Loading...
private.me Docs
Get Crypto
PRIVATE.ME PLATFORM

XorIDA: Threshold Sharing Engine

Sub-millisecond information-theoretic security over GF(2). The foundational cryptographic engine powering every PRIVATE.ME package. 14 microseconds for a 64-byte API payload — 11.4x faster than AES-256-GCM. No keys to manage, rotate, or compromise. The split IS the security. Quantum-proof unconditionally.

Core Infrastructure AVAILABLE NOW 182 tests · 12 files Zero Dependencies 100% Coverage
NOW AVAILABLE
@private.me/crypto is built, tested, and deployed. 182 tests across 12 test files — including known-answer test vectors, property-based tests, fuzz tests, and abuse case tests. All passing. 100% line coverage. Pure TypeScript with zero npm dependencies. Web Crypto API for HMAC-SHA256 and randomness. TLV serialization built in. The core engine powering all 94 packages in the PRIVATE.ME ecosystem.
Section 01

The Problem: Cryptographic Data Protection Is Broken

Traditional approaches to protecting data at rest and in transit force a choice between security and performance. Key-based encryption requires key management. Secret sharing is computationally expensive. The industry accepted this tradeoff. It was wrong.

Key management is the single biggest failure point in data security. AES-256-GCM is mathematically sound, but it requires a key. That key must be generated, stored, rotated, distributed, escrowed, backed up, and eventually destroyed. Every step is an attack surface. Every key is a single point of failure. Compromise one key and you compromise every byte it ever encrypted.

Secret sharing solved key management but introduced a performance problem. Shamir's Secret Sharing operates over large finite fields with polynomial evaluation. For every byte of data, it performs expensive modular arithmetic. The result: 500-2000x slower than direct encryption. This made threshold sharing impractical for real-time applications — messaging, streaming, API payloads, and anything latency-sensitive.

Modern crypto libraries compound the risk. A typical npm cryptographic package pulls in dozens of transitive dependencies. Each dependency is an attack surface. A single compromised package in the chain undermines the entire security model. The npm ecosystem has repeatedly demonstrated this risk — event-stream, ua-parser-js, colors.js. Dependency count is attack surface.

Competitive Failure Table

ApproachSpeed (64B)Quantum-SafeKey-FreeExpansion
AES-256-GCM160µsNoNo (key required)+28B overhead
Shamir SSS~28msYesYesK×N expansion
threshold.js~15msYesYesK×N expansion
XorIDA (PRIVATE.ME)14µsYesYes1:1 (N shares)

XorIDA is 1,000x faster than Shamir's for small payloads and achieves the same information-theoretic guarantee. No key management. No dependency chain. No tradeoff.

The Old Way

TRADITIONAL SSS GF(p) polynomial eval 500-2000x slower Heavy dependencies K×N expansion ratio 1MB INPUT 500ms-2000ms
Section 02

The Solution: XorIDA Threshold Sharing

XorIDA implements Information Dispersal over GF(2), achieving information-theoretic security with near-zero computational overhead. The split IS the security. No keys to manage, rotate, or compromise. Unbreakable even with infinite compute.

By operating over GF(2) — the binary field — XorIDA replaces expensive modular arithmetic with XOR operations that execute in a single CPU cycle. The Cauchy matrix construction ensures any K-of-N share subset can reconstruct the original data, providing both secrecy and fault tolerance simultaneously.

Information-theoretic security means the security guarantee is mathematical, not computational. It does not depend on the difficulty of factoring large numbers, solving discrete logarithms, or any other computational hardness assumption. An adversary with infinite computing power, infinite time, and infinite storage cannot extract the original data from fewer than K shares. This is not a claim about current hardware. It is a proof about information.

No keys. XorIDA does not use encryption keys. There is no key to generate, store, rotate, distribute, escrow, back up, or destroy. The data is split into N shares. Any K shares reconstruct it. Any K-1 shares reveal zero information about it. The absence of keys eliminates the largest attack surface in data protection.

Zero dependencies. The implementation is pure TypeScript with zero npm dependencies. Every random byte comes from crypto.getRandomValues(). HMAC-SHA256 verification uses the Web Crypto API. TLV serialization is built in. The entire package has 100% line coverage with known-answer test vectors, property-based tests, and fuzz tests.

The New Way

DATA Any size XorIDA GF(2) Cauchy <1ms typ. Share 1 HMAC tagged Share 2 HMAC tagged Share N HMAC tagged K-of-N Reconstruct
Three Guarantees
1. Information-theoretic confidentiality. K-1 shares reveal zero bits about the original data — not probabilistically, but unconditionally. No quantum computer, no unbounded adversary, no future mathematical breakthrough changes this.

2. HMAC integrity before reconstruction. Every share carries an HMAC-SHA256 tag computed via Web Crypto API. Verification completes before reconstruction begins. A tampered share is rejected — the engine never produces corrupted output.

3. Fault tolerance. With K-of-N splitting (K < N), up to N-K shares can be lost or destroyed without data loss. A 2-of-3 split survives one lost share. A 3-of-5 split survives two.
Section 03

Architecture: The Split Pipeline

The XorIDA pipeline takes arbitrary binary input, pads it to a K-aligned boundary, computes an HMAC-SHA256 integrity tag, multiplies the padded data by a Cauchy matrix over GF(2) to produce N shares, and attaches per-share HMAC tags. Reconstruction is the reverse: verify HMACs, invert the matrix, unpad.

