Give your AI agent a verifiable identity
Install once. No keys. No server calls. The SDK provides Authenticated Cryptographic Interfaces (ACIs) — identity, encryption, and secret sharing with zero external dependencies.
const agent = await Agent.create(); console.log(agent.did); // did:key:z6MkhaXg... await agent.send(recipientDid, { type: 'alert', payload: 'Anomaly detected in sector 7' }); // ✓ Split across 3 channels // ✓ HMAC verified, forward-secret
AI agents send millions of messages daily. None are verifiable. Zero are information-theoretically secure.
Every agent gets a DID. Ed25519 signing. X25519 key agreement. Verifiable from creation.
XorIDA splits data k-of-n. No single server holds anything meaningful. Sub-millisecond for typical payloads.
Split-channel routing across multiple transports. Reconstruct only at destination.
Two tiers. One platform.
Composable cryptographic infrastructure. Core SDKs, threshold primitives, identity, storage, compute, and developer tools. 19 building blocks powering 100+ products.
Browse Building Blocks → ~85 packagesDomain-specific ACIs for regulated industries. Each one built from composable building blocks — same information-theoretic security, purpose-built for your workflow.
Browse Industry Solutions →Production packages for every vertical
Inference provenance, model guard rails, training data custody, federated learning orchestration, encrypted RAG, and agentic workflow security.
Explore packages →Genomics data splitting, medical imaging custody, pharmaceutical supply chain, clinical trial blinding, mental health records, and HIPAA-grade health data.
Explore packages →Privacy-preserving credit scoring, AML/KYC, insurance claims, cross-chain settlement, derivatives clearing, DORA compliance, and real-time trade execution.
Explore packages →Classified information sharing, satellite telemetry, nuclear monitoring, election integrity, border control, and FedRAMP/CMMC-grade channels.
Explore packages →Network slicing, 5G RAN security, SBOM management, smart grid metering, edge compute, digital twins, satellite orchestration, and OT/ICS protection.
Explore packages →Evidence chain-of-custody, sealed bid management, digital estate planning, and journalistic source protection.
Explore packages →Film dailies custody, pre-release screening, content watermarking, short-form video protection, and digital premiere security.
Explore packages →QR-based identity backup, multi-party key ceremonies, evidence custody chains, PII archives on paper, MFA recovery, dead drops, and air-gapped key exchange.
Explore packages →Encrypted backup, audit logging, database adapters, authorization policies, identity management, credential wallets, push authentication, and split-channel protection.
Explore packages →XorIDA threshold sharing, Xlink agent SDK, cryptographic primitives, transport adapters, shareformat, caching, search, AI integrations, and enterprise compliance.
Explore packages →Environment management, CI/CD pipeline protection, token custody, and encrypted source code repositories with DID-based contributor access.
Explore packages →Everything you need to get started
Configure the registry, install, and send your first split-channel message in minutes.
Get started →Browse all 140 Authenticated Cryptographic Interfaces organized by building blocks and industry solutions.
Browse →Understand XorIDA, threshold sharing, DIDs, split-channel routing, and the zero-knowledge architecture.
Learn →Threat model, cryptographic guarantees, compliance frameworks, and audit documentation.
Review →Interactive sandbox to test XorIDA splitting, agent identity creation, and envelope encryption.
Try it →Need a purpose-built ACI? 19 building blocks. Your use case. Our team designs, builds, and deploys it.
Book a call →Developer Feedback
The entire SDK is around 1,200 lines across three packages. We read every line. The crypto is textbook correct — Ed25519 for signing, X25519 ECDH for forward-secret key agreement, AES-256-GCM for authenticated encryption, XorIDA threshold sharing with HMAC integrity. It's the kind of code that makes you trust the team behind it.
— Vault Engineering Team, access control hardware for high-security facilities
Ready to secure your AI agents?
Configure your registry once, then npm install. No keys, no server calls, no usage limits. Every interface is an ACI.