|
UDIF: Universal Digital Identification Framework 1.0.0.0a (A1)
A quantum-secure cryptographic identification
|
UDIF is an authenticated, encrypted proxy-chaining protocol that forms a fully meshed “cloud” of proxy servers to provide secure, anonymous communications. Proxies perform asymmetric key exchange to derive shared secrets, then operate bi-directional symmetric tunnels for data forwarding. Clients enter the mesh by selecting an entry node at random from a controller-provided list and establishing an encrypted tunnel to it. Routes are built as randomized proxy circuits, enabling strong metadata resistance.
(See: Introduction and network overview.)
Trust anchor that signs device certificates used for authentication across the mesh.
Manages device registration, certificate validation, topology distribution, and revocation; returns the authenticated proxy list to clients.
Authenticated server participating in a full-mesh; maintains per-peer tunnels, forwards encrypted traffic, and can serve as entry, intermediate, or exit node.
Authenticated endpoint that registers to obtain the proxy list, selects an entry node, performs key exchange, and transmits via the proxy mesh.
Clients register with the ADC, which verifies certificates and returns a signed, hashed proxy list. The client chooses an entry proxy at random and performs an asymmetric key exchange to derive a shared secret. The shared secret is expanded (SHAKE) into RCS keys/nonces for a duplex symmetric tunnel.
For each message flow, the entry node composes a route map: a randomized sequence of proxy “hints” (16-bit indices into the shared topology list). The map and packet are encrypted; at each hop the next destination is looked up and the payload (including header fields) is re-encrypted and forwarded. Entry/exit nodes remain fixed for the session; intermediate hops are varied.
UDIF uses a fixed 1500-byte MTU frame. The inter-proxy packet format (54-byte header + payload) includes: message/flag type, sequence number, fragment sequence, encrypted route map, and UTC timestamp used for anti-replay. Larger messages are fragmented and reassembled at exit/client as required.
Asymmetric: Kyber/ML-KEM and McEliece for KEM; Dilithium or SPHINCS+ for signatures.
Symmetric: RCS AEAD stream cipher for tunnels.
Hash/KDF/MAC: SHA3-512, SHAKE, and KMAC for hashing, expansion, and authentication. Asymmetric operations are limited to registration and session setup; the data plane is symmetric for efficiency.