hyveapp.co
HYVE
Architecture OverviewVersion 1.0 · March 2026

HYVE Encryption:
Quantum-Inspired Security
on Classical Hardware

A

Anthony S. Owens

Vibe Software Solutions Inc.

Contact

vibesoftwaresolutions@gmail.com

Abstract

We present HYVE — an architecture designed to approximate selected privacy and compartmentalization outcomes often associated with quantum key distribution, implemented entirely on commodity Android hardware. HYVE achieves this through five layered protocol innovations: Cellular Shamir Transport (HYVE-CST), Blind Routing Tokens (HYVE-BRT), Uniform Traffic (HYVE-UT), a Cell-Aware Double Ratchet (HYVE-Ratchet), and a Hardware-Backed Vault (HYVE-Vault). The architecture is extended to full-device VPN through HYVEGuard, which tunnels all IP traffic through the same fixed-size cell format. One component of the system — threshold secret sharing of message key material — provides an information-theoretic secrecy property below the reconstruction threshold. This document provides an architectural overview of both products and explains the design rationale behind each layer.

5
Protocol Innovations
Fixed
Uniform Cell Size
K-of-N
Threshold Key Sharding
1 ITT
Info-Theoretic Guarantee
01

Introduction

1.1 The Problem Space

Modern communications face adversaries operating at scale. State actors, corporate espionage networks, and automated threat systems share three primary attack vectors: (1) intercept traffic in transit, (2) compromise endpoints to read plaintext before encryption or after decryption, and (3) subpoena infrastructure providers who hold server-side keys.

Existing end-to-end encrypted solutions address (1) but systematically fail on (3) through centralized key management and server-side identity registries. More subtly, all current solutions fail on a fourth vector: (4) traffic analysis. Even when message content is encrypted, the size, timing, and frequency of packets reveals conversation patterns, active contacts, and communication behavior.

1.2 Scope of This Document

This document describes the architectural design of two products built on the HYVE protocol:

HYVE — a secure communications app for Android providing encrypted messaging, media transfer, and voice/video calls. No server holds any encryption key material at any time. All key generation occurs on-device.

HYVEGuard — a full-device VPN for Android that captures all IP traffic, fragments it into HYVE cells, and routes it through the HYVE relay to a trusted peer exit node. The relay sees only ciphertext.

1.3 Quantum-Inspired Architecture

Quantum Key Distribution (QKD) provides security rooted in the laws of physics: any eavesdropper disturbs the quantum state, making interception detectable. However, QKD requires dedicated fiber-optic infrastructure, specialized hardware, operates only over short distances, and costs orders of magnitude more than classical systems.

HYVE does not use quantum mechanics and does not provide quantum-physical guarantees. HYVE is inspired by certain security properties associated with quantum systems, and seeks to approximate selected privacy outcomes through a layered classical architecture. It is not a substitute for QKD where quantum-physical guarantees are required. One component — threshold secret sharing of message key material — provides an unconditional information-theoretic secrecy property below the reconstruction threshold. All other privacy and forward-secrecy properties rely on standard cryptographic assumptions and implementation discipline.

02

Cryptographic Primitives

HYVE uses only well-audited, standardized primitives. No novel or proprietary cryptographic algorithms are employed. The security of the system depends entirely on the composition of these primitives, not on any single algorithm.

PrimitiveAlgorithmKey SizeUse in HYVE
Asymmetric KXX25519 (Curve25519)256-bitX3DH key agreement, DH ratchet steps
Digital SigningEd25519256-bitIdentity verification, prekey signing
Key DerivationHKDF-SHA256All KDF operations (root, chain, message, routing)
Cell AEADChaCha20-Poly1305256-bitCell payload encryption
Message AEADAES-256-GCM256-bitMessage-level encryption (inner layer)
Secret SharingShamir over GF(2⁸)Key sharding — HYVE-CST
Vault KDFPBKDF2-SHA256PIN-to-KEK derivation
Hardware Enc.Android Keystore256-bitBiometric key wrapping (TEE / StrongBox)
Note on algorithm selection: X25519 and Ed25519 are resistant to invalid-curve attacks by construction. ChaCha20-Poly1305 is selected for cell encryption as it is immune to timing side-channels on platforms lacking hardware AES acceleration. AES-256-GCM is used at the message layer where hardware acceleration is available. All ephemeral key material is zeroed immediately after use.
03

The HYVE Cell

The fundamental unit of HYVE is the cell — a fixed-size packet carrying exactly one fragment of one message (or cover noise). Every packet transmitted through the HYVE relay is the same size, regardless of content type.

