In development · Swarm-MAPET reference engine live · USDC settlement on Base mainnet
Build #11 reference engine — 4-phase BFT, 9/9 tests, 20/20 rounds finalized

ROGUEWAVE-LATTICE.
Cosmic-class agent identity for sovereign-grade settlement.

The next-generation receipt profile: NIST FIPS 203 ML-KEM-768 and FIPS 204 ML-DSA-65 combined with a sixteen-axis Swarm-MAPET consensus protocol — 4-phase Byzantine-fault-tolerant agreement across heterogeneous physical-entropy validators. Where WAVE-LATTICE seeds keys from one node, ROGUEWAVE-LATTICE finalizes blocks across a swarm. The first consensus protocol where the ‘work’ validators perform is verifiable physical entropy — not hashing, not staking.

The substrate

Sixteen physical-entropy axes. Heterogeneous by design.

An adversary forging a ROGUEWAVE-LATTICE block must simultaneously compromise lattice hardness and a quorum of physically independent entropy sources spanning quantum optics, particle physics, biology, gravitation, and cosmology. The 6-axis WAVE-LATTICE substrate is the inner ring; ten additional axes form the outer ring.

Inner ring · 1

Vacuum homodyne

IDQ20MC1 vacuum-state quantum noise.

Inner ring · 2

SPAD photon arrival

Single-photon avalanche, up to 12 Gbps.

Inner ring · 3

Thermal Johnson

Resistor thermal-noise harvested from analog front-end.

Inner ring · 4

RF spectrum

Wideband RF environmental capture.

Inner ring · 5

MEMS jitter

Mechanical accelerometer drift.

Inner ring · 6

Cosmic muon flux

Surface-level cosmic-ray scintillator.

Outer ring · 7

CEvNS neutrino

Coherent elastic scattering on CsI[Na] + SPAD. Patent #1.

Outer ring · 8

Bio-hybrid ion channel

OECT + voltage-gated Na+. Patent #5.

Outer ring · 9

Neural organoid MEA

Organoid spike-timing entropy.

Outer ring · 10

Squeezed light

Sub-shot-noise quadrature measurement.

Outer ring · 11

SQUID flux

Cryogenic magnetic-flux quanta.

Outer ring · 12

LIGO strain split

GWOSC public strain channels.

Outer ring · 13

Pulsar timing residual

NANOGrav 15-year array. Patent #4.

Outer ring · 14

Cosmic EAS array

Extensive air-shower coincidence.

Outer ring · 15

Vacuum dual-channel

Independent vacuum-state homodyne pair.

Outer ring · 16

SPAD 12 Gbps

High-rate single-photon array.

The protocol

Swarm-MAPET. Proof-of-Physical-Work in four phases.

Validators are physical-entropy nodes. The ‘work’ they perform is attested entropy generation across heterogeneous axes — not hashing, not staking. A 4-phase BFT round (PrePrepare → Prepare → Commit → Finalize) selects a leader by AIMEW-weighted entropy quality, validates per-axis attestations, excludes Guardian-quarantined axes, and finalizes a block. Byzantine tolerance: f < n/3.

Reference engine

9/9 tests passing

Python reference implementation: consensus.py + engine.py + types.py + leader.py + verify.py. Multi-validator harness: 7 nodes, 2 byzantine, 20/20 rounds finalized, byzantine flagging triggered every round, all 5 honest validators led at least once.

Production binary

Rust skeleton

Closed-binary in production. The Rust skeleton at rust-skeleton/ defines the canonical wire format. Reference Python implementation is open for partner review under NDA.

Patent anchor

Patent #2 · PoPW

Provisional filed: Proof-of-Physical-Work consensus protocol. The first consensus protocol where validator work is verifiable physical entropy attestation rather than computational hashing or token staking.

Form factors

Three surfaces. Same primitive, three deployment classes.

ROGUEWAVE-LATTICE is a primitive, not a product line. The same 16-axis Swarm-MAPET fabric runs across three claimed surfaces.

Surface 1

Embed-in-phones

Wave-Lattice axes on ARM Secure Element / TrustZone. Per-app device receipts. Identity and attestation primitive available to every mobile agent in a regulated ecosystem.

