Documentation

Everything you need to understand, integrate, and deploy Phoenix Platform. From architecture overviews to API references and deployment guides.

Get up to speed fast

New to Phoenix Platform? Start here. These guides will take you from zero to understanding the core concepts in under 30 minutes.

๐Ÿš€

Getting Started

A 15-minute introduction to PhoenixSig concepts. Understand epoch-based signing, state evolution, and PCS without diving into the math.

Beginner 15 min read
โ†’
๐Ÿ—๏ธ

Architecture Overview

Detailed walkthrough of the three-layer architecture: PQC engine, DyLWE state core, and Phoenix injection. How they interlock to achieve PCS.

Intermediate 25 min read
โ†’
๐Ÿ”‘

Key Concepts

Essential terminology and concepts: epochs, VaultKey, Phoenix refresh, Merkle tree commitments, quarantine mode, and anti-rollback protection.

Beginner 10 min read
โ†’

Deep dives

Technical documentation for engineers, architects, and security professionals evaluating or integrating Phoenix Platform.

๐Ÿงฎ

DyLWE State Core

Mathematical foundations of the deterministic state evolution. Ring structure R_q = Z_q[X]/(Xยฒโตโถ+1), LWR operations, state representation, and evolution proofs.

Advanced 40 min read
โ†’
๐Ÿ”ฅ

Phoenix Injection & PCS

How VaultKey, TEE integration, and entropy injection deliver Post-Compromise Security. Includes the Phoenix Injection Rule and refresh protocol.

Advanced 35 min read
โ†’
๐ŸŒณ

Epoch Signing & Merkle Trees

How epoch-based key derivation works, Merkle tree commitment of public keys, signature structure, and verification flow.

Intermediate 25 min read
โ†’
๐Ÿ›ก๏ธ

Quarantine & Anti-Rollback

State protection mechanisms: quarantine mode during reboot or suspected compromise, monotonic counters, and hardware-backed state commitments.

Intermediate 20 min read
โ†’

Deploy Phoenix in your stack

Step-by-step guides for integrating PhoenixSig into different platforms, environments, and compliance frameworks.

๐Ÿ“ฑ

Android Integration

Integrate PhoenixSig with Android Keystore as the TEE backend. Covers key attestation, biometric binding, and StrongBox support.

SDK Guide
โ†’
๐ŸŽ

iOS Integration

Use Apple Secure Enclave as the VaultKey store. Covers CryptoKit integration, Face ID binding, and App Attest for remote verification.

SDK Guide
โ†’
๐Ÿ–ฅ๏ธ

Server-Side (SGX/SEV)

Deploy PhoenixSig in server environments using Intel SGX or AMD SEV for VaultKey isolation. HSM fallback options included.

SDK Guide
โ†’

SDK & API

// Initialize PhoenixSig with TEE backend const phoenix = await PhoenixSig.init({ backend: 'ml-dsa-65', tee: 'android-keystore', policy: { maxEpochDuration: 3600, autoRefresh: true } }); // Sign a message (automatic epoch key derivation) const signature = await phoenix.sign(message); // โ†’ { sig, pk_epoch, merkle_path, epoch, counter } // Verify (only needs RootPK) const valid = await PhoenixSig.verify(message, signature, rootPK); // Trigger Phoenix refresh (post-compromise recovery) await phoenix.refresh(); // โ†’ VaultKey rotated, all future keys change

Full API documentation is available to early access partners. Request access โ†’

Frequently asked questions

Does PhoenixSig replace ML-DSA or SLH-DSA?

No. PhoenixSig uses ML-DSA/SLH-DSA as its signing engine. It adds the lifecycle management, state evolution, and PCS recovery layer on top. Think of PQC as the engine, PhoenixSig as the operating system.

What hardware is required?

PhoenixSig requires a Trusted Execution Environment for VaultKey storage. On mobile, this means Android Keystore (Titan M, TrustZone) or Apple Secure Enclave. On servers, Intel SGX, AMD SEV, or an HSM. Without a TEE, PCS cannot be guaranteed.

What's the performance overhead vs. standalone ML-DSA?

The additional overhead is minimal: one HKDF call for state evolution, one HKDF call for key derivation, and a Merkle path inclusion in the signature. The dominant cost remains the PQC signing operation itself. Typical overhead is <5% on modern hardware.

How does verification work without knowing all epoch keys?

Each signature includes the epoch public key and a Merkle authentication path. The verifier checks: (1) the PQC signature is valid under pk_epoch, and (2) pk_epoch belongs to the Merkle tree with root RootPK. Only RootPK needs to be pre-shared.

Is PhoenixSig NIST/FIPS compliant?

The cryptographic primitives used (ML-DSA, SLH-DSA, HKDF-SHA256) are NIST-standardized. FIPS 140-3 validation and CNSA 2.0 compliance are part of our commercial release roadmap. The system is designed to meet all relevant algorithm requirements for these frameworks.