Split Pipeline

XORIDA SPLIT PIPELINE Input Uint8Array Pad Align to K HMAC SHA-256 XorIDA Split Cauchy GF(2) Matrix mul N Shares HMAC tagged Storage / Transport

Reconstruct Pipeline

XORIDA RECONSTRUCT PIPELINE K+ Shares Collected Verify HMAC Per-share check Fail = reject Reconstruct Matrix inverse GF(2) XOR Unpad Strip padding Original Data Byte-identical

IDA5 Binary Envelope Format

Every XorIDA share is wrapped in the IDA5 binary envelope. The first 4 bytes are the magic number 0x49444135 ("IDA5" in ASCII), followed by the share index, threshold parameters, and HMAC tag. This self-describing format enables any recipient to identify a share without external metadata and validate its integrity before processing.

IDA5 Envelope Structure
// IDA5 binary envelope layout
// Bytes 0-3:    Magic    0x49444135 ("IDA5")
// Byte  4:      Version  0x01
// Byte  5:      Index    Share index (1-based)
// Byte  6:      K        Threshold
// Byte  7:      N        Total shares
// Bytes 8-39:   HMAC     SHA-256 integrity tag
// Bytes 40-55:  UUID     Share set identifier
// Bytes 56+:    Data     Share payload
Critical Security Property
HMAC verification MUST complete before reconstruction. This is enforced by the pipeline architecture. If any share fails HMAC verification, the entire operation is rejected. The engine never produces output from tampered shares. This is not a configuration option. It is a hard constraint in the code path.
Section 04

Deep Dive: GF(2) Operations

XorIDA's performance advantage comes from operating over GF(2) — the binary field where addition and subtraction are both XOR, and every non-zero element is its own inverse. This reduces matrix operations from expensive modular arithmetic to single-cycle CPU instructions.

Threshold Parameters (K-of-N)

The threshold parameter K determines how many shares are required to reconstruct. The total N determines how many shares are produced. Any K shares out of N suffice for reconstruction. Any K-1 shares reveal zero information about the original data. This is the information-theoretic guarantee.

ConfigurationK (Threshold)N (Total)Fault ToleranceUse Case
2-of-222None (both required)Split-channel messaging, Xail email
2-of-3231 share lostStandard backup, most common config
3-of-5352 shares lostEnterprise key escrow, high availability
4-of-7473 shares lostEnterprise maximum redundancy

Why GF(2)?

XOR-based splitting. In GF(2), addition is XOR. Multiplication of a byte by a GF(2) element is a conditional XOR. There is no modular reduction, no polynomial evaluation, no large-number arithmetic. The Cauchy matrix over GF(2) has the property that every square sub-matrix is invertible, which guarantees that any K shares can reconstruct the original data.

1:1 expansion ratio. Each share is the same size as the original data divided by K. For a 2-of-3 split of 100 bytes, each share is approximately 50 bytes. Total storage for all 3 shares: ~150 bytes. Compare to Shamir's, where each share is the full size of the original data: 3 shares of 100 bytes = 300 bytes. XorIDA uses 50% less storage for the same redundancy level.

HMAC-before-reconstruction. Every share carries an HMAC-SHA256 tag computed via the Web Crypto API. Before reconstruction begins, every collected share is verified against its tag. If any share has been tampered with — even a single bit — the operation fails immediately. The engine never attempts to reconstruct from unverified shares. This prevents both accidental corruption and deliberate manipulation.

Configuration Examples

Threshold Configurations
import { split, reconstruct } from '@private.me/crypto';

// 2-of-2: Maximum security, no fault tolerance
// Both shares required. Loss of either = data loss.
const shares2of2 = await split(data, 2, 2);

// 2-of-3: Security + one-share fault tolerance
// Any 2 of 3 shares reconstruct. Lose 1, still recover.
const shares2of3 = await split(data, 3, 2);

// 3-of-5: Enterprise redundancy
// Any 3 of 5 shares. Survive loss of 2 shares.
const shares3of5 = await split(data, 5, 3);

// Reconstruct from any valid K-subset
const original = await reconstruct([shares3of5[0], shares3of5[2], shares3of5[4]]);
// original === data (byte-identical)
Section 05

Benchmarks

XorIDA dominates AES-256-GCM for API-sized payloads: 2-11x faster below 1KB. The crossover occurs at approximately 1-2KB. Above that, AES catches up because it benefits from hardware acceleration (AES-NI). XorIDA is purpose-built for the payload sizes that matter most: API requests, credentials, keys, tokens, and messages.

