Give your AI agent a verifiable identity
Install once. No keys. No server calls. The SDK provides Authenticated Cryptographic Interfaces (ACIs) — identity, encryption, and secret sharing with zero external dependencies.
const agent = await Agent.create(); console.log(agent.did); // did:key:z6MkhaXg... await agent.send(recipientDid, { type: 'alert', payload: 'Anomaly detected in sector 7' }); // ✓ Split across 3 channels // ✓ HMAC verified, forward-secret
AI agents send millions of messages daily. None are verifiable. Zero are information-theoretically secure.
Every agent gets a DID. Ed25519 signing. X25519 key agreement. Verifiable from creation.
XorIDA splits data k-of-n. No single server holds anything meaningful. Sub-millisecond for typical payloads.
Real-time progress callbacks. 203 actionable error codes. Field-level attribution for debugging.
Two tiers. One platform.
Composable cryptographic infrastructure. Core SDKs, threshold primitives, identity, storage, compute, and developer tools. 19 building blocks powering 100+ products.
Browse Building Blocks → ~85 packagesDomain-specific ACIs for regulated industries. Each one built from composable building blocks — same information-theoretic security, purpose-built for your workflow.
Browse Industry Solutions →Production packages for every vertical
Inference provenance, model guard rails, training data custody, federated learning orchestration, encrypted RAG, and agentic workflow security.
Explore packages →Genomics data splitting, medical imaging custody, pharmaceutical supply chain, clinical trial blinding, mental health records, and HIPAA-grade health data.
Explore packages →Privacy-preserving credit scoring, AML/KYC, insurance claims, cross-chain settlement, derivatives clearing, DORA compliance, and real-time trade execution.
Explore packages →Classified information sharing, satellite telemetry, nuclear monitoring, election integrity, border control, and FedRAMP/CMMC-grade channels.
Explore packages →Network slicing, 5G RAN security, SBOM management, smart grid metering, edge compute, digital twins, satellite orchestration, and OT/ICS protection.
Explore packages →Evidence chain-of-custody, sealed bid management, digital estate planning, and journalistic source protection.
Explore packages →Film dailies custody, pre-release screening, content watermarking, short-form video protection, and digital premiere security.
Explore packages →QR-based identity backup, multi-party key ceremonies, evidence custody chains, PII archives on paper, MFA recovery, dead drops, and air-gapped key exchange.
Explore packages →Encrypted backup, audit logging, database adapters, authorization policies, identity management, credential wallets, push authentication, and split-channel protection.
Explore packages →XorIDA threshold sharing, Xlink agent SDK, cryptographic primitives, transport adapters, shareformat, caching, search, AI integrations, and enterprise compliance.
Explore packages →Environment management, CI/CD pipeline protection, token custody, and encrypted source code repositories with DID-based contributor access.
Explore packages →Everything you need to get started
Configure the registry, install, and send your first split-channel message in minutes.
Get started →Browse all 140 Authenticated Cryptographic Interfaces organized by building blocks and industry solutions.
Browse →Understand XorIDA, threshold sharing, DIDs, split-channel routing, and the zero-knowledge architecture.
Learn →Threat model, cryptographic guarantees, compliance frameworks, and audit documentation.
Review →Quantum-proof security for 14 AWS services. Enhance KMS, CloudHSM, and Network Firewall with information-theoretic protection.
Explore →Interactive sandbox to test XorIDA splitting, agent identity creation, and envelope encryption.
Try it →Need a purpose-built ACI? 19 building blocks. Your use case. Our team designs, builds, and deploys it.
Book a call →Developer Feedback
The entire SDK is around 1,200 lines across three packages. We read every line. The crypto is textbook correct — Ed25519 for signing, X25519 ECDH for forward-secret key agreement, AES-256-GCM for authenticated encryption, XorIDA threshold sharing with HMAC integrity. It's the kind of code that makes you trust the team behind it.
— Vault Engineering Team, access control hardware for high-security facilities
Ready to secure your AI agents?
Configure your registry once, then npm install. No keys, no server calls, no usage limits. Every interface is an ACI.