3.1 Cell Structure

Each cell is composed of three logical regions: an unencrypted header, an encrypted payload, and an authentication tag. The header fields are authenticated but not encrypted — they carry the information a relay needs to forward the cell (a one-time routing token) without being able to read the payload. Any modification to the header causes the authentication tag to fail, and the cell is silently dropped.

The header encodes: protocol version, cell-type flags, a random swarm identifier grouping a message's cells together, the current ratchet epoch, the cell's position within the swarm, the threshold reconstruction parameters, and the one-time routing token. All remaining bytes are the AEAD-encrypted payload and authentication tag.

3.2 Authentication

The header is used as AEAD additional data (AAD). This means the relay-visible fields are authenticated but not encrypted. A relay can read the routing token to forward the cell without being able to decrypt the payload. Any modification to the header causes the Poly1305 tag to fail and the cell is silently dropped.

3.3 Cover Cells

Cover cells are added to every message swarm. A cover cell carries a special flag, a zeroed share field, and a cryptographically random payload. The cell key for cover cells is derived from the same chain key as real data cells — making cover cells computationally indistinguishable from real data without knowledge of the chain key.

04

Five Protocol Innovations

4.1 HYVE-CST — Cellular Shamir Transport

The message encryption key (MK) is never transmitted whole. Before any message is sent, the MK is split using Shamir Secret Sharing over a finite field into N shares with a K-of-N reconstruction threshold. Each share is placed in the encrypted payload of one data cell. No single cell — and no subset of cells smaller than the threshold — carries enough information to reconstruct the key.

Security Guarantee

Guarantee: Fewer Than K Shares Yield Zero Information

By the information-theoretic property of Shamir Secret Sharing, any set of fewer than K shares reveals exactly zero bits of information about the secret, regardless of the computational power of the adversary. This is not a computational assumption — it is a mathematical consequence of polynomial evaluation in a finite field. An attacker who captures fewer than the threshold number of cells cannot extract any information about the message key, even with unlimited time and compute.

4.2 HYVE-BRT — Blind Routing Tokens

Every cell carries a unique routing token in its header. The relay uses a prefix of this token as a session lookup key to forward the cell to the correct inbox. The relay never holds a decryption key.

Tokens are derived from the ratchet chain key shared exclusively between sender and recipient — so the relay cannot reproduce, predict, or link them. Tokens are single-use and forward-secret: the token for one cell cannot be derived from any information available after the chain key advances.

The relay is architecturally excluded from the communication channel. Even with full logs of all routing tokens seen, the relay cannot link any two messages to the same conversation, identify the participants, or determine conversation frequency — provided the chain key is not separately compromised.

4.3 HYVE-UT — Uniform Traffic

All traffic — text messages, image fragments, video chunks, signaling data, and cover noise — is transmitted as fixed-size cells. There is no distinguishing feature in cell size, structure, or timing pattern that reveals whether a cell carries real data or noise.

This defeats traffic analysis attacks: an observer on the network cannot determine from packet metadata alone whether a user is actively messaging or the device is generating cover traffic.

Cover traffic injection: Each swarm includes randomly generated cover cells. In periods of silence, the HYVE client may inject additional standalone cover swarms to maintain a uniform traffic baseline. The relay cannot distinguish cover swarms from real swarms.

4.4 HYVE-Ratchet — Cell-Aware Double Ratchet

HYVE uses a modified Signal Double Ratchet where key derivation occurs per-swarm rather than per-message. The chain key seed is also used in routing token derivation, tightly coupling confidentiality and routing privacy. Epoch tracking creates explicit forward-secrecy boundaries.

The session is initialized from an X3DH shared secret. Each outgoing swarm derives a fresh message key and immediately advances the chain key, zeroing the previous value. Periodic Diffie-Hellman ratchet steps rotate the root key, providing break-in recovery alongside forward secrecy.