14µs
64 bytes
35µs
256 bytes
58µs
1 KB
33ms
1 MB

XorIDA vs. AES-256-GCM

PayloadXorIDAAES-256-GCMSpeedup
64 bytes14µs160µs11.4×
256 bytes35µs122µs3.5×
1 KB58µs140µs2.4×
1 MB33ms28ms0.85×
Crossover Point
XorIDA is faster than AES-256-GCM for payloads below ~1-2KB. Above this threshold, AES benefits from hardware-accelerated AES-NI instructions. For payloads larger than 1-2KB, the recommended pattern is to encrypt the payload with AES-256-GCM and then split the AES key with XorIDA. This gives you the storage efficiency of encryption for bulk data with the key-free security of XorIDA for the key itself. This is exactly how xChange works.

Why This Matters

Most security-critical payloads are small: API tokens (64-256B), JWTs (256B-1KB), session keys (32-64B), credentials (100B-1KB), chat messages (100B-4KB). XorIDA operates in exactly the range where traditional approaches are slowest. For the payload sizes that matter most — the ones securing every other operation — XorIDA is an order of magnitude faster.

Section 06

ACI Surface

Four core functions. That is the entire public API. Split, reconstruct, tag, verify. Every other PRIVATE.ME package builds on these four primitives.

split(data: Uint8Array, n: number, k: number): Promise<Share[]>
Splits arbitrary binary data into N shares with K-of-N threshold. Uses Cauchy matrix over GF(2) for near-zero overhead. Each share is HMAC-SHA256 tagged for integrity. Returns array of Share objects with index, data, and HMAC fields. Input data is PKCS7-padded to align with K before splitting. TLV envelope wraps the payload with length metadata for unambiguous reconstruction.
reconstruct(shares: Share[]): Promise<Uint8Array>
Reconstructs original data from K or more shares. Verifies HMAC-SHA256 on every share before reconstruction — tampered shares are rejected before any matrix operation. Inverts the Cauchy sub-matrix for the given share indices. Strips PKCS7 padding. Returns the exact original byte array, bit-for-bit identical to the input.
hmacShare(share: Share, key: CryptoKey): Promise<TaggedShare>
Computes an HMAC-SHA256 tag for a share using the Web Crypto API. The tag covers the entire share payload including index and threshold metadata. Returns a TaggedShare with the original share data plus the computed tag. Used internally by split() and available for external integrity tagging workflows.
verifyShare(share: TaggedShare, key: CryptoKey): Promise<boolean>
Verifies an HMAC-SHA256 tag on a share. Returns true if the share is intact, false if any bit has been modified. Uses constant-time comparison via Web Crypto API to prevent timing side-channels. Called by reconstruct() for every share before processing. Never returns partial results — verification is all-or-nothing.
Core API Example
import { split, reconstruct } from '@private.me/crypto';

// Split: data in, shares out
const data = new TextEncoder().encode('sensitive API payload');
const shares = await split(data, 3, 2);
// shares.length === 3
// Each share reveals zero information about the payload

// Reconstruct: any K shares in, original data out
const recovered = await reconstruct([shares[0], shares[2]]);
// recovered === data (byte-identical)

// Tampered share? Rejected before reconstruction.
shares[0].data[0] ^= 0xff; // flip bits
const result = await reconstruct([shares[0], shares[1]]);
// throws: HMAC verification failed
Section 07

Use Cases

Five domains where XorIDA's combination of speed, key-free security, and information-theoretic guarantees enables capabilities that key-based cryptography cannot.

SECURE MESSAGING
Xail Split-Channel Email

Xail splits every secure message into shares routed through independent email providers. Share 1 through Gmail, Share 2 through Outlook. No single provider sees the message. No single breach exposes content. XorIDA's sub-millisecond performance makes this invisible to the user — splitting and reconstruction happen faster than the network roundtrip.

2-of-2 split
🤖
AGENT IDENTITY
xLink Agent-to-Agent

xLink wraps every M2M message in an XorIDA split with hybrid post-quantum KEM. Ed25519 + X25519 for classical security. ML-KEM-768 + ML-DSA-65 for quantum resistance. XorIDA provides the information-theoretic layer that makes the entire stack unconditionally secure against harvest-now-decrypt-later attacks.

multi-transport
🔒
SECRET STORAGE
xStore Split Storage

xStore uses XorIDA to split data across pluggable storage backends. Share 1 to AWS S3, Share 2 to Azure Blob, Share 3 to a local volume. No single cloud provider holds enough to reconstruct. Cloud provider compromise, insider threat, or legal subpoena against one provider reveals exactly zero bytes of the original data.

multi-cloud
💻
SECURE BOOT
xBoot Firmware Protection

xBoot splits firmware images and boot configurations across independent storage channels. The device reconstructs the firmware at boot time from threshold shares. Firmware tampering is detected by HMAC verification before any code executes. A compromised storage channel reveals nothing about the boot image.

IoT / OT
🔑
KEY TRANSPORT
xChange Key Transport

xChange splits AES keys with XorIDA and routes shares through independent transport channels. The key never exists in a single location during transit. Combined with the benchmark crossover pattern: encrypt bulk data with AES-256-GCM, split the key with XorIDA. The result is fast bulk encryption with information-theoretically secure key transport. ~1ms roundtrip for the entire key transport operation.

~1ms roundtrip

Defense and Intelligence

For government agencies and defense contractors handling classified information or Controlled Unclassified Information (CUI), XorIDA provides multi-level security by construction. No computational hardness assumptions means no quantum timeline risk — critical for information that must remain classified for decades. No key management means no key escrow disputes under CALEA or CLOUD Act.

