VSEL

Document

Cryptographic Model

**Verifiable Semantic Execution Layer (VSEL)**

Verifiable Semantic Execution Layer (VSEL)

1. Purpose

This document defines the cryptographic foundations of VSEL.

It specifies:

  • primitives used
  • security assumptions
  • threat models (classical and post-quantum)
  • key lifecycle
  • proof system cryptographic dependencies

The objective is:

Ensure that semantic correctness guarantees are not invalidated by cryptographic failure, both in the present and under future adversarial capabilities.


2. Security Model

VSEL operates under a hybrid adversarial model:

  • classical adversaries (current capabilities)
  • quantum-capable adversaries (future capabilities)

The system must remain secure against:

  • immediate exploitation
  • delayed exploitation (“harvest now, decrypt later”)

3. Cryptographic Objectives

The cryptographic layer must provide:

  • Integrity: state and proofs cannot be forged
  • Authenticity: inputs are authorized
  • Binding: commitments uniquely bind to data
  • Soundness support: proof systems rely on secure primitives
  • Forward security: past proofs remain valid under future attacks

4. Primitive Categories

VSEL uses the following classes of primitives:

4.1 Hash Functions

Used for:

  • state commitments
  • Merkle structures
  • domain separation

Requirements:

  • collision resistance
  • preimage resistance
  • quantum resistance (where applicable)

Candidates:

  • SHA-3 / Keccak
  • BLAKE3
  • STARK-friendly hashes (Poseidon, Rescue)

4.2 Commitment Schemes

Used for:

  • state commitments
  • trace commitments
  • polynomial commitments

Properties:

  • binding
  • hiding (if required)

Examples:

  • Merkle commitments
  • polynomial commitments (FRI, KZG)

4.3 Digital Signatures

Used for:

  • input authorization
  • identity binding

Requirements:

  • unforgeability
  • resistance to adaptive attacks
  • post-quantum security for long-term validity

Candidates:

  • Classical: ECDSA, Ed25519
  • Post-Quantum: ML-DSA (Dilithium), Falcon

4.4 Key Exchange / Encryption

Used for:

  • secure communication
  • witness privacy (if needed)

Requirements:

  • forward secrecy
  • post-quantum resistance

Candidates:

  • Classical: ECDH
  • Post-Quantum: ML-KEM (Kyber)

4.5 Proof System Primitives

Depends on proof system:

  • STARKs: hash-based security
  • SNARKs: pairing-based assumptions

Requirements:

  • soundness under chosen model
  • compatibility with semantic constraints

5. Hybrid Cryptographic Strategy

To mitigate long-term risk, VSEL adopts a hybrid model:

[ Security = Classical \land PostQuantum ]

5.1 Hybrid Signatures

[ Sig = (Sig_{classical}, Sig_{PQC}) ]

Both must verify.


5.2 Hybrid Key Exchange

[ K = Combine(K_{classical}, K_{PQC}) ]

Ensures:

  • current performance
  • future security

6. State Commitment Model

State commitments must satisfy:

[ Commit(C) = Hash(Encode(C)) ]

Properties:

  • deterministic
  • collision-resistant
  • stable across time

6.1 Merkle Structures

Used for:

  • efficient inclusion proofs
  • partial state verification

Requirements:

  • canonical tree structure
  • deterministic ordering

7. Proof System Assumptions

7.1 STARK-Based Systems

Assumptions:

  • hash function security
  • low-degree testing soundness

Advantages:

  • transparent setup
  • post-quantum friendly

7.2 SNARK-Based Systems

Assumptions:

  • elliptic curve hardness
  • pairing security

Risks:

  • quantum vulnerability
  • trusted setup (in some cases)

7.3 Hybrid Proof Strategy

Optional:

  • STARK for base proofs
  • SNARK for recursion/compression

8. Key Management Model

8.1 Key Generation

Keys must be:

  • securely generated
  • entropy-backed
  • domain-separated

8.2 Key Storage

Keys must be:

  • protected against extraction
  • optionally hardware-backed

8.3 Key Rotation

Rotation must be:

  • explicit
  • traceable
  • non-breaking

8.4 Key Revocation

Revocation must be:

  • enforceable
  • observable
  • propagated across system

9. Domain Separation

All cryptographic operations must include domain separation:

[ Hash(domain | data) ]

Prevents:

  • cross-protocol attacks
  • replay across contexts

10. Randomness Model

Randomness must be:

  • explicit
  • verifiable or auditable

Sources:

  • deterministic derivation
  • verifiable randomness (VRF)
  • external randomness (modeled in ( E ))

No implicit randomness allowed.


11. Post-Quantum Threat Model

Assumes adversary can:

  • break ECC and RSA
  • recover private keys from public data
  • forge classical signatures

System must remain secure by:

  • hybrid cryptography
  • PQC primitives
  • forward-secure design

12. Long-Term Validity

Proofs must remain valid under:

  • future cryptographic assumptions
  • evolving threat models

Strategies:

  • re-signing
  • proof migration
  • hybrid verification

13. Failure Modes

13.1 Collision Attack

State commitments collide.


13.2 Signature Forgery

Unauthorized inputs accepted.


13.3 Key Compromise

Adversary gains control of keys.


13.4 Proof System Break

Cryptographic assumptions fail.


13.5 Domain Confusion

Proofs reused across contexts.


13.6 Randomness Manipulation

Entropy source compromised.


14. Minimal Security Assumptions

The system assumes:

  • hash functions remain collision-resistant
  • signature schemes remain unforgeable
  • proof systems remain sound

If these fail, security degrades.


15. Defense Strategy

  • hybrid cryptography
  • explicit assumptions
  • minimal reliance on fragile primitives
  • ability to upgrade cryptographic components

16. Cryptographic Agility

System must support:

  • primitive replacement
  • parameter updates
  • migration strategies

Without breaking:

  • state validity
  • proof correctness

17. Closing Statement

Cryptography does not make a system correct.

It makes it hard to cheat.

VSEL ensures that:

what is hard to cheat is also worth trusting.