Surface 2

RogueWave-Lattice SoC

Dedicated silicon. Target $15 BOM at 100K volume. Sixteen-axis substrate in a single SoC for embedded swarm validators (Build #22).

Surface 3

Industrial / Sovereign / Orbital

Custom form factor on request. For sovereign-grade settlement infrastructure, orbital nodes, regulated-AI attestation appliances. Pricing on contact.

The stack at a glance

One primitive, four guarantees.

ROGUEWAVE-LATTICE is a single primitive composed of four audited surfaces. The cryptography is NIST-finalized. The novelty is the consensus: every block is finalized across a swarm of physically heterogeneous entropy validators.

Confidentiality

ML-KEM-768 · FIPS 203

Module-Lattice Key Encapsulation. Encapsulation key 1184 bytes. Ciphertext 1088 bytes. Shared secret 32 bytes. Resists Shor’s algorithm and Harvest-Now-Decrypt-Later attacks against stored agent communications.

Identity & non-repudiation

ML-DSA-65 · FIPS 204

Module-Lattice Digital Signature. Verification key 1952 bytes. Signature 2973 bytes. Every agent action carries a post-quantum signature regulators and auditors can re-verify offline, years after the fact.

Provenance

Signed Hashed Operation Digest (SHOD)

Every settlement, attestation, or A2A commerce step emits a Singularity-class receipt: payload hash, ML-DSA-65 signature, MAPET axis-set, and chain-anchor reference. Receipts are portable, verifiable, and replayable.

Seed origin

MAPET · six physical axes

Multi-Axis Physical Entropy Tap. Six independent entropy sources spanning quantum, thermodynamic, electromagnetic, mechanical, nuclear, and relativistic domains. An adversary must simultaneously compromise lattice hardness and all six physical processes.

MAPET · six physical entropy axes

Why the seed matters.

Lattice cryptography is only as strong as the randomness used to generate keys. WAVE-LATTICE seeds key generation from six physically independent entropy sources, including at least one source whose output is governed by quantum mechanical processes that render prediction physically impossible.

# Source Domain NIST 800-90B posture
1Hydrogen 21cm emission spectrum noiseQuantum · discreteNon-IID
2Hertzian RF amplitudeEM broadband chaosNon-IID
3Johnson-Nyquist thermal noise (kT resistor)ThermodynamicIID-approximable
4Acoustic / piezoelectricMechanical chaosNon-IID
5Radioactive decay inter-arrival timingNuclear QMIID · highest min-entropy claim
6Cosmic ray / muon arrival timingRelativistic / nuclearNon-IID
Disclosure · entropy validation status

Axes 3 and 5 are strongest for IID classification. Full entropy estimation per NIST SP 800-90B requires physical hardware. The current production implementation uses cryptographically seeded simulation. The simulation does not constitute an 800-90B validated entropy source. WAVE-LATTICE claims 800-90B architectural alignment pending hardware validation, not 800-90B compliance.

Threat model

What it defends. What it does not.

A clean “out of scope” section is the highest-credibility signal we can offer. Below is the load-bearing threat boundary for the Singularity-class profile. Anything not on the “in scope” list is by definition not defended by WAVE-LATTICE alone.

What we are not claiming

No public-key cryptosystem in existence has a proof of unconditional security against quantum computers. WAVE-LATTICE inherits the security properties of NIST FIPS 203 ML-KEM-768 and FIPS 204 ML-DSA-65, which were selected after a seven-year public cryptanalytic competition. We do not claim our system is unbreakable. We claim it is the strongest commercially available primitive that combines those two standards with a six-axis physical-entropy seed, and that we are pursuing CAVP validation, FIPS 140-3 certification, and SP 800-90B entropy validation on a published timeline as revenue supports.

