification Rule: A signature is considered valid only if (Classic) AND (Post-Quantum) signatures verify successfully.
2. Key Tiers & Delegation
To balance security (keeping the private key safe) and automation (CI/CD builds), Sorane uses a tiered key structure.
Tier 1: Root Identity (The "Anchor")
- Store: Hardware (PassKey/WebAuthn) or a highly protected
root-identity.json. - Purpose: Represents the site owner's identity. It is rarely used directly for content signing.
- Algorithm: Primarily P-256 (for PassKey compatibility).
Tier 2: Delegate Certificate
- Purpose: A Verifiable Credential issued by the Root Identity that authorizes a specific "Build Key" to act on its behalf for a limited time (e.g., 7 days).
- Contains: The public keys of the authorized Build Key.
Tier 3: Build Keys (Ephemeral)
- Store: Memory or temporary
delegate-key.jsonduring the build process. - Purpose: Signs the actual contents (HTML, documents, badges).
- Algorithm: Ed25519 + ML-DSA-44 (Hybrid).
3. Signature Formats
Sorane supports multiple formats depending on the use case:
A. Hybrid VC (JSON)
- Standard: W3C Verifiable Credentials 1.0/2.0.
- Encoding: JSON with JCS (JSON Canonicalization Scheme).
- Use Case: Human-readable signatures, Digital Badges (
juminhyo).
B. Binary COSE VC (CBOR)
- Standard: COSE (RFC 9052) / C2PA-like.
- Encoding: CBOR (Binary).
- Use Case: Embedded signatures in font files, images, or small binary payloads. Optimized for PQC signature sizes.
4. Security Benefits
- No Long-term Secrets on Disk: Even if a build server is compromised, attackers only get a short-lived ephemeral key.
- Quantum-Ready: Data signed today remains confidential and authentic even if quantum computers become viable.
- Hardware-Backed: The ultimate authority (Root) remains in the user's secure hardware (PassKey).