Cryptography & Secure Handshake
Information
Node Identity: Ed25519 keypair per node (published on-chain). Ephemeral X25519 keys per session for forward secrecy.
Hashing: BLAKE3 for local metering; SHA-256 for cross-chain compatibility.
AEAD: AES-GCM or ChaCha20-Poly1305 for authenticated encryption.
KDF: HKDF-SHA256 to derive session keys.
MAC: HMAC-SHA256 for off-path telemetry integrity.
Handshake Process
Discovery via Intelligent DNS with node IDs.
QUIC/TLS 1.3 establishes encrypted streams.
Application Identity Bind with signed Ed25519 proofs.
Ephemeral X25519 exchange with HKDF derivation.
Optional double-encryption via overlay AEAD.
Data Transmission Privacy
Default: QUIC/TLS 1.3 AEAD per hop.
Optional: End-to-end AEAD overlay so intermediate lightnodes only relay ciphertext.
Zero-copy Rust pipeline preserves encryption until final processing point.
Last updated