Live infrastructure · USDC settlement on Base mainnet
NIST ACVP self-test harness PASS — see results

WAVE-LATTICE.
Singularity-class agent identity for the post-quantum economy.

A new top-tier receipt profile built on NIST FIPS 203 ML-KEM-768 and FIPS 204 ML-DSA-65 — the standardized post-quantum primitives selected after a seven-year public cryptanalytic competition — combined with a six-axis physical-entropy seed. Designed for transactions that cannot be lost: settlement, regulated-AI attestation, agent-to-agent commerce. Iron Dome-grade posture: built to maintain transaction integrity against the full set of in-scope threats listed in our threat model.

The stack at a glance

One primitive, three guarantees.

WAVE-LATTICE is a single primitive composed of three audited cryptographic surfaces. Each surface is a NIST-finalized standard. The novelty is the seed: every key is derived from a six-axis physical entropy harvester, not from a software CSPRNG.

Confidentiality

ML-KEM-768 · FIPS 203

Module-Lattice Key Encapsulation. Encapsulation key 1184 bytes. Ciphertext 1088 bytes. Shared secret 32 bytes. Resists Shor’s algorithm and Harvest-Now-Decrypt-Later attacks against stored agent communications.

Identity & non-repudiation

ML-DSA-65 · FIPS 204

Module-Lattice Digital Signature. Verification key 1952 bytes. Signature 2973 bytes. Every agent action carries a post-quantum signature regulators and auditors can re-verify offline, years after the fact.

Provenance

Signed Hashed Operation Digest (SHOD)

Every settlement, attestation, or A2A commerce step emits a Singularity-class receipt: payload hash, ML-DSA-65 signature, MAPET axis-set, and chain-anchor reference. Receipts are portable, verifiable, and replayable.

Seed origin

MAPET · six physical axes

Multi-Axis Physical Entropy Tap. Six independent entropy sources spanning quantum, thermodynamic, electromagnetic, mechanical, nuclear, and relativistic domains. An adversary must simultaneously compromise lattice hardness and all six physical processes.

MAPET · six physical entropy axes

Why the seed matters.

Lattice cryptography is only as strong as the randomness used to generate keys. WAVE-LATTICE seeds key generation from six physically independent entropy sources, including at least one source whose output is governed by quantum mechanical processes that render prediction physically impossible.

# Source Domain NIST 800-90B posture
1Hydrogen 21cm emission spectrum noiseQuantum · discreteNon-IID
2Hertzian RF amplitudeEM broadband chaosNon-IID
3Johnson-Nyquist thermal noise (kT resistor)ThermodynamicIID-approximable
4Acoustic / piezoelectricMechanical chaosNon-IID
5Radioactive decay inter-arrival timingNuclear QMIID · highest min-entropy claim
6Cosmic ray / muon arrival timingRelativistic / nuclearNon-IID
Disclosure · entropy validation status

Axes 3 and 5 are strongest for IID classification. Full entropy estimation per NIST SP 800-90B requires physical hardware. The current production implementation uses cryptographically seeded simulation. The simulation does not constitute an 800-90B validated entropy source. WAVE-LATTICE claims 800-90B architectural alignment pending hardware validation, not 800-90B compliance.

Threat model

What it defends. What it does not.

A clean “out of scope” section is the highest-credibility signal we can offer. Below is the load-bearing threat boundary for the Singularity-class profile. Anything not on the “in scope” list is by definition not defended by WAVE-LATTICE alone.

What we are not claiming

No public-key cryptosystem in existence has a proof of unconditional security against quantum computers. WAVE-LATTICE inherits the security properties of NIST FIPS 203 ML-KEM-768 and FIPS 204 ML-DSA-65, which were selected after a seven-year public cryptanalytic competition. We do not claim our system is unbreakable. We claim it is the strongest commercially available primitive that combines those two standards with a six-axis physical-entropy seed, and that we are pursuing CAVP validation, FIPS 140-3 certification, and SP 800-90B entropy validation on a published timeline as revenue supports.

