Cryptographic Standards
CRYMBO Oracle adheres to well-established cryptographic standards to meet institutional and regulatory expectations for secure data exchange.
These standards are selected for:
- Widespread adoption in financial and enterprise environments
- Performance and scalability
- Proven resistance to modern attack vectors
🔑 Public Key Encryption
X25519 (Elliptic Curve Diffie-Hellman)
- Based on Curve25519
- Enables secure key exchange between sender and receiver
- Widely used in TLS 1.3, Signal Protocol, and Web3 wallets
- Fast and secure, suitable for resource-constrained devices
Used for:
- Encrypting AES keys
- Establishing shared secrets
🔒 Symmetric Encryption
AES-GCM (Advanced Encryption Standard - Galois/Counter Mode)
- 256-bit key length
- Provides both encryption and message authentication (integrity)
- Used by government agencies and banks globally
Used for:
- Encrypting PII payloads
- Ensuring message tamper detection
🧮 Key Derivation
HKDF (HMAC-based Extract-and-Expand Key Derivation Function)
- Used to derive strong symmetric keys from shared ECDH secret
- Prevents key leakage and ensures consistent entropy
🔍 Message Signing (Coming Soon)
CRYMBO plans to support:
- Ed25519 or secp256k1 signatures
- For sender authentication and audit traceability
📋 Compliance & Review
These standards align with:
- NIST SP 800-38D (AES-GCM)
- RFC 7748 (X25519)
- ISO/IEC 18033-3 (AES)
- GDPR & FATF data protection recommendations
All cryptographic operations are non-custodial — private keys are never handled by CRYMBO Oracle or its infrastructure.
📌 Next Step: Explore Key Management Practices to understand how key rotation and revocation are handled