SECURITY

Multi-Layer E2EE Architecture

Arc Protocol: Signal Protocol (libsignal) as the foundation, with PQXDH (ML-KEM-1024) post-quantum cryptography, XEdDSA signatures, and client-side Sealed Sender.

01

PQXDH Key Exchange

Hybrid post-quantum key exchange combining X25519 (Curve25519) and ML-KEM-1024 (NIST FIPS 203). Resistant to both classical and quantum attacks.

02

Double Ratchet

Per-message forward secrecy using DH ratchet + symmetric ratchet. Compromise of one key cannot decrypt past or future messages.

03

AES-256-GCM Encryption

Authenticated encryption with 256-bit keys. Each message encrypted with a unique key derived from the Double Ratchet.

04

XEdDSA Signatures (libsignal)

XEdDSA signatures via libsignal. Identity Key (X25519) doubles as signing key. Device list integrity verification included.

05

Client-Side Sealed Sender

Ephemeral X25519 key per message + HKDF-SHA256 derived AES key. Even the server cannot see who sent a message.

ARC ORIGINAL

AEGIS β€” Arc Enhanced Guard & Integrity System

AEGIS (Arc Enhanced Guard & Integrity System) is Arc's message authentication layer built on XEdDSA digital signatures via libsignal. Every single message you send is cryptographically signed, providing three critical guarantees:

πŸ›‘

Anti-Impersonation

Even if an attacker compromises the server, they cannot forge messages in your name. Your Identity Key (X25519) is used for XEdDSA signing and never leaves your device.

πŸ”

Tamper Detection

Any modification to a message β€” even a single character β€” instantly invalidates the signature. Recipients can verify that every message arrived exactly as sent.

πŸ“

Non-Repudiation

Cryptographic proof that you authored a message. XEdDSA uses your X25519 Identity Key for EdDSA-compatible signatures β€” no separate Ed25519 key needed.

XEdDSA (libsignal) Β· X25519 Identity Key Β· 64-byte signatures Β· Per-message signing

Unlike standard messaging apps, AEGIS goes beyond encryption. While E2EE protects message content, AEGIS protects message identity β€” ensuring that every message truly comes from who it claims to come from. Powered by libsignal's XEdDSA implementation.

Zero Key Conversion

Arc separates X25519 (key exchange) and Ed25519 (signatures) at the type level. Unlike Signal/WhatsApp, there is no Ed25519β†’X25519 key conversion, minimizing the attack surface.

Signal/WhatsApp vs Arc V2

FeatureSignal / WhatsAppArc V2
Key DesignEd→X conversionComplete separation
Message SignaturesNone (DH only)AEGIS XEdDSA
Sealed SenderServer-sideClient-side
Offline E2EENot supportedBLE Mesh (Bridgefy SDK)
Multi-DevicePrimary/LinkedIndependent key sets + Key Sync
Key RotationFixed intervalMulti-stage automatic
Device ListNo signatureEd25519 signed
Device Key TransferVia PrimaryQR + X25519 ECDH + AES-256-GCM
Background E2EEForeground onlyβœ“ All App States (FG/BG/Terminated)
POST-QUANTUM

ML-KEM-1024 Parameters

NIST FIPS 203 standardized post-quantum Key Encapsulation Mechanism.

AlgorithmML-KEM-1024 (via libsignal-client)
NIST Security LevelLevel 3 (AES-192 equivalent)
Classical Security2^128 bit (X25519)
Quantum SecurityNIST Level 3
FoundationModule Lattice (FIPS 203)
Public Key Size1,184 bytes
Secret Key Size2,400 bytes
Ciphertext Size1,088 bytes

Compliance & Standards

πŸ‡ΊπŸ‡ΈNIST CSF 2.0

NIST framework. 6 functions for systematic cyber risk management.

πŸ‡ΊπŸ‡ΈNIST SP 800-53

Federal security controls. FedRAMP foundation.

πŸ‡ΊπŸ‡ΈFIPS 140-3

Federal cryptographic module validation. Covers ML-KEM-1024.

πŸ‡ΊπŸ‡ΈNIST SP 800-175B

Cryptographic algorithm selection guide. Based on FIPS 203.

🌐ISO/IEC 27001

International ISMS certification. B2B/B2G trust foundation.

πŸ‡ͺπŸ‡ΊGDPR

EU General Data Protection Regulation. World's highest protection standard.

πŸ‡¬πŸ‡§UK Cyber Essentials+

UK government-certified cybersecurity certification.

πŸ‡¬πŸ‡§NCSC Cloud Security

UK NCSC 14 Principles. Cloud security assessment standard.

Developed in compliance with all prerequisites of US NIST, EU GDPR, UK NCSC, and international ISO.

WHITEPAPER

Arc Protocol: Security Whitepaper

A comprehensive technical document describing Arc's cryptographic architecture, threat model, and security guarantees. Covers PQXDH key exchange (ML-KEM-1024), Double Ratchet forward secrecy, XEdDSA per-message signatures, Sealed Sender, and BLE Mesh offline communication.

15 Sections

Complete protocol documentation

Signal Comparison

Honest feature-by-feature analysis

Threat Model

STRIDE analysis with residual risks

CONFIDENTIAL

System Architecture Documentation

Complete technical specification of Arc V2 β€” covering the 5-layer architecture, E2EE pipeline, PQXDH implementation, key lifecycle, group encryption, multi-device architecture, BLE Mesh networking, and on-device AI.

15+ Technical Sections

Layer architecture, PQC implementation, encryption pipeline, data storage, and more

Bilingual (EN/JP)

Full documentation available in English and Japanese with one-click toggle

Version 3.1 β€” March 2026

Includes Elixir PreKey Server, Sealed Sender, Sender Keys, and PQXDH ML-KEM-1024

This document is classified as confidential and available exclusively to NDA-bound partners, investors, and authorized technical reviewers. Access requires prior approval by Atlas Associates.