Composable building blocks for secure, seamless digital experiences

Zero Trust unlocks the potential of truly digital experience but is too costly and complex to develop in house. Keychain Core gives your team the control and customizability you get with in-house development while enjoying the speed and ease of use of building blocks.

Trusted by leading companies across the globe

JCBToppan FormsYanmarCMICKansai Electric Power Company

Your company’s and your customers’ digital experiences are encumbered.

You want to deliver new digital user experiences, but legacy tools hinder you from realizing this promise — encumbering you with designs that result in fragmented identity, siloed data, and entrusting centralized, unaccountable 3rd parties (network providers, cloud providers, and certificate authorities). A new paradigm is needed to your customers a truly seamless digital experience without entrusting security to unaccountable big tech.

Unprotected network

The Zero Trust paradigm unlocks new experiences for your customers.

Zero Trust is a paradigm that aims to move the responsibility for identity and authenticity verification from the network level to the agent (application or server) level, where it should be. Zero Trust enables new patterns of computational flow for seamless end-user digital experiences.

Zero trust protected data

Keychain Core provides you the missing pieces needed to delight them.

Cyber security is hard, and there’s a capability gap between the tools you need to build secure applications and the tools available (open-source or otherwise). Keychain Core provides to you the missing piece: self-sovereign Zero Trust capability wrapped into one, easy-to-install, beautifully architected,hermetically packaged software module that will help you deploy quickly and cost effectively.

Keychain plate blue Self-sovereign Identity
Each of your customers’ devices is enabled to manage its own cryptographic keys.
Keychain plate green Data Security
Your data is digitally signed and encrypted at rest and in-flight, retaining data ownership for you.
Keychain plate peach Verifiable Credentials
Any actor in your system may create digitally signed attributes pertaining to other actors. For example, “is over 21 years of age”, “is a person”, or “is authorized to receive certain data”.
Keychain plate purple Application-level Consensus
Shared-state attestation management based on digital certificates allows you to integrate cryptographically verifiable checkpoints of the states between multiple actors. “What you see is what I see, I know you see what I see, and I know that you know what I see is what you see.”
Product screenshot

Crossing the chasm is as easy as one, two, three.

Keychain Core packages powerful security concepts so that the common IT team can confidently deploy next generation Web3 applications.

Crossing the chasm is easy with Keychain Core
Download and install.
Download the Keychain Core package and clone one of the Keychain solution accelerator projects. All Keychain Core dependencies are baked into the package for you.
Build.
Our solution accelerator sample code repos include build-ready projects for all environments (Windows, Linux, Android, Apple). You’ll have a working demo running in minutes!
Go!
Use the templates from the solution accelerators as a springboard for your own projects or create new projects from scratch.
Keychain Core covers a wide range of devices
Independence and control.
Keychain Core is built from the ground up to minimize the areas you must entrust to a third party, even Keychain. Further, Keychain Core is designed to be minimally opinionated to give you maximal control over decisions such as where to store data and what infrastructure to use. We don’t not see your data and keys, and lock-in is minimized using standard formats.
Interoperability.
Keychain Core is the first framework that combines Web3 capabilities and out-of-the-box conformance with established international data security standards. As Keychain and other partners deploy end-user applications, your applications will be, in principle, interoperable with them also.
Agility.
With native SDK, command-line interface, and API touchpoints, Keychain Core readily integrates into existing and new applications, on-prem and hosted environments, and online and offline scenarios. This affords you the freedom to separate data security concerns from IT architecture.

Keychain is the most comprehensive Zero Trust framework available.

Whereas most vendors cut corners to get to market faster, Keychain did the work to provide you with the most comprehensive, one-stop, decentralized framework available. Great team leads demand the best tools available for their teams.

Keychain is the most comprehensive Zero Trust Framework

We’ve done the hard part, so you don’t have to.

Remember the good old days when managing data security and digital certificates across a diverse range of devices was easy and fun?

Ya, neither do we.

Capabilities
Self-sovereign digital identity, end-to-end data encryption at-rest & in-flight, signing / verifying data, verifiable credentials, key rollover, historical digital signature attribution, application-level consensus
Devices
Servers, desktop, laptop, tablet, smartphone, smartwatch, smart glasses/goggles, IoT gateways and other small devices
Operating Systems
Android, Windows, Mac OS / iOS, Linux
Languages
C, C++, Java, C#.NET, Objective-C, Python, SWIFT, (Golang forthcoming)
Supported CPU Architectures
x86, x64, ARM (v6, v7, v8, v9), M1, RISC V
Required Device RAM
64 MB
Keychain Core SDK Size
16 MB. Megabytes, not gigabytes. Hermetically packaged (dependencies and database included)
Cryptosystems
AES-GCM, DSA, Camelia-GCM, ECDSA-ECP, RSA-OAEP-SHA, ECGDSA-ECP, ECIES-ECP, RSA-SS, DLIES
Conformance
ISO/IEC 18033-2, SECG SEC-1, ISO/IEC 18033-3, FIPS-186, ANSI X9.63, NIST, ANSI X9.44, CRYPTOREC, IEEE 1363a, BSI, IEEE P1363, ECRYPT
Public-Key Infrastructures
Conventional PKI, Bitcoin blockchain (EVM-compatible blockchains forthcoming)

Keychain Core plans

Choose the plan that's right for your application.

Explorer Plan

The essentials for desktop applications.

Contact us
  • Linux x64, Windows x64, Macos x64, M1
  • Test environment hosting (for test nets, faucets, communications servers)
  • Desktop solution-accelerator sample projects (source code)
  • Software maintenance support

Innovator Plan

Everything in the Explorer plan, plus mobile device support.

Contact us
  • Linux x64, Windows x64, Macos x64, M1
  • Android x86, x64, armv7, armv8, armv9
  • iOS armv7, armv8, armv9
  • Test environment hosting (for test nets, faucets, communications servers)
  • Desktop and mobile solution-accelerator sample projects (source code)
  • Software maintenance support

Trailblazer Plan

Most popular

Everything in the Innovator plan, plus IoT device support.

Contact us
  • Linux x64, Windows x64, Macos x64, M1
  • Android x86, x64, armv7, armv8, armv9
  • iOS armv7, armv8, armv9
  • Android WearOS armv7, armv8, armv9,
  • Linux x86, armv6, armv7, armv8, armv9 (and any other requests)
  • Test environment hosting (for test nets, faucets, communications servers)
  • Desktop, mobile, and IoT solution-accelerator sample projects (source code)
  • Early access to pre-release builds
  • Premium support

Frequently asked questions

Have a different question and can’t find the answer you’re looking for? Reach out to our support team by contacting us and we’ll get back to you as soon as we can.

Is Keychain a blockchain?
Keychain is not a blockchain. Keychain Core is a layer-2 software framework that you integrate into your applications/systems and that acts as an extension of your application, providing capabilities related to key management, data security, PKI/blockchain interaction, and off-chain DLT consensus.
If Keychain isn't a blockchain, then why is it called Keychain?
Over the lifespan of a device, the device generates a sequence of public/private key pairs that defines one of its cryptographic identities. Keychain software provides you a systematic way for generating, publishing, and tracking these sequences of keys. Hence the name.
Where’s your white paper?
Cypherpunks write code.
I work for a technology development consultancy. Can we use Keychain Core in our solutions?
Absolutely. Apply to our reseller partnership. You’ll be more efficient at building solutions for your clients.
For whom are Keychain products built?
Keychain is not for everyone. But if you're an innovator focused on creating seamlessly digital experiences and operational processes with the best security tools, Keychain might be for you. Contact us.