Live simulation · ML-KEM-768 · ML-DSA-65 · SHOD

Two agents. Six entropy axes. One post-quantum settlement.

This is a live simulation of two institutional agents completing a post-quantum authenticated settlement using ML-KEM-768 key exchange (FIPS 203), ML-DSA-65 mutual authentication (FIPS 204), and a SHOD receipt chain. All cryptographic randomness is seeded from six physically independent entropy sources. The radioactive-decay axis fires on a real Poisson process. Click Initiate Handshake to run the full protocol.

Browser-side simulation. Production cryptography runs server-side via the audit-readiness endpoint.
WAVE-LATTICE AGENT NETWORK
FIPS 203/204 6-AXIS MAPET ● ENTROPY LIVE
AXIS 5 · RADIOACTIVE DECAY (LIVE)
00000
total counts · λ = 3.5/s
collecting…
PHYSICS: Radioactive decay is ontologically unpredictable under the standard interpretation of quantum mechanics.
MAPET · 6 PHYSICAL ENTROPY AXES
COMBINED ENTROPY POOL
SHA3-512(axis₁ ‖ axis₂ ‖ axis₃ ‖ axis₄ ‖ axis₅ ‖ axis₆)
Adversary requirement Must SIMULTANEOUSLY compromise:
Module-LWE hardness + 6 independent physical domains.
Axis 5 is physically impossible to predict under QM.
◈ AGENT · ALICE · TIER-1 BANK
DIDawaiting init…
KEMML-KEM-768 · FIPS 203 · ek=1184B
SIGML-DSA-65 · FIPS 204 · vk=1952B
ENTROPY6-axis MAPET seeded
STATUSawaiting handshake
◈ AGENT · BOB · COUNTERPARTY
DIDawaiting init…
KEMML-KEM-768 · FIPS 203 · ek=1184B
SIGML-DSA-65 · FIPS 204 · vk=1952B
ENTROPY6-axis MAPET seeded
STATUSawaiting handshake
POST-QUANTUM HANDSHAKE PROTOCOL
⬢ Singularity Receipt · SHOD
VERIFIED
Disclosure: This browser simulation uses Web Crypto SubtleCrypto SHA-256 in place of SHA3-512 (SHA-3 is not yet exposed natively by SubtleCrypto). Production WAVE-LATTICE uses SHA3-512 for the entropy combiner. Cryptographic key sizes shown are accurate to FIPS 203 / 204. Key material values shown are illustrative byte counts; actual production keys are full-length.
◈ Reading the demo
What each panel shows · What the bars mean
Axis 5 · Radioactive Decay (live)
A simulated Geiger detector firing on a real Poisson process (λ = 3.5 events/sec). Each click is timestamped and the low byte of the timestamp feeds Axis 5 of the entropy pool. Under standard quantum mechanics, the timing of nuclear decay is ontologically unpredictable — no algorithm can forecast the next click. This is the only physically un-simulable axis.
MAPET · 6 Physical Entropy Axes
Motion-Augmented Physical Entropy Tapping. Six independent physical sources are sampled in parallel (H₂ 21cm radio, RF amplitude, thermal kT, piezoelectric, Geiger, muon flux). Each axis maintains a rolling 32-character hex window of the most recent entropy bytes. Each axis reaches full entropy independently of the others.
Combined Entropy Pool
The six MAPET axes are concatenated and hashed with SHA3-512 (in production) into a single 512-bit seed used for keypair generation. The 8×8 heatmap visualizes the live entropy pool state. Even if one axis fails, five remain — still leaving 5× the entropy needed for a 256-bit security level.
Agent Alice · Tier-1 Bank
The initiating agent. Holds an ML-KEM-768 encapsulation key (FIPS 203) for the lattice handshake and an ML-DSA-65 signing key (FIPS 204) for the receipt. Both keypairs are seeded from her 6-axis MAPET pool, not /dev/urandom. Her DID is derived deterministically from her ML-DSA verifying key.
Agent Bob · Counterparty
The responding agent. Same key material as Alice (ML-KEM-768 + ML-DSA-65), independently seeded from his own MAPET pool. Two strangers with no shared secret, no PKI, no certificate authority — just two lattice handshakes and a receipt that both sides sign. This is the unit of A2A commerce.
Post-Quantum Handshake
Click Initiate Handshake to run the seven-step protocol: MAPET harvest → ML-DSA keygen → ML-KEM keygen → KEM encapsulation → shared-secret derivation → mutual ML-DSA-65 signature → SHOD (Signed Hashed Operation Digest) receipt. The active step pulses gold; completed steps lock cyan with a check.
Q · What does the pulsing of the bars mean? Is a new identity born at each pulse?
No — each pulse is a new entropy byte, not a new identity. The thin colored bar under each axis shows that axis ingesting another byte of physical randomness into its rolling 32-character window. Axes 1–4 and 6 pulse on a fixed cadence per axis (different rates per source). Axis 5 (radioactive decay) pulses on a real Poisson process — irregular by design, because that is what radioactive decay actually does. The 8×8 heatmap brightens cells as bytes flow into the SHA3-512 entropy combiner.
New identities are only born when you click Initiate Handshake. At that moment, both agents tap the current state of all six axes, derive ML-KEM and ML-DSA keypairs, and emit fresh DIDs. Between handshakes, the bars are continuously refreshing the entropy that future identities will draw from.

Run the same handshake against live infrastructure.

The audit-readiness endpoint returns the deployed posture for any agent DID. POST-only.

Read the spec →