Skip to main content

Cryptographic Standards

CRYMBO Oracle adheres to well-established cryptographic standards to meet institutional and regulatory expectations for secure data exchange.

These standards are selected for:

  • Widespread adoption in financial and enterprise environments
  • Performance and scalability
  • Proven resistance to modern attack vectors

🔑 Public Key Encryption

X25519 (Elliptic Curve Diffie-Hellman)

  • Based on Curve25519
  • Enables secure key exchange between sender and receiver
  • Widely used in TLS 1.3, Signal Protocol, and Web3 wallets
  • Fast and secure, suitable for resource-constrained devices

Used for:

  • Encrypting AES keys
  • Establishing shared secrets

🔒 Symmetric Encryption

AES-GCM (Advanced Encryption Standard - Galois/Counter Mode)

  • 256-bit key length
  • Provides both encryption and message authentication (integrity)
  • Used by government agencies and banks globally

Used for:

  • Encrypting PII payloads
  • Ensuring message tamper detection

🧮 Key Derivation

HKDF (HMAC-based Extract-and-Expand Key Derivation Function)

  • Used to derive strong symmetric keys from shared ECDH secret
  • Prevents key leakage and ensures consistent entropy

🔍 Message Signing (Coming Soon)

CRYMBO plans to support:

  • Ed25519 or secp256k1 signatures
  • For sender authentication and audit traceability

📋 Compliance & Review

These standards align with:

  • NIST SP 800-38D (AES-GCM)
  • RFC 7748 (X25519)
  • ISO/IEC 18033-3 (AES)
  • GDPR & FATF data protection recommendations

All cryptographic operations are non-custodial — private keys are never handled by CRYMBO Oracle or its infrastructure.


📌 Next Step: Explore Key Management Practices to understand how key rotation and revocation are handled