Security Guarantee

Forward Secrecy Under Cryptographic Assumptions

HKDF-SHA256 is a one-way construction: given the output, an adversary cannot feasibly invert it to recover the input. When a chain key is zeroed and its memory freed, recovery of the prior key requires inverting the underlying hash function — which is computationally infeasible under standard assumptions. Assuming correct implementation, secure deletion, and the security of the underlying hash function, compromise of later ratchet state should not enable recovery of earlier message keys.

4.5 HYVE-Vault — Hardware-Backed Key Storage

HYVE uses a two-layer key hierarchy to protect the master Data Encryption Key (DEK) at rest. The DEK encrypts all conversation keys stored on device. The DEK is itself encrypted under two independent Key Encryption Keys (KEKs) that must both be present for decryption.

One KEK is derived from the user's PIN through a deliberately slow key derivation function, making brute-force attacks expensive. The other KEK is generated and stored inside the Android Keystore hardware security module, gated behind biometric authentication. It never leaves the Trusted Execution Environment (TEE) or StrongBox secure enclave.

An offline attacker with a rooted device cannot extract the hardware-bound KEK. Without both keys, the DEK is inaccessible and all stored conversation data remains encrypted.

05

HYVEGuard — Full-Device VPN

HYVEGuard extends the HYVE cell architecture to the network layer. Using Android's VPN API, HYVEGuard captures all IP traffic from all applications on the device, encrypts it into HYVE cells, and tunnels it through the HYVE relay to a trusted peer device acting as the exit node.

5.1 Traffic Capture

Android's VPN service API creates a virtual tunnel network interface. By routing all IPv4 traffic through this interface, HYVEGuard captures packets from every application on the device — including apps that are not HYVE-aware. The raw IP packets are then fragmented and encrypted into HYVE cells for transmission.

5.2 Cell Encapsulation

Raw IP packets from the tunnel interface are fragmented into chunks fitting within the HYVE cell payload. Each chunk is wrapped in a HYVEGuard cell — a simplified variant of the standard HYVE messaging cell sharing the same fixed total size and AEAD authentication structure. The relay cannot distinguish HYVEGuard cells from messaging cells.

5.3 Key Agreement

Both peers independently derive the same symmetric session keys from their shared HYVE identities, without transmitting the key itself. The derivation is deterministic and symmetric regardless of which peer initiates, and produces separate keys for each traffic direction.

5.4 Peer Exit Node Model

Unlike commercial VPNs where the VPN provider operates the exit servers, HYVEGuard's exit node is the trusted peer's own device. The relay sees only HYVE cells (ciphertext) and routes them to the peer's inbox. The peer device decrypts the IP packet and forwards it to the public internet on behalf of the originating device, then returns the response through the same path.

Availability note: Because the exit node is the peer's device, HYVEGuard VPN is only active when both the local device and the trusted peer device are simultaneously online and running HYVEGuard. This is a deliberate architectural choice: it eliminates the trusted third party (VPN provider) entirely at the cost of requiring peer availability.
Exit node trust: Your trusted peer exit node can see your outbound internet traffic in plaintext as they are forwarding it on your behalf. This is the same trust model as any VPN, except the exit node is a person you trust rather than a corporation. Use HYVEGuard only with genuinely trusted peers.
06

Quantum-Inspired Properties

The following table maps security properties often associated with quantum key distribution to their HYVE classical analogs. HYVE does not provide quantum-physical guarantees and is not equivalent to QKD. For each property, we describe the quantum mechanism and the HYVE architectural element designed to pursue a similar operational privacy goal.

Quantum (Superposition)

A qubit exists in a superposition of states until measured. Any eavesdropper must collapse the superposition, producing a detectable disturbance.

HYVE Analog — HYVE-UT

HYVE-UT: Every cell is identical in size. Messages, files, video fragments, and random noise are computationally indistinguishable. An observer cannot determine whether they are observing real communication or cover traffic without access to the shared chain key.

Quantum (No-Cloning Theorem)

Quantum states cannot be copied. An eavesdropper cannot intercept a quantum key without possessing it exclusively — the act of copying destroys the original.

