Reference

Cryptographic Glossary

Authoritative definitions for every term in the 0REI evidence infrastructure stack. Built for engineers, compliance teams, and procurement officers who need precision.

0REI

0REI (pronounced zero-ray) is a Rust-native cryptographic evidence sealing engine built by FIDUS AI. It transforms event logs and data streams into tamper-evident Evidence Packets using Ed25519 signatures and SHA-256 hashing at 46,291 seals per second. 0REI operates online, offline, or fully air-gapped with no vendor lock-in.

Evidence Packet

A self-contained, cryptographically sealed record produced by 0REI CoreSeal. Each Evidence Packet contains the original payload, a SHA-256 hash, an Ed25519 signature, a binding root, and all metadata required for offline verification on any operating system. Evidence Packets are the core deliverable of the 0REI sealing pipeline.

Proof Sprint

A fixed-scope, two-week pilot deployment of 0REI infrastructure. FIDUS AI deploys 0REI in the customer environment, wires one data stream, generates live Evidence Packets, and delivers a closeout report. Priced at $9,500 with credits toward a Platform License. The fastest path from evaluation to production.

CoreSeal

The single-binary sealing engine at the core of 0REI. CoreSeal canonicalizes input data, computes a SHA-256 hash, binds metadata, and signs the result with Ed25519. Runs on Linux, Windows, and macOS with no runtime dependencies and full offline capability.

Ed25519

An elliptic-curve digital signature algorithm using Curve25519. Provides 128-bit security, fast signing and verification, and strong resistance to side-channel attacks. 0REI uses Ed25519 as its primary signing algorithm for all Evidence Packets. Standardized in RFC 8032.

SHA-256

A cryptographic hash function producing a 256-bit digest. Used by 0REI to create a tamper-evident fingerprint of each payload before signing. Any modification to the original data produces a completely different hash, making tampering immediately detectable. Standardized in FIPS 180-4.

Air-Gap

An air-gapped system has no network connection to external systems. 0REI CoreSeal is air-gap certified, meaning it can seal and verify Evidence Packets with zero network connectivity, making it suitable for classified, regulated, or high-security environments.

Tamper-Evident

A property where any unauthorized modification is detectable. 0REI Evidence Packets are tamper-evident: the Ed25519 signature and SHA-256 hash will fail verification if any byte of the original payload is altered after sealing. No modification goes undetected.

Binding Root

A cryptographic anchor embedded in each 0REI Evidence Packet that links the sealed record