Communications architecture

Project CYGNUS DOME

Overview

Post-quantum end-to-end communications architecture for high-trust environments.

Architecture Cygnus Dome

A secure communications architecture that defines node trust relationships, policy boundaries, key continuity, audit rules, and interoperability across federated deployments.

Protocol ARKES-Ledger

Protocol composition for on-premise and cloud deployments, built from FIPS-approved primitives: P-256 ECDH/ECDSA, ML-KEM-768, ML-DSA-65, AES-256-GCM, HKDF-SHA-512, and ledger integrity controls.

Product Cygnus Messenger

An instant messaging app with post-quantum encryption based on the ARKES-Ledger protocol stack, allowing operators to switch between official and private modes from the same interface.

Protocol foundation

ARKES-Ledger

Auditable & Resilient Key Encryption System with Ledger Integrity

ARKES-Ledger is the protocol layer of Cygnus Dome, defining how key establishment, session continuity, and auditable message handling operate across trusted deployments.

Post-quantum foundations

Hybrid key establishment uses P-256 ECDH plus ML-KEM-768, with signatures from P-256 ECDSA plus ML-DSA-65.

Continuous secrecy

Symmetric ratcheting is designed to support forward secrecy and post-compromise recovery over time.

Ledger-anchored integrity

Audit paths are tied to ledger integrity so reviewability can exist without collapsing operational control boundaries.

Controlled deployment posture

The protocol is intended for on-premise and cloud deployments with controlled policy boundaries, and can be configured for FIPS-approved primitive sets where required.