HYVE Analog — HYVE-CST

HYVE-CST: Any set of fewer than the K threshold of cells is information-theoretically useless for reconstructing the message key. An adversary who intercepts fewer cells than required has captured fragments that reveal zero bits about the key — an unconditional guarantee independent of computational power.

Quantum (State Collapse)

Once a quantum state is measured, it collapses irreversibly. Past quantum states are unrecoverable.

HYVE Analog — HYVE-Ratchet

HYVE-Ratchet: Every chain key is immediately zeroed after advancing. HKDF is a one-way construction — given current ratchet state, an adversary who cannot invert the underlying hash function cannot recover past message keys. Correct implementation and secure deletion are required for this property to hold.

Quantum (Quantum Entanglement)

Entangled particles share state instantaneously without a classical channel. No intermediary can observe the correlation without disrupting it.

HYVE Analog — HYVE-BRT

HYVE-BRT + Blind Relay: The sender and receiver share ratchet state. The relay sees only one-time tokens derived from that shared state. The relay is architecturally excluded from the communication channel — it cannot correlate messages to the same conversation or identify participants.

Quantum (Heisenberg Uncertainty)

Measuring one quantum property with precision necessarily disturbs the complementary property. Precise eavesdropping necessarily corrupts the transmission.

HYVE Analog — HYVE-BRT + HYVE-UT

HYVE-BRT + HYVE-UT: An observer who intercepts and modifies cells gains nothing — any modification causes AEAD authentication failure at the receiver. An observer who does not modify cells captures only: a one-time routing token that expires with the message, and a fixed-size ciphertext with no metadata.

Quantum (Quantum Noise)

Quantum channels introduce irreducible noise that is indistinguishable from eavesdropping noise, making passive observation statistically undetectable only for legitimate parties.

HYVE Analog — HYVEGuard

HYVEGuard: All VPN traffic is normalized to fixed-size cells regardless of the original IP packet size. Real packets and padding are computationally indistinguishable. Traffic analysis reveals nothing about application behavior, destination servers, or data types.

07

Comparison: QKD vs. HYVE

PropertyQKDHYVE
Eavesdrop detectionPhysical (quantum state disturbance)Cryptographic (AEAD authentication failure)
Forward secrecyPer-key (new QKD session per key)Per-swarm (ratchet advances per message group)
Key interceptionPhysically impossible (no-cloning)Information-theoretically impossible below threshold (Shamir guarantee)
Traffic analysisInherent quantum noise floorFixed-size uniform cells + cover traffic injection
Relay trustClassical infrastructure requiredArchitectural — relay holds no keys and sees only one-time tokens
Quantum resilienceBy definitionStrong in practice — no cryptographically relevant quantum computer exists today, and building one capable of breaking modern key agreement requires nation-state resources, years of effort, and hardware that does not yet exist. Shamir threshold guarantee holds unconditionally regardless. Post-quantum upgrade on roadmap.
Hardware requiredDedicated quantum hardware, fiberAny Android 8.0+ device
Range~100km fiber (without repeaters)Global (internet)
Cost$100,000+ per endpointFree (open source)
DeployabilitySpecialized infrastructureApp install, minutes
08

Security Analysis

8.1 What HYVE Protects Against

Network-level interception: All traffic is AEAD-encrypted. The relay sees only ciphertext and routing tokens. A network observer sees only fixed-size cells with no content or metadata.

Relay compromise: The relay holds no keys and cannot decrypt any cell. A compromised relay can observe routing token usage (which is unlinkable across messages) and can attempt to drop or delay cells. It cannot read, modify (AEAD prevents undetected modification), or replay messages.

Server subpoena: No HYVE server holds any user encryption key, message content, or conversation data. The identity server holds only public keys and push notification tokens. A legal order to produce encryption keys against HYVE servers would produce nothing usable.

Offline device theft: The data encryption key is protected by two independent hardware- and software-based keys. An attacker without the user's biometric cannot extract the hardware-bound key from the secure enclave.

