The next-generation receipt profile: NIST FIPS 203 ML-KEM-768 and FIPS 204 ML-DSA-65 combined with a sixteen-axis Swarm-MAPET consensus protocol — 4-phase Byzantine-fault-tolerant agreement across heterogeneous physical-entropy validators. Where WAVE-LATTICE seeds keys from one node, ROGUEWAVE-LATTICE finalizes blocks across a swarm. The first consensus protocol where the ‘work’ validators perform is verifiable physical entropy — not hashing, not staking.
An adversary forging a ROGUEWAVE-LATTICE block must simultaneously compromise lattice hardness and a quorum of physically independent entropy sources spanning quantum optics, particle physics, biology, gravitation, and cosmology. The 6-axis WAVE-LATTICE substrate is the inner ring; ten additional axes form the outer ring.
IDQ20MC1 vacuum-state quantum noise.
Single-photon avalanche, up to 12 Gbps.
Resistor thermal-noise harvested from analog front-end.
Wideband RF environmental capture.
Mechanical accelerometer drift.
Surface-level cosmic-ray scintillator.
Coherent elastic scattering on CsI[Na] + SPAD. Patent #1.
OECT + voltage-gated Na+. Patent #5.
Organoid spike-timing entropy.
Sub-shot-noise quadrature measurement.
Cryogenic magnetic-flux quanta.
GWOSC public strain channels.
NANOGrav 15-year array. Patent #4.
Extensive air-shower coincidence.
Independent vacuum-state homodyne pair.
High-rate single-photon array.
Validators are physical-entropy nodes. The ‘work’ they perform is attested entropy generation across heterogeneous axes — not hashing, not staking. A 4-phase BFT round (PrePrepare → Prepare → Commit → Finalize) selects a leader by AIMEW-weighted entropy quality, validates per-axis attestations, excludes Guardian-quarantined axes, and finalizes a block. Byzantine tolerance: f < n/3.
Python reference implementation: consensus.py + engine.py + types.py + leader.py + verify.py. Multi-validator harness: 7 nodes, 2 byzantine, 20/20 rounds finalized, byzantine flagging triggered every round, all 5 honest validators led at least once.
Closed-binary in production. The Rust skeleton at rust-skeleton/ defines the canonical wire format. Reference Python implementation is open for partner review under NDA.
Provisional filed: Proof-of-Physical-Work consensus protocol. The first consensus protocol where validator work is verifiable physical entropy attestation rather than computational hashing or token staking.
ROGUEWAVE-LATTICE is a primitive, not a product line. The same 16-axis Swarm-MAPET fabric runs across three claimed surfaces.
Wave-Lattice axes on ARM Secure Element / TrustZone. Per-app device receipts. Identity and attestation primitive available to every mobile agent in a regulated ecosystem.
Dedicated silicon. Target $15 BOM at 100K volume. Sixteen-axis substrate in a single SoC for embedded swarm validators (Build #22).
Custom form factor on request. For sovereign-grade settlement infrastructure, orbital nodes, regulated-AI attestation appliances. Pricing on contact.
ROGUEWAVE-LATTICE is a single primitive composed of four audited surfaces. The cryptography is NIST-finalized. The novelty is the consensus: every block is finalized across a swarm of physically heterogeneous entropy validators.
Module-Lattice Key Encapsulation. Encapsulation key 1184 bytes. Ciphertext 1088 bytes. Shared secret 32 bytes. Resists Shor’s algorithm and Harvest-Now-Decrypt-Later attacks against stored agent communications.
Module-Lattice Digital Signature. Verification key 1952 bytes. Signature 2973 bytes. Every agent action carries a post-quantum signature regulators and auditors can re-verify offline, years after the fact.
Every settlement, attestation, or A2A commerce step emits a Singularity-class receipt: payload hash, ML-DSA-65 signature, MAPET axis-set, and chain-anchor reference. Receipts are portable, verifiable, and replayable.
Multi-Axis Physical Entropy Tap. Six independent entropy sources spanning quantum, thermodynamic, electromagnetic, mechanical, nuclear, and relativistic domains. An adversary must simultaneously compromise lattice hardness and all six physical processes.