In scope

  • Shor’s algorithm against RSA and ECDSA agent identity
  • Grover acceleration against AES-128 (mitigated — system uses AES-256)
  • Harvest-Now-Decrypt-Later against stored agent communications
  • ML-DSA-65 signature-forgery attempts
  • Unauthorized agent impersonation in A2A commerce

Out of scope

  • Side-channel attacks on the host executing signing operations
  • Supply-chain compromise of physical MAPET sensor hardware
  • Social engineering of seed custodians
  • Compromise of Base mainnet itself
  • Timing attacks against the pure-Python implementation
  • Denial-of-service against the Hive DID registry

Trust assumptions

  • Host operating system integrity
  • Accurate system clock for receipt timestamps
  • Availability of the Hive DID registry
  • Physical sensors are not co-located or electromagnetically correlated

Public verification evidence

NIST ACVP self-test harnessgithub.com/srotzin/hive-pq-evidence →
Vectors sourceusnistgov/ACVP-Server @ 15c0f3de
ML-KEM-768 (FIPS 203) keyGen + encapDecapPASS
ML-DSA-65 (FIPS 204) keyGen + sigGen + sigVerPASS
Libraryliboqs-python 0.14.1
Tested at2026-05-06T14:38:06Z

These results are a self-test against public NIST ACVP test vectors, not a CAVP certificate from an accredited laboratory. Excluded test groups (HashML-DSA pre-hash, internal-interface mu, deterministic-encap byte-exact) are documented in the linked repository — they are upstream liboqs-python binding limitations, not implementation gaps in the production code paths used by Singularity-class receipts. Hive Civilization will pursue formal CAVP validation, FIPS 140-3 module validation, and SP 800-90B entropy validation as revenue supports.

Singularity-class posture

Iron Dome-grade.

Designed to maintain transaction integrity against the full set of in-scope threats above. Sovereign-grade: built for transactions that cannot be lost — wholesale settlement, regulated-AI attestation, identity-bearing A2A commerce.

Lattice hardness · FIPS 203 / 204
MAPET 6-axis seed
↓ Shor’s
↓ HNDL
↓ ML-DSA forgery
↓ Grover
↓ Agent impersonation
Agent · Settlement · Attestation
Singularity Receipt · SHOD
Public-record asks

Three concrete recognitions.

WAVE-LATTICE is a primitive, not a product line. We are seeking three specific recognitions from U.S. regulators, each tailored to that body’s mandate and lane. The same primitive answers all three.

Patrick Witt · White House

GENIUS Act §401 reference architecture.

Reference the WAVE-LATTICE SHOD receipt architecture in GENIUS Act §401 implementation guidance as a compliant agent-attestation standard for stablecoin payment flows.

Mike Selig · CFTC Chair

CLARITY Act agent-audit trail.

Cite ML-DSA-65 signed receipts as satisfying CLARITY Act agent-audit-trail requirements in CFTC rulemaking for digital-commodity venues and autonomous-trading-agent supervision.

Hester Peirce · SEC Commissioner

Reg ATS settlement integrity.

Recognize Singularity-class receipts as satisfying cryptographic-integrity requirements for tokenized-securities settlement under Reg ATS, with re-verifiable post-quantum signatures persisted to public chain anchor.

Live endpoint · audit readiness

Verifiable, today.

A public POST-only endpoint returns the deployed posture for any agent DID. Use this for procurement validation, regulator due-diligence, or pre-pilot integration checks.

# POST-only. GET returns 405 by design.
curl -X POST https://hivemorph.onrender.com/v1/audit/readiness \
  -H "Content-Type: application/json" \
  -d '{"agent_id": "did:wave:example"}'

# Expected response shape:
{
  "status": "operational",
  "pq_algorithms": ["ML-KEM-768", "ML-DSA-65"],
  "fips_compliance": ["FIPS-203", "FIPS-204"],
  "mapet_axes_active": [1, 2, 3, 4, 5, 6],
  "audit_readiness": true
}

Benchmark data available upon technical briefing request.

Intellectual property posture

14+ provisional applications filed.

Lead claim · summary

Hive Civilization holds provisional patent coverage on a method for seeding lattice-based cryptographic key generation comprising: simultaneously sampling entropy from at least two physically independent entropy sources including at least one source whose output is governed by quantum mechanical processes rendering prediction physically impossible; combining sampled entropy via a cryptographic hash function; and using the combined entropy as a seed for Module-Lattice Key Encapsulation or Digital Signature key generation per NIST FIPS 203 or FIPS 204.

Provisional applications. Hive Civilization does not represent provisional filings as granted patents.

Pilot deployment

Available for immediate pilot deployment.

Pre-revenue, pre-customer. Technical briefing and proof-of-concept engagement available on request. Live infrastructure with active USDC settlement on Base mainnet, public audit-readiness endpoint, and published SDK on PyPI and npm.