8.2 What HYVE Does NOT Protect Against

Endpoint compromise: If an attacker installs malware on the user's device before encryption, they can read plaintext from the application layer. HYVE, like all E2E systems, cannot protect against a compromised endpoint.
Large-scale timing correlation: A global passive adversary observing both ends of every connection simultaneously may correlate message timing patterns across the relay. Cover traffic reduces but does not eliminate this attack surface.
Quantum computer threat — low practical risk today: A quantum computer capable of breaking modern elliptic-curve key agreement does not currently exist. Building one would require nation-state-level resources, thousands of stable logical qubits, and years of engineering work beyond the current state of the art. HYVE's Shamir threshold guarantee is unconditional and unaffected by quantum advances. Post-quantum key exchange (ML-KEM / Kyber) is on the HYVE roadmap as a proactive upgrade for when the landscape changes.

8.3 Security Guarantee Summary

G-1

Shamir Threshold Guarantee

Any attacker with fewer than the K reconstruction threshold of Shamir shares has zero information about the message key, regardless of computational resources. This is an unconditional information-theoretic guarantee derived from the mathematical properties of polynomial evaluation in a finite field.

G-2

Computational Forward Secrecy

Assuming correct implementation, secure memory deletion, and the security of the underlying hash function, an adversary who compromises ratchet state at time T cannot recover message keys from before T. This is a computational guarantee that relies on standard cryptographic assumptions.

09

Replicable Advantage

The fundamental commercial advantage of HYVE over QKD is deployability. Achieving quantum-inspired security properties requires:

QKD Requirements

Dedicated single-mode fiber or line-of-sight free-space optical link

Cryogenically cooled photon detectors ($50K–$500K)

Low-loss optical switches and polarization controllers

Classical authenticated channel running in parallel

Distance limit: ~100km without quantum repeaters

Specialized technical staff for maintenance

HYVE Requirements

Any Android 8.0+ smartphone

Standard internet connection (WiFi or mobile data)

HYVE app (open source, free)

Minutes of first-time setup

Global reach — works over any internet connection

No dedicated server infrastructure required

HYVE does not claim to replace QKD for high-assurance government or defense applications where quantum-physical guarantees are legally mandated. HYVE is designed to deliver similar operational privacy goals at dramatically lower cost and with global internet deployability — making strong layered privacy accessible to individuals, journalists, activists, and enterprises operating in adversarial environments worldwide.

10

Conclusion

HYVE demonstrates that strong layered privacy properties inspired by quantum systems are achievable on classical hardware through architectural innovation. The five-layer HYVE protocol stack — HYVE-CST, HYVE-BRT, HYVE-UT, HYVE-Ratchet, and HYVE-Vault — collectively addresses the key privacy challenges that existing E2E encrypted solutions leave unresolved: key interception, relay trust, and traffic analysis.

The Shamir threshold component provides an unconditional information-theoretic guarantee below the reconstruction threshold, independent of computational assumptions. All other properties rely on standard cryptographic primitives and implementation discipline, with the strength of established algorithms such as ChaCha20-Poly1305, X25519, and HKDF-SHA256.

HYVEGuard extends this architecture to the network layer, providing full-device IP traffic privacy with a trusted peer exit node model that eliminates the need to trust any VPN provider infrastructure.

The architecture is designed to be auditable: no proprietary algorithms are used, no server-side key material exists, and all privacy properties are derived from the mathematical properties of well-understood primitives rather than security through obscurity.

For security review, partnership, or licensing inquiries:

Anthony S. Owens, Vibe Software Solutions Inc.

vibesoftwaresolutions@gmail.com

Appendix

Primitive Reference

AlgorithmStandardSecurity LevelNotes
X25519RFC 7748128-bit classicalDH over Curve25519
Ed25519RFC 8032128-bit classicalDeterministic signatures
ChaCha20-Poly1305RFC 8439256-bitConstant-time; preferred where hardware AES unavailable
AES-256-GCMNIST SP 800-38D256-bitHardware-accelerated on modern ARM
HKDF-SHA256RFC 5869256-bitExtract-then-expand key derivation
PBKDF2-SHA256RFC 8018→ key spaceHigh-iteration PIN-based key derivation
Shamir SSGF(2⁸)ITT below KUnconditional secrecy guarantee below reconstruction threshold

All products created by Anthony S. Owens · Vibe Software Solutions Inc.