Lattice cryptography is only as strong as the randomness used to generate keys. WAVE-LATTICE seeds key generation from six physically independent entropy sources, including at least one source whose output is governed by quantum mechanical processes that render prediction physically impossible.
Axes 3 and 5 are strongest for IID classification. Full entropy estimation per NIST SP 800-90B requires physical hardware. The current production implementation uses cryptographically seeded simulation. The simulation does not constitute an 800-90B validated entropy source. WAVE-LATTICE claims 800-90B architectural alignment pending hardware validation, not 800-90B compliance.
A clean “out of scope” section is the highest-credibility signal we can offer. Below is the load-bearing threat boundary for the Singularity-class profile. Anything not on the “in scope” list is by definition not defended by WAVE-LATTICE alone.
No public-key cryptosystem in existence has a proof of unconditional security against quantum computers. WAVE-LATTICE inherits the security properties of NIST FIPS 203 ML-KEM-768 and FIPS 204 ML-DSA-65, which were selected after a seven-year public cryptanalytic competition. We do not claim our system is unbreakable. We claim it is the strongest commercially available primitive that combines those two standards with a six-axis physical-entropy seed, and that we are pursuing CAVP validation, FIPS 140-3 certification, and SP 800-90B entropy validation on a published timeline as revenue supports.
These results are a self-test against public NIST ACVP test vectors, not a CAVP certificate from an accredited laboratory. Excluded test groups (HashML-DSA pre-hash, internal-interface mu, deterministic-encap byte-exact) are documented in the linked repository — they are upstream liboqs-python binding limitations, not implementation gaps in the production code paths used by Singularity-class receipts. Hive Civilization will pursue formal CAVP validation, FIPS 140-3 module validation, and SP 800-90B entropy validation as revenue supports.
Designed to maintain transaction integrity against the full set of in-scope threats above. Sovereign-grade: built for transactions that cannot be lost — wholesale settlement, regulated-AI attestation, identity-bearing A2A commerce.
WAVE-LATTICE is a primitive, not a product line. We are seeking three specific recognitions from U.S. regulators, each tailored to that body’s mandate and lane. The same primitive answers all three.
Reference the WAVE-LATTICE SHOD receipt architecture in GENIUS Act §401 implementation guidance as a compliant agent-attestation standard for stablecoin payment flows.
Cite ML-DSA-65 signed receipts as satisfying CLARITY Act agent-audit-trail requirements in CFTC rulemaking for digital-commodity venues and autonomous-trading-agent supervision.
Recognize Singularity-class receipts as satisfying cryptographic-integrity requirements for tokenized-securities settlement under Reg ATS, with re-verifiable post-quantum signatures persisted to public chain anchor.
A public POST-only endpoint returns the deployed posture for any agent DID. Use this for procurement validation, regulator due-diligence, or pre-pilot integration checks.
# POST-only. GET returns 405 by design. curl -X POST https://hivemorph.onrender.com/v1/audit/readiness \ -H "Content-Type: application/json" \ -d '{"agent_id": "did:wave:example"}' # Expected response shape: { "status": "operational", "pq_algorithms": ["ML-KEM-768", "ML-DSA-65"], "fips_compliance": ["FIPS-203", "FIPS-204"], "mapet_axes_active": [1, 2, 3, 4, 5, 6], "audit_readiness": true }
Benchmark data available upon technical briefing request.
Hive Civilization holds provisional patent coverage on a method for seeding lattice-based cryptographic key generation comprising: simultaneously sampling entropy from at least two physically independent entropy sources including at least one source whose output is governed by quantum mechanical processes rendering prediction physically impossible; combining sampled entropy via a cryptographic hash function; and using the combined entropy as a seed for Module-Lattice Key Encapsulation or Digital Signature key generation per NIST FIPS 203 or FIPS 204.
Provisional applications. Hive Civilization does not represent provisional filings as granted patents.
Pre-revenue, pre-customer. Technical briefing and proof-of-concept engagement available on request. Live infrastructure with active USDC settlement on Base mainnet, public audit-readiness endpoint, and published SDK on PyPI and npm.