🔒
CLASSIFIED STORAGE
Multi-Network Document Splitting

Store Share 1 on SIPRNET (Secret), Share 2 on JWICS (Top Secret). No single network compromise exposes the classified document. Satisfies NSA Commercial Solutions for Classified (CSfC) Component List requirements for defense-in-depth layering. NIST SP 800-171 compliant for CUI protection without traditional key management burden.

CMMC Level 3
📡
TACTICAL COMMS
Split-Channel Field Operations

Route Share 1 via military satellite (MILSATCOM), Share 2 via tactical radio. Adversary intercepts one channel but gains zero intelligence. Information-theoretic security means no cryptanalysis, no side-channel attacks, no exploitation timeline. Ideal for denied/degraded/intermittent/limited (DDIL) environments where network availability is unpredictable.

DDIL resilient

Financial Services Compliance

For broker-dealers, registered investment advisors, and financial institutions subject to SEC, FINRA, SOX, and PCI DSS requirements, XorIDA provides tamper-evident record protection with mathematically provable integrity guarantees.

📊
TRADE RECORDS
SEC 17a-4 / FINRA 4511 Compliance

Split transaction records with 2-of-3 threshold across independent WORM storage systems. Share 1 in primary datacenter (SEC-regulated storage provider), Share 2 in geographically separate backup, Share 3 offline in secure vault. No single storage breach exposes reconstructable records. HMAC chain provides tamper evidence for audit. Satisfies 6-year retention requirement with defense-in-depth.

WORM + XorIDA
💳
PAYMENT DATA
PCI DSS Scope Reduction

Split Primary Account Number (PAN) with 2-of-2 threshold across independent systems. System A holds Share 1 (cannot reconstruct), System B holds Share 2 (cannot reconstruct). Reduces PCI DSS scope by elimination: no single system in the environment stores reconstructable cardholder data. Satisfies PCI DSS 4.0 Requirement 3 (Protect Stored Account Data) with information-theoretic guarantee.

PCI scope reduction
📝
SOX CONTROLS
Financial Reporting Integrity

Split general ledger, journal entries, and audit trails with 2-of-3 threshold. No single database administrator can reconstruct financial records without threshold cooperation. Eliminates single point of failure for SOX Section 404 internal controls over financial reporting. HMAC verification + xProve audit trail provides cryptographic proof of data integrity for external auditor attestation (SOX 404(b)).

SOX 404(b)
Section 08

Regulatory Compliance

XorIDA's information-theoretic security model aligns with or exceeds the requirements of major regulatory frameworks. No key management means no key escrow disputes. No computational hardness assumptions means no quantum timeline risk.

StandardRequirementXorIDA Capability
FIPS 140-3Approved cryptographic moduleInformation-theoretic security exceeds computational requirements. HMAC-SHA256 via Web Crypto API (FIPS-approved).
NIST IR 8214CThreshold cryptography schemesNative K-of-N splitting. Configurable thresholds from 2-of-2 to 255-of-255. Built for IR 8214C Section 7 Gadget composition.
CNSA 2.0Quantum-resistant cryptographyUnconditionally secure — no computational assumptions. No quantum timeline dependency. Security is mathematical fact, not hardness bet.
GDPR Art. 32Appropriate technical measuresSplit eliminates single point of compromise. No single storage location holds reconstructable data. Data minimization by construction.
HIPAA Security RuleEncryption of ePHIThreshold sharing exceeds encryption: no key to compromise. Split ePHI across jurisdictions for defense-in-depth.
SOC 2 Type IIConfidentiality controls100% test coverage. Audit trail via HMAC chain. Zero dependency supply chain. Verifiable split/reconstruct operations.
PCI DSS 4.0Protection of cardholder dataSplit PAN across independent systems. No single system stores reconstructable cardholder data. Reduces PCI scope by elimination.
Quantum Timeline Independence
Every encryption algorithm currently deployed depends on a computational hardness assumption that quantum computers will eventually break. AES-256 is believed to be quantum-resistant but relies on brute-force complexity. RSA, ECDSA, and DH are known to be quantum-vulnerable. XorIDA is unconditionally secure: its guarantee holds against any adversary regardless of computational power, including quantum. There is no "crypto-agility" migration needed. No algorithm will ever break it because no algorithm protects it — the guarantee is information-theoretic.

Data Sovereignty

XorIDA enables data sovereignty by construction. Split sensitive data and store shares in different legal jurisdictions. Share 1 in the EU (GDPR jurisdiction), Share 2 in the US (CLOUD Act jurisdiction), Share 3 in Switzerland. No single jurisdiction holds enough to compel disclosure. A legal subpoena in one country produces a share that reveals zero information about the original data. Cross-border data protection becomes a mathematical property, not a legal argument.

For multinational enterprises subject to conflicting data localization requirements (GDPR vs. CLOUD Act, China PIPL, India DPDPA), XorIDA provides a technical mechanism that satisfies all frameworks simultaneously: the data is both "stored" in each jurisdiction (as shares) and "not stored" in any jurisdiction (as reconstructable content).

