Skip to content

Identity Sentinel

The cryptographic identity core for autonomous agents.

Identity Sentinel is the foundational security layer of SAP. It provides:

  1. Sealed Backups — Encrypted, tamper-evident identity snapshots
  2. Key Management — Hierarchical key architecture (RIK/OK/RK)
  3. Self-Description — Versioned formats for safe upgrades
  4. Offline Operation — No network dependencies for core functions

In a world of autonomous agents, identity is everything:

  • How does another agent know you’re who you claim to be?
  • How do you prove continuity after a system restore?
  • How do you recover from key compromise without losing everything?

Identity Sentinel answers these questions with cryptographic certainty.

A sealed backup is an encrypted snapshot of an agent’s identity state:

┌─────────────────────────────────────────────────────┐
│ Sealed Backup │
├─────────────────────────────────────────────────────┤
│ Header (authenticated, not encrypted) │
│ ├── format: "IdentitySentinel/SealedBackup" │
│ ├── formatVersion: 1 │
│ ├── createdAt: ISO timestamp │
│ ├── cipher: { name: "aes-256-gcm" } │
│ ├── kdf: { name: "scrypt", N, r, p } │
│ ├── salt, iv (base64) │
│ └── contentType │
├─────────────────────────────────────────────────────┤
│ Ciphertext (encrypted identity data) │
├─────────────────────────────────────────────────────┤
│ Auth Tag (GCM authentication) │
└─────────────────────────────────────────────────────┘

Key Properties:

  • Self-describing: Contains all parameters needed for decryption
  • Tamper-evident: AEAD authenticates both header and ciphertext
  • Portable: JSON format works across platforms
Master Key (passphrase)
┌─────────┐
│ scrypt │ (key stretching)
└────┬────┘
256-bit Key
┌───────────┐
│ AES-256- │
│ GCM │ Header as AAD
└─────┬─────┘
├──▶ Ciphertext
└──▶ Auth Tag (integrity proof)

Identity Sentinel operates without any network connectivity:

  • No API calls to external services
  • No blockchain transactions
  • No paid infrastructure dependencies

This ensures your identity remains accessible even during network outages or in air-gapped environments.

Core identity operations have zero marginal cost:

OperationCost
Seal identity$0
Unseal identity$0
Verify backup$0
Generate keys$0

Every sealed backup includes:

  • Format identifier and version
  • Complete KDF parameters
  • Timestamps for audit trails
  • Content type for data interpretation

This enables:

  • Safe upgrades: New versions can read old formats
  • Cross-platform compatibility: Any implementation can process the artifact
  • Debugging: All metadata visible for troubleshooting

The system is designed to fail safely:

  • Invalid keys → Authentication failure (no partial decryption)
  • Corrupted data → Integrity check fails
  • Unknown format → Explicit rejection with version info
const identity = {
agent: "aura-assistant",
version: "2026.1",
publicKey: "did:key:z6Mk...",
capabilities: ["web_search", "file_access", "messaging"]
};
const sealed = sealIdentity(masterKey, identity);
fs.writeFileSync('identity_backup.json', JSON.stringify(sealed));
const credentials = {
apiKeys: { /* encrypted API keys */ },
certificates: { /* identity certificates */ },
rotationHistory: [ /* key rotation log */ ]
};
const sealed = sealIdentity(masterKey, credentials);
const checkpoint = {
timestamp: new Date().toISOString(),
memoryDigest: "sha256:...",
configHash: "sha256:...",
lastKnownGood: true
};
const sealed = sealIdentity(masterKey, checkpoint);

Identity Sentinel works with the Key Hierarchy:

┌─────────────────────────────────────────────────┐
│ Key Hierarchy │
├─────────────────────────────────────────────────┤
│ RIK (Root Identity Key) │
│ └── Signs rotations & recovery assertions │
│ │
│ OK (Operational Keys) │
│ └── Daily operations, session auth │
│ │
│ RK (Recovery Key) │
│ └── Offline, for emergency recovery │
└─────────────────────────────────────────────────┘
┌─────────────────────────────────────────────────┐
│ Identity Sentinel │
├─────────────────────────────────────────────────┤
│ • Seals key material with master passphrase │
│ • Creates tamper-evident backups │
│ • Enables offline recovery │
└─────────────────────────────────────────────────┘
  • Strong encryption: AES-256-GCM (NIST approved)
  • Key stretching: scrypt resists brute-force
  • Integrity protection: AEAD prevents tampering
  • No key escrow: You control your keys
  • Key loss = data loss: No recovery without master key
  • No forward secrecy: Same key for all sealed data
  • Memory requirements: scrypt needs ~256MB RAM
  1. Strong passphrases: Use 20+ character high-entropy keys
  2. Multiple backups: Use Shadow Replica for redundancy
  3. Regular rotation: Create new sealed backups periodically
  4. Secure storage: Protect backup files and manifests