SPIRALVERSE PROTOCOL
Quantum-Resistant Architecture
RWP v3.0 Technical Documentation
Integrating Post-Quantum Cryptography with the Six Sacred Tongues Protocol Layer
Document Information
| Field | Value |
|---|---|
| Version | 3.0.0-alpha |
| Status | Draft for Review |
| Classification | Internal Technical |
| Last Updated | January 2026 |
| Authors | Spiralverse Architecture Team |
| Reviewers | Security Council of Aethermoor |
| Ingested | February 19, 2026 (repo ingestion from inventor submission) |
Ingestion Note
This file is the canonical repo capture of the inventor-submitted RWP v3.0 alpha PQC architecture draft shared in-session.
Executive Summary
RWP v3.0 defines a quantum-resistant upgrade path from RWP v2.0 using hybrid post-quantum cryptography while preserving compatibility and Six Sacred Tongues semantic-layer behavior.
Critical driver: harvest-now-decrypt-later risk for long-lifetime sensitive data.
1. Current RWP v2 Baseline and Threat Gap
1.1 Current primitives (v2)
- Key exchange: X25519 (vulnerable to Shor)
- Signatures: Ed25519 (vulnerable to Shor)
- Symmetric: AES-128-GCM (weakened under Grover to ~64-bit effective security)
- Hash/MAC/KDF: SHA-256 / HMAC-SHA256 / HKDF-SHA256 (acceptable with Grover caveats)
1.2 Threat model expansion
RWP v2 used a classical Dolev-Yao model without quantum adversaries.
RWP v3 explicitly adds quantum-threat posture and migration controls.
1.3 Six Sacred Tongues crypto-touch points
- KO: directive signature integrity (high impact under signature break)
- AV: encrypted sentiment payload paths
- RU: hash-chain/timestamp integrity
- CA: ceremony key operations
- UM: derivation and shadow session key lineage
- DR: multi-party key agreement and high-authority operations
2. PQC Upgrade Architecture (Hybrid)
2.1 Selected algorithm suite
| Function | Classical | PQC | Standard |
|---|---|---|---|
| KEM / Key exchange | X25519 | ML-KEM-768 | FIPS 203 |
| Signatures | Ed25519 | ML-DSA-65 | FIPS 204 |
| Symmetric | AES-128-GCM | AES-256-GCM | FIPS 197 |
| Hash | SHA-256 | optional SHA3-256 | FIPS 202 |
2.2 Secret-combination policy
Hybrid shared secrets are combined using HKDF over concatenated classical+PQC material; security holds if at least one component remains secure.
3. SST-Aware Negotiation and Policy
3.1 Protocol modes
CLASSICAL_ONLYHYBRID_PREFER_PQ(default during migration)PQ_ONLY(target steady-state)
3.2 Mandatory policy constraints
- Hybrid KEX required when mode >= hybrid
- Hybrid signatures mandatory for critical tongues (KO/CA/DR)
- AES-256 minimum for new operations
- Key lifetime controls (default max 365d, ceremony max 90d, ephemeral max 24h)
- Classical fallback activity must be audit-logged
4. Migration Plan
Phase 1 (Q1-Q2 2026)
- Introduce hybrid KEM/signatures in parallel
- Upgrade AES-128-GCM -> AES-256-GCM
- Enable negotiation framework
Phase 2 (Q3-Q4 2026)
- Set hybrid as default
- Re-encrypt critical/high-priority historical data
- Deprecation warning path for classical-only
Phase 3 (2027+)
- Default to
PQ_ONLY - Remove classical from active paths
- Keep archive verification tooling for historical records
5. API Surface (RWP v3 SDK)
Core abstractions captured in draft:
SpiralverseSDK- Hybrid key exchange methods (
generateKeyPair,exchange,encapsulate,decapsulate) - Hybrid signature methods (
generateSigningKeyPair,sign,verify,verifyBatch) SSTManagerwith tongue-specific bindings (KO/AV/RU/CA/UM/DR)
6. Claimed Operational Outcomes (Draft)
- Backward-compatible migration from RWP v2
- Hybrid security posture immediately reducing long-horizon risk
- Tongue-aware policy governance retained under PQC
- Operational path toward pure PQC steady state
7. References
- NIST PQC project: https://csrc.nist.gov/Projects/post-quantum-cryptography
- FIPS 203 (ML-KEM): https://csrc.nist.gov/pubs/fips/203/final
- FIPS 204 (ML-DSA): https://csrc.nist.gov/pubs/fips/204/final
- Open Quantum Safe: https://openquantumsafe.org/
8. Relationship to SCBE-AETHERMOORE
This draft aligns with repository components and direction:
- six-tongues policy architecture
- hybrid/dual-lattice crypto direction
- multi-agent governance and audit paths
- cloud + edge deployment compatibility requirements
9. Pending Follow-Up
- Add compliance matrix mapping each API method to SCBE layer gates.
- Add performance benchmark section from measured repo test runs.
- Add explicit interoperability test vectors for classical/hybrid/PQ-only transitions.