GDPR Article 5: Data Minimization

GDPR Article 5(1)(c) requires that personal data be "adequate, relevant and limited to what is necessary" for the specified purpose. XorIDA enables data minimization by construction: each share, when held independently, contains zero information about the original data. Organizations can distribute shares to different processors while ensuring no single processor holds data that could be used to identify individuals. This aligns with the principle of proportionality — the split ensures that data processing is strictly limited to what is necessary.

For cross-border transfers under GDPR Chapter V, XorIDA provides a technical safeguard: shares stored in third countries outside the EU reveal no personal data. A legal subpoena or government access request in one jurisdiction produces a share that is mathematically useless without the threshold number of shares. This technical measure supports Standard Contractual Clauses (SCCs) and demonstrates compliance with the "appropriate safeguards" requirement.

EU Cyber Resilience Act: IoT Cryptographic Protection

The EU Cyber Resilience Act (Regulation 2024/2847), entering force in phases through 2027, establishes binding cybersecurity requirements for products with digital elements. The regulation mandates cryptography following international guidelines (NIST SP 800-57, SOGIS, ETSI TS 119 312, BSI TR-02102-1). Starting December 2027, manufacturers must provide timely security updates and implement data protection by default.

XorIDA satisfies CRA requirements through information-theoretic security that exceeds computational cryptography standards. For IoT devices with constrained environments, XorIDA's zero-dependency implementation (no OpenSSL, no external crypto libraries) reduces supply chain risk. The sub-millisecond performance enables real-time splitting and reconstruction on embedded devices. HMAC-SHA256 integrity verification aligns with approved cryptographic mechanisms. The shift toward hardware-based trust using TPMs and secure elements complements XorIDA: split the device firmware with XorIDA, store shares across independent channels, and use the TPM to protect the reconstruction key schedule.

FINRA Rule 4511: Financial Record Retention

FINRA Rule 4511 requires broker-dealers to preserve books and records for at least six years in a format compliant with SEC Rule 17a-4. Records must be stored in a tamper-evident, non-rewritable, non-erasable format (WORM compliance). XorIDA provides a complementary security layer: split financial records with 2-of-3 threshold, store shares in independent WORM systems (one in SEC-regulated storage, one in a geographically separate location, one in an offline backup).

No single storage system compromise exposes reconstructable records. Insider threats are mitigated: an employee with access to one storage system cannot reconstruct transaction data. For audit purposes, the HMAC chain on each share provides tamper evidence. Combined with xProve's verifiable computation tier, firms can demonstrate cryptographic proof that records have not been altered — satisfying both SEC 17a-4's integrity requirements and SOX Section 404 internal control mandates.

SOX Section 404: Internal Controls Over Financial Reporting

Sarbanes-Oxley Act Section 404 requires management to assess the effectiveness of internal controls over financial reporting. XorIDA supports SOX compliance by eliminating single points of failure in financial data protection. Split general ledger data, transaction logs, and audit trails with 2-of-3 threshold. No single database compromise exposes financial records. No single employee (including database administrators) can reconstruct sensitive data without threshold cooperation.

The zero-dependency implementation reduces supply chain risk (SOX Section 404 control environment). The 100% test coverage and verifiable split/reconstruct operations provide audit evidence of control effectiveness. For public companies subject to external auditor attestation (SOX 404(b)), the HMAC chain and xProve verification tiers provide cryptographic proof of data integrity — stronger evidence than traditional access control logs.

Defense and Classified Information

For government contractors handling Controlled Unclassified Information (CUI) under NIST SP 800-171 or classified information under ICD 503, XorIDA provides multi-level security by construction. Split classified documents with 2-of-2 threshold, store shares on independent networks at different classification levels. Share 1 on SIPRNET, Share 2 on JWICS. No single network compromise exposes the classified content.

The information-theoretic guarantee aligns with NSA's Commercial Solutions for Classified (CSfC) Component List requirements: unconditional security regardless of adversary capabilities. For CMMC Level 3 (Defense Federal Acquisition Regulation Supplement compliance), XorIDA's zero-key architecture eliminates key management requirements under NIST SP 800-171 control 3.13.11 (cryptographic key establishment and management). There are no keys to establish, manage, rotate, or destroy — the split IS the security.

Section 09

Cross-ACI Composition

XorIDA is the foundation layer. Every PRIVATE.ME ACI builds on these four primitives. Four critical composition patterns define how the ecosystem connects.

XORIDA + XLINK
xLink wraps every agent-to-agent message in XorIDA split shares routed through independent transports. Ed25519 signatures authenticate. X25519 + ML-KEM-768 hybrid KEM encrypts. XorIDA provides the unconditionally secure layer beneath both. The result: split-channel M2M communication where no single transport channel carries enough to reconstruct the message. V3 is the default — automatic PQ key exchange with XorIDA as the information-theoretic foundation.
XORIDA + XCOMPUTE
xCompute enables multi-party computation directly on XorIDA shares without reconstruction. Threshold addition, multiplication, and comparison operations execute on shares from different parties. No party ever sees the other parties' data. The computation result is itself a set of shares. XorIDA is the data representation layer. xCompute is the computation layer. Together: compute on secrets without revealing them.
XORIDA + XFORMAT
xFormat is the binary envelope that wraps every XorIDA share for transport and storage. The IDA5 magic header (0x49444135) enables any recipient to identify a share without external metadata. xFormat handles serialization, versioning, and format negotiation. XorIDA handles the cryptographic splitting. The split creates the shares. xFormat makes them portable.
XORIDA + XPROVE
xProve provides verifiable computation proofs for XorIDA operations. Prove that a split was performed correctly. Prove that a reconstruction used valid shares. Prove that HMAC verification passed. All without revealing the underlying data. Four verification tiers from HMAC chains to MPC-in-the-Head zero-knowledge proofs. Cryptographic proof of correct data handling.
XORIDA + XCHANGE
xChange provides the fastest possible transport pattern: split the AES-256-GCM key with XorIDA (not the data), route key shares through independent channels, then transmit the AES-encrypted ciphertext through a single high-bandwidth channel. The result: ~1ms key transport with information-theoretically secure key protection. No key ever exists in a single location during transit. Combines the speed of symmetric encryption with the unconditional security of XorIDA. Ideal for bulk data transfer, video streaming, and low-latency IoT.

Integration Code Examples

All PRIVATE.ME ACIs expose TypeScript APIs designed for composition. The following patterns demonstrate how XorIDA integrates with xLink, xChange, and xCompute for common workflows.

xLink: Split-Channel Agent Message
import { Agent } from '@private.me/xlink';
import { split } from '@private.me/crypto';

const agent = await Agent.fromSeed(seed);
const message = new TextEncoder().encode('Confidential report');

// Split message into 2 shares with XorIDA
const shares = await split(message, { threshold: 2, totalShares: 2 });

// Send share[0] via HTTPS, share[1] via WebSocket
await agent.send({
  to: recipientDID,
  payload: shares[0],
  transport: ['https://transport1.example.com']
});

await agent.send({
  to: recipientDID,
  payload: shares[1],
  transport: ['wss://transport2.example.com']
});

// Recipient reconstructs from both shares
const reconstructed = await reconstruct([share0, share1]);
xChange: Fast Bulk Transfer with IT-Secure Key Transport
import { encryptWithSplitKey } from '@private.me/xchange';
import { split } from '@private.me/crypto';

// Encrypt 10MB file with AES-256-GCM, split the key
const { ciphertext, keyShares } = await encryptWithSplitKey(largeFile, {
  threshold: 2,
  totalShares: 2
});

// Send key share[0] via channel A, share[1] via channel B
await sendKeyShare(keyShares[0], 'https://channelA.example.com');
await sendKeyShare(keyShares[1], 'https://channelB.example.com');

// Send ciphertext via high-bandwidth channel (S3, CDN, etc.)
await uploadCiphertext(ciphertext, 's3://bucket/object');

// Recipient reconstructs key from both shares, decrypts ciphertext
const key = await reconstructKey([keyShare0, keyShare1]);
const plaintext = await decrypt(ciphertext, key);
xCompute: MPC on XorIDA Shares
import { split } from '@private.me/crypto';
import { addShares, multiplyShares } from '@private.me/xcompute';

// Party A splits secret value
const valueA = new Uint8Array([42]);
const sharesA = await split(valueA, { threshold: 2, totalShares: 2 });

// Party B splits secret value
const valueB = new Uint8Array([17]);
const sharesB = await split(valueB, { threshold: 2, totalShares: 2 });

// Compute (A + B) directly on shares without reconstruction
const sumShares = await addShares(
  [sharesA[0], sharesB[0]],
  [sharesA[1], sharesB[1]]
);

// Result is itself XorIDA shares — reconstruct to reveal sum
const sum = await reconstruct(sumShares); // [59]

// No party ever saw the other's input value

Enterprise Mode: xLink + xChange + xProve

For enterprise deployments requiring compliance audit trails, combine all three ACIs: xLink for authenticated agent identity, xChange for fast key transport, and xProve for verifiable computation proofs. The resulting pipeline provides split-channel communication with cryptographic proof of correct handling — no single component compromise exposes data, and every operation is auditable without revealing plaintext.

Full Enterprise Pipeline
import { Agent } from '@private.me/xlink';
import { encryptWithSplitKey } from '@private.me/xchange';
import { proveCorrectSplit } from '@private.me/xprove';

const agent = await Agent.fromSeed(enterpriseSeed);

// Encrypt + split key
const { ciphertext, keyShares, splitProof } =
  await encryptWithSplitKey(sensitiveData, {
    threshold: 2,
    totalShares: 3,
    generateProof: true  // xProve Tier 2 commit-reveal
  });

// Verify split correctness before sending
const isValid = await proveCorrectSplit(splitProof);
if (!isValid) throw new Error('Split verification failed');

// Send via xLink authenticated channels
await agent.send({
  to: backupDID,
  payload: keyShares[0],
  transport: ['https://backup1.example.com']
});

await agent.send({
  to: backupDID,
  payload: keyShares[1],
  transport: ['https://backup2.example.com']
});

// Audit trail: log proof to compliance system
await auditLog.record({
  operation: 'split-key-backup',
  proof: splitProof,
  timestamp: Date.now()
});
Section 10

Security Properties

Six security properties enforced by construction. Not by policy. Not by configuration. By the mathematics of the implementation.