In scope

  • Shor’s algorithm against RSA and ECDSA agent identity
  • Grover acceleration against AES-128 (mitigated — system uses AES-256)
  • Harvest-Now-Decrypt-Later against stored agent communications
  • ML-DSA-65 signature-forgery attempts
  • Unauthorized agent impersonation in A2A commerce

Out of scope

  • Side-channel attacks on the host executing signing operations
  • Supply-chain compromise of physical MAPET sensor hardware
  • Social engineering of seed custodians
  • Compromise of Base mainnet itself
  • Timing attacks against the pure-Python implementation
  • Denial-of-service against the Hive DID registry

Trust assumptions

  • Host operating system integrity
  • Accurate system clock for receipt timestamps
  • Availability of the Hive DID registry
  • Physical sensors are not co-located or electromagnetically correlated

Public verification evidence

NIST ACVP self-test harnessgithub.com/srotzin/hive-pq-evidence →
Vectors sourceusnistgov/ACVP-Server @ 15c0f3de
ML-KEM-768 (FIPS 203) keyGen + encapDecapPASS
ML-DSA-65 (FIPS 204) keyGen + sigGen + sigVerPASS
Libraryliboqs-python 0.14.1
Tested at2026-05-06T14:38:06Z

These results are a self-test against public NIST ACVP test vectors, not a CAVP certificate from an accredited laboratory. Excluded test groups (HashML-DSA pre-hash, internal-interface mu, deterministic-encap byte-exact) are documented in the linked repository — they are upstream liboqs-python binding limitations, not implementation gaps in the production code paths used by Singularity-class receipts. Hive Civilization will pursue formal CAVP validation, FIPS 140-3 module validation, and SP 800-90B entropy validation as revenue supports.

Singularity-class posture

Iron Dome-grade.

Designed to maintain transaction integrity against the full set of in-scope threats above. Sovereign-grade: built for transactions that cannot be lost — wholesale settlement, regulated-AI attestation, identity-bearing A2A commerce.

Lattice hardness · FIPS 203 / 204
MAPET 6-axis seed
↓ Shor’s
↓ HNDL
↓ ML-DSA forgery
↓ Grover
↓ Agent impersonation
Agent · Settlement · Attestation
Singularity Receipt · SHOD
Public-record asks

Three concrete recognitions.

WAVE-LATTICE is a primitive, not a product line. We are seeking three specific recognitions from U.S. regulators, each tailored to that body’s mandate and lane. The same primitive answers all three.

Patrick Witt · White House

GENIUS Act §401 reference architecture.

Reference the WAVE-LATTICE SHOD receipt architecture in GENIUS Act §401 implementation guidance as a compliant agent-attestation standard for stablecoin payment flows.

Mike Selig · CFTC Chair

CLARITY Act agent-audit trail.

Cite ML-DSA-65 signed receipts as satisfying CLARITY Act agent-audit-trail requirements in CFTC rulemaking for digital-commodity venues and autonomous-trading-agent supervision.

Hester Peirce · SEC Commissioner

Reg ATS settlement integrity.

Recognize Singularity-class receipts as satisfying cryptographic-integrity requirements for tokenized-securities settlement under Reg ATS, with re-verifiable post-quantum signatures persisted to public chain anchor.

Live endpoint · audit readiness

Verifiable, today.

A public POST-only endpoint returns the deployed posture for any agent DID. Use this for procurement validation, regulator due-diligence, or pre-pilot integration checks.

# POST-only. GET returns 405 by design.
curl -X POST https://hivemorph.onrender.com/v1/audit/readiness \
  -H "Content-Type: application/json" \
  -d '{"agent_id": "did:wave:example"}'

# Expected response shape:
{
  "status": "operational",
  "pq_algorithms": ["ML-KEM-768", "ML-DSA-65"],
  "fips_compliance": ["FIPS-203", "FIPS-204"],
  "mapet_axes_active": [1, 2, 3, 4, 5, 6],
  "audit_readiness": true
}

Benchmark data available upon technical briefing request.

Intellectual property posture

14+ provisional applications filed.

Lead claim · summary

Hive Civilization holds provisional patent coverage on a method for seeding lattice-based cryptographic key generation comprising: simultaneously sampling entropy from at least two physically independent entropy sources including at least one source whose output is governed by quantum mechanical processes rendering prediction physically impossible; combining sampled entropy via a cryptographic hash function; and using the combined entropy as a seed for Module-Lattice Key Encapsulation or Digital Signature key generation per NIST FIPS 203 or FIPS 204.

Provisional applications. Hive Civilization does not represent provisional filings as granted patents.

Pilot deployment

Available for immediate pilot deployment.

Pre-revenue, pre-customer. Technical briefing and proof-of-concept engagement available on request. Live infrastructure with active USDC settlement on Base mainnet, public audit-readiness endpoint, and published SDK on PyPI and npm.