Composable building blocks for secure, seamless digital experiences

Zero Trust unlocks the potential of truly digital experience but is too costly and complex to develop in house. Keychain Core gives your team control and customizability with easy-to-use building blocks so you can accelerate deployment.

Trusted by leading companies across the globe

JCBToppan FormsYanmarCMICKansai Electric Power Company

Your company’s and your customers’ digital experiences are encumbered.

You want to deliver new digital user experiences, but legacy tools hinder you from realizing this promise — encumbering you with designs that result in fragmented identity, siloed data, and entrusting centralized, unaccountable 3rd parties (network providers, cloud providers, and certificate authorities). A new paradigm is needed to your customers a truly seamless digital experience without entrusting security to unaccountable big tech.

Unprotected network

The Zero Trust paradigm unlocks new experiences for your customers.

Zero Trust is a paradigm in which data is digitally signed and encrypted at the source so that it can be independently verified by the recipient without having to trust intermediary service providers. Zero Trust not only applies to data exchange but also to credential verification, verification of consensus processes such as user approvals. As such, Zero Trust enables new patterns of computational flow for seamless end-user digital experiences.

Zero trust protected data

Keychain Core provides you the missing pieces needed to delight them.

There’s a huge gap between the tools you need and the components available (open-source or otherwise). The cost of integrating Zero Trust into your applications is prohibitively costly and time consuming. Keychain Core provides to you self-sovereign Zero Trust capability in one, easy-to-install, hermetically packaged software module that will get you to market quickly and cost effectively.

Keychain plate blue Self-sovereign Identity
Each of your customers’ devices manage their cryptographic keys.
Keychain plate green Data Security
Each of your customers’ devices manage their cryptographic keys.
Keychain plate peach Verifiable Credentials
Any actor in your system may create digitally signed attributes pertaining to other actors. For example, “is over 21 years of age”, “is a person”, or “is authorized to receive certain data”.
Keychain plate purple Application-level Consensus
Shared-state attestation management based on digital certificates allows you to integrate cryptographically verifiable checkpoints of the states between multiple actors. “What you see is what I see, I know you see what I see, and I know that you know what I see is what you see.”
Product screenshot

Crossing the chasm is as easy as one, two, three.

Keychain Core packages powerful security concepts so that the common IT team can confidently deploy next generation Web3 applications.

Crossing the chasm is easy with Keychain Core
Download and install.
Download the Keychain Core package and clone one of the Keychain solution accelerator projects. All Keychain Core dependencies are baked into the package for you.
Our solution accelerators repos are build-ready and include man-in-the-middle defense demos (desktop and smart watch), a smart phone chat app, and digital asset demo. You’ll have a working demo running in minutes!
Use the templates from the solution accelerators as a springboard for your own projects or create new projects from scratch.
Keychain Core covers a wide range of devices
Independence and control.
Keychain Core is built from the ground up to minimize the areas you must entrust to a third party, even Keychain. Further, Keychain Core is designed to be minimally opinionated to give you maximal control over decisions such as where to store data and what infrastructure to use. We don’t not see your data and keys, and lock-in is minimized using standard formats.
Keychain Core is the first framework that combines Web3 capabilities and out-of-the-box conformance with established international data security standards. As Keychain and other partners deploy end-user applications, your applications will be, in principle, interoperable with them also.
With native SDK, command-line interface, and API touchpoints, Keychain Core readily integrates into existing and new applications, on-prem and hosted environments, and online and offline scenarios. This affords you the freedom to separate data security concerns from IT architecture.

Keychain is the most comprehensive Zero Trust framework available.

Whereas most vendors cut corners to get to market faster, Keychain did the work to provide you with the most comprehensive, one-stop, decentralized framework available. Great team leads demand the best tools available for their teams.

Keychain is the most comprehensive Zero Trust Framework

We’ve done the hard part, so you don’t have to.

Remember the good old days when managing data security and digital certificates across a diverse range of devices was safe, easy, and fun?

Ya, neither do we.

Self-sovereign digital identity, end-to-end data encryption at-rest & in-flight, signing / verifying data, verifiable credentials, key rollover, historical digital signature attribution, application-level consensus
Servers, desktop, laptop, tablet, smartphone, smartwatch, smart glasses/goggles, IoT gateways and other small devices
Operating Systems
Android, Windows, Mac OS / iOS, Linux
C, C++, Java, C#.NET, Objective-C, Python, SWIFT, (Golang forthcoming)
Supported CPU Architectures
x86, x64, ARM (v6, v7, v8, v9), M1, RISC V
Required Device RAM
64 MB
Keychain Core SDK Size
16 MB. Megabytes, not gigabytes. Hermetically packaged (dependencies and database included)
ISO/IEC 18033-2, SECG SEC-1, ISO/IEC 18033-3, FIPS-186, ANSI X9.63, NIST, ANSI X9.44, CRYPTOREC, IEEE 1363a, BSI, IEEE P1363, ECRYPT
Public-Key Infrastructures
Conventional PKI, Bitcoin blockchain (EVM-compatible blockchains forthcoming)

Keychain Core plans

Choose the plan that's right for your application.

Explorer Plan

The essentials for desktop applications.

Contact us
  • Linux x64, Windows x64, Macos x64, M1
  • Test environment hosting (for test nets, faucets, communications servers)
  • Desktop solution-accelerator sample projects (source code)
  • Software maintenance support

Innovator Plan

Everything in the Explorer plan, plus mobile device support.

Contact us
  • Linux x64, Windows x64, Macos x64, M1
  • Android x86, x64, armv7, armv8, armv9
  • iOS armv7, armv8, armv9
  • Test environment hosting (for test nets, faucets, communications servers)
  • Desktop and mobile solution-accelerator sample projects (source code)
  • Software maintenance support

Trailblazer Plan

Most popular

Everything in the Innovator plan, plus IoT device support.

Contact us
  • Linux x64, Windows x64, Macos x64, M1
  • Android x86, x64, armv7, armv8, armv9
  • iOS armv7, armv8, armv9
  • Android WearOS armv7, armv8, armv9,
  • Linux x86, armv6, armv7, armv8, armv9 (and any other requests)
  • Test environment hosting (for test nets, faucets, communications servers)
  • Desktop, mobile, and IoT solution-accelerator sample projects (source code)
  • Early access to pre-release builds
  • Premium support

Frequently asked questions

Have a different question and can’t find the answer you’re looking for? Reach out to our support team by contacting us and we’ll get back to you as soon as we can.

Is Keychain a blockchain?
Keychain is not a blockchain. Keychain Core is a layer-2 software framework that you integrate into your applications/systems and that acts as an extension of your application, providing capabilities related to key management, data security, PKI/blockchain interaction, and off-chain DLT consensus.
I work for a technology development consultancy. Can we use Keychain Core in our solutions?
Absolutely. Apply to our reseller partnership. You’ll be more efficient building solutions, and your clients will be happier.
For whom are Keychain products built?
Keychain is not for everyone. Are you an engineer or innovator interested in creating seamlessly digital experiences? Are you serious about integrating best-in-class data security into your business and devops process? If so, Keychain might be for you. Contact us.
Where’s your white paper?
Cypherpunks write code.