# Phase 1: Core Identity

{% hint style="success" %}
**Core identity is in place.** The repository can create an agent key, sign a message, verify it locally, and prepare the registry record.
{% endhint %}

This phase proves the basic identity flow: an agent gets a secure key, signs an action, and any verifier can check that action without asking a central server. The deeper cryptography is still documented below for technical review.

***

## Core System

```mermaid
%%{init: {'theme': 'base', 'themeVariables': {'primaryColor': '#003399', 'primaryTextColor': '#eff6ff', 'primaryBorderColor': '#1a7fff', 'lineColor': '#3d8bff', 'secondaryColor': '#001650', 'tertiaryColor': '#000d20', 'clusterBkg': '#001650', 'titleColor': '#eff6ff', 'edgeLabelBackground': '#001650'}}}%%
graph TD
    subgraph Entropy["Randomness"]
        QRNG["Secure random source\nhardware or local dev"]
        HEALTH["Quality checks\nrandomness health"]
        KDF["Key seed\nSHAKE-256"]
    end

    subgraph Signing["Post-Quantum Signing"]
        DIL["Dilithium\nactive"]
        FAL["FALCON\nreserved"]
    end

    subgraph Identity["Agent Identity"]
        ADDR["Agent address\npublic ID"]
        REG["Registry source\nBase"]
        VERIFY["Local verification\nno central server"]
    end

    QRNG --> HEALTH --> KDF
    KDF --> DIL
    KDF -.-> FAL
    DIL --> ADDR
    FAL -.-> ADDR
    ADDR --> REG
    REG --> VERIFY

    style QRNG fill:#003399,color:#eff6ff,stroke:#1a7fff
    style HEALTH fill:#003399,color:#eff6ff,stroke:#1a7fff
    style KDF fill:#003399,color:#eff6ff,stroke:#1a7fff
    style DIL fill:#003399,color:#eff6ff,stroke:#1a7fff
    style FAL fill:#003399,color:#eff6ff,stroke:#1a7fff
    style ADDR fill:#001650,color:#7dd3fc,stroke:#3d8bff
    style REG fill:#001650,color:#7dd3fc,stroke:#3d8bff
    style VERIFY fill:#001650,color:#7dd3fc,stroke:#3d8bff
```

***

## Delivered Components

| Area              | What it means                                                          | Status       |
| ----------------- | ---------------------------------------------------------------------- | ------------ |
| Randomness source | Keys can be created from hardware entropy or local development entropy | Implemented  |
| Randomness checks | Production entropy has a documented quality check model                | Specified    |
| Key creation      | Randomness is turned into a post-quantum keypair                       | Implemented  |
| Signing           | Agents can sign messages with Dilithium                                | Implemented  |
| Secondary scheme  | FALCON stays reserved for a later audited release                      | Reserved     |
| Agent address     | Each public key maps to a stable agent ID                              | Implemented  |
| Registry contract | Base registry source and Base Sepolia deployment are available         | Live testnet |
| Verification      | Signatures can be checked locally without a certificate authority      | Implemented  |

***

## Security Commitment

For technical readers, this phase commits CEVEX to post-quantum unforgeability under the standard lattice assumptions used by the selected NIST schemes.

For the default Dilithium parameter set:

$$\text{EU-CMA} \leq\_T \text{MSIS}\_{n,q,k,l,\beta} \leq\_T \text{Approx-SVP}$$

The CEVEX-3 target follows the Core-SVP estimate:

$$\lambda\_Q \approx 0.265 \cdot \beta - 16.4 \approx 162 \text{ bits} \quad (\beta \approx 672)$$

Any published reduction below the 128-bit post-quantum threshold triggers migration planning for active parameter sets.

***

## Registry Record

```solidity
struct AgentIdentity {
    bytes publicKey;
    uint8 scheme;
    uint8 securityLevel;
    uint64 registeredAt;
    uint64 revokedAt;
    bytes32 metadataHash;
}
```

The registry is append-only. A registered identity can rotate keys or become permanently revoked, but its historical record remains available for audit and verification.

***

## Exit Criteria

| Requirement                                                    | Result    |
| -------------------------------------------------------------- | --------- |
| Deterministic address derivation from post-quantum public keys | Satisfied |
| Public key storage without certificate authorities             | Satisfied |
| Signature verification without trusted intermediaries          | Satisfied |
| Revocation state represented by registry contract source       | Satisfied |
| Security horizon documented through 2080                       | Satisfied |

***

## Next

* [Phase 2: Developer Tools](/roadmap/developer-access.md)
* [Phase 3: Production Integrations](/roadmap/ecosystem-expansion.md)
* [Phase 4: Advanced Research](/roadmap/research-horizon.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.cevex.io/roadmap/foundation.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