PropertyMechanismGuarantee
ConfidentialityXorIDA GF(2) Cauchy matrixInformation-theoretic (unconditional). K-1 shares reveal zero bits.
IntegrityHMAC-SHA256 per shareTamper detection before reconstruction. Any modified bit detected.
Randomnesscrypto.getRandomValues()CSPRNG only. Never Math.random(). Web Crypto API sourced.
Quantum SafetyInformation-theoretic foundationUnconditionally quantum-safe. No computational hardness dependency.
Supply ChainZero npm dependenciesNo transitive attack surface. Self-contained implementation.
Fault ToleranceK-of-N thresholdSurvives loss of up to N-K shares without data loss.

Defense in Depth

XorIDA is not a replacement for encryption — it is a different security primitive that provides guarantees encryption cannot. The recommended defense-in-depth pattern combines both: encrypt data for confidentiality during transit (TLS, AES-256-GCM), then split the decrypted data with XorIDA for protection at rest. Each layer addresses a different threat model. Encryption protects against eavesdroppers. XorIDA protects against storage compromise, insider threats, and key management failures.

For the highest security, layer XorIDA splitting with xLink's hybrid post-quantum key exchange (X25519 + ML-KEM-768) and dual signatures (Ed25519 + ML-DSA-65). The transport layer is quantum-resistant by computation. The storage layer is quantum-resistant by information theory. No single breakthrough compromises both simultaneously.

Traditional Encryption vs. XorIDA

DimensionAES-256-GCMXorIDA
Key ManagementKey required: generate, store, rotate, distribute, escrow, destroyNo keys. The split IS the security.
Single Point of FailureKey compromise = total compromiseK-1 shares reveal nothing. No single point.
Quantum ResistanceBrute-force resistance (computational assumption)Information-theoretic. No assumption to break.
Fault ToleranceNone (lose key = lose data)Survives N-K share loss when K < N
Performance (<1KB)140-160µs14-58µs (2-11x faster)
DependenciesOpenSSL / platform crypto libraryZero. Web Crypto API for HMAC only.
<1ms
Typical payload
0
Dependencies
100%
Line coverage
GF(2)
Binary field
VERIFIED BY XPROVE

Verifiable Split/Reconstruct Operations

Every XorIDA operation — split, reconstruct, HMAC verify — produces integrity artifacts that xProve can chain into a verifiable audit trail. Prove that data was split correctly, that shares were not tampered with, and that reconstruction produced the correct output — all without revealing the underlying data.

XPROVE CRYPTO AUDIT
XorIDA's HMAC tags, share indices, threshold parameters, and reconstruction proofs feed directly into xProve's four-tier verification pipeline. Tier 1 (HMAC chain) provides tamper evidence. Tier 2 (commit-reveal) proves correct splitting without revealing shares. Tier 3 (IT-MAC SPDZ) enables multi-party verification. Tier 4 (KKW MPC-in-the-Head, ~50KB proofs) provides zero-knowledge proof of correct data handling — a third party can verify the operation was performed correctly without seeing any data or any shares. For regulated industries (finance, healthcare, government), this is cryptographic proof of compliance.

Read the xProve white paper →
VERIFIABLE WITHOUT CODE EXPOSURE

Ship Proofs, Not Source

Crypto generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.

XPROVE CRYPTOGRAPHIC PROOF
Download proofs:

Verify proofs online →

Use Cases

🏛️
REGULATORY
FDA / SEC Submissions
Prove algorithm correctness for cryptographic primitives without exposing trade secrets or IP.
Zero IP Exposure
🏦
FINANCIAL
Audit Without Access
External auditors verify XorIDA threshold sharing without accessing source code or production systems.
FINRA / SOX Compliant
🛡️
DEFENSE
Classified Verification
Security clearance holders verify cryptographic primitives correctness without clearance for source code.
CMMC / NIST Ready
🏢
ENTERPRISE
Procurement Due Diligence
Prove security + correctness during RFP evaluation without NDA or code escrow.
No NDA Required
Section 11

Honest Limitations

Honest engineering requires honest documentation. Four known limitations with their mitigations.

LimitationImpactMitigation
GF(2) field onlyNo arithmetic operations on shares. Cannot add, multiply, or compare share values directly. The field supports splitting and reconstruction but not computation.Use xCompute for multi-party computation on shares. xCompute provides threshold addition, multiplication, and comparison over XorIDA shares.
1:1 expansionN shares = approximately N/K × original size per share. Total storage for all N shares is N/K × original size. For 3-of-5, total is 5/3 × original.Acceptable for security payloads (keys, tokens, credentials, messages). For large files, encrypt with AES-256-GCM and split the key with XorIDA via xChange.
255 share maximumCannot split to more than 255 parties. GF(2^8) field size limits N to 255. K is limited to N.Sufficient for all production use cases. Enterprise maximum is 4-of-7. No known application requires more than 255 shares.
Crossover at ~1-2KBSlower than AES-256-GCM for payloads larger than approximately 1-2KB. AES benefits from AES-NI hardware acceleration for bulk data.Encrypt large payloads with AES-256-GCM and split the AES key with XorIDA. This is the standard pattern and is exactly how xChange operates. Best of both: fast bulk encryption + key-free key protection.
Section 12

Enterprise CLI

XorIDA powers 21 enterprise CLI servers in the Enterprise CLI Suite. Each server is Docker-ready, air-gapped capable, and deployable in classified environments. The crypto engine runs identically on-premises, in the cloud, or in air-gapped facilities.

21
Enterprise CLIs
1,924
Enterprise tests
182
Core crypto tests
0
Dependencies

Every enterprise CLI server in the suite — from xLink agent communication to xFuse threshold identity fusion to xStore split storage — depends on @private.me/crypto as its foundational layer. The zero-dependency design means the crypto engine can be deployed in air-gapped environments without package registry access. Docker images are self-contained.

Key Enterprise CLIs Powered by XorIDA

CLI ServerPortXorIDA FunctionTests
xlink-cli3300Split-channel M2M messaging402
xfuse-cli4800Threshold identity fusion pipeline479
xstore-cli5000Multi-backend split storage65
xid-cli4700Ephemeral DID derivation from split seeds108
xwallet-cli4600XorIDA-split credential backup73
xchange-cli4900Key transport via split shares93
Docker Deployment (any CLI server)
docker build -t xlink-cli -f packages/xlink-cli/Dockerfile .
docker run -d --name xlink -p 3300:3300 \
  -v xlink-data:/data \
  -e XLINK_ADMIN_KEY=your-secret-key \
  xlink-cli

# All 21 CLI servers share the same @private.me/crypto engine
# Zero external dependencies in the crypto path
# Air-gapped: no npm registry needed at runtime
Air-Gapped Deployment
The zero-dependency architecture makes XorIDA uniquely suited for air-gapped environments. No npm registry access is required at runtime. No CDN calls, no telemetry, no external connections. The Docker image contains everything needed. Build once, deploy anywhere — including SCIF facilities, classified networks, and isolated OT environments where outbound connectivity is prohibited.
Section 13

Get Started

Install the crypto engine, split your first payload, and reconstruct it — all in a few lines of code. Pure TypeScript means universal runtime compatibility.

Platform Compatibility

PlatformRuntimeStatus
Node.jsv18+Fully supported
BrowsersChrome, Firefox, Safari, EdgeFully supported (Web Crypto API)
Denov1.30+Fully supported
Bunv1.0+Fully supported
Tauriv2 (webview)Fully supported (desktop apps)
Electronv28+Fully supported
React NativeHermes + Web Crypto polyfillSupported with polyfill
Install
npm install @private.me/crypto
Quick Start — Split and Reconstruct
import { split, reconstruct } from '@private.me/crypto';

// 1. Encode your sensitive data
const data = new TextEncoder().encode('sensitive API payload');

// 2. Split into 3 shares, threshold 2
const shares = await split(data, 3, 2);
// shares.length === 3
// Each share: { index, data, hmac }
// Any single share reveals ZERO information

// 3. Distribute shares to independent locations
// Share 1 -> AWS S3
// Share 2 -> Azure Blob
// Share 3 -> Local encrypted volume

// 4. Reconstruct from any 2 shares
const recovered = await reconstruct([shares[0], shares[2]]);
// recovered === data (byte-identical)

// 5. HMAC verification is automatic
// Tampered shares are rejected before reconstruction
// No configuration needed. Fail-closed by default.
Advanced — Custom Threshold Configurations
import { split, reconstruct } from '@private.me/crypto';

const secret = new TextEncoder().encode('master signing key');

// 2-of-2: Split-channel (Xail email, xLink M2M)
const twoOfTwo = await split(secret, 2, 2);

// 2-of-3: Standard backup with fault tolerance
const twoOfThree = await split(secret, 3, 2);

// 3-of-5: Enterprise redundancy
const threeOfFive = await split(secret, 5, 3);

// 4-of-7: Maximum enterprise redundancy
const fourOfSeven = await split(secret, 7, 4);

// All configurations: sub-millisecond for typical payloads
// All configurations: information-theoretic security
// All configurations: HMAC-verified reconstruction
GET STARTED

Ready to deploy XorIDA?

Talk to Sol, our AI platform engineer, or book a live demo with our team.

Book a Demo

Deployment Options

📦

SDK Integration

Embed directly in your application. Runs in your codebase with full programmatic control.

  • npm install @private.me/crypto
  • TypeScript/JavaScript SDK
  • Full source access
  • Enterprise support available
Get Started →
🏢

On-Premise Upon Request

Enterprise CLI for compliance, air-gap, or data residency requirements.

  • Complete data sovereignty
  • Air-gap capable deployment
  • Custom SLA + dedicated support
  • Professional services included
Request Quote →

Enterprise On-Premise Deployment

While Crypto is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:

  • Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
  • Air-gapped environments — SCIF, classified networks, offline operations
  • Data residency requirements — EU GDPR, China data laws, government mandates
  • Custom integration needs — Embed in proprietary platforms, specialized workflows

Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.

Contact sales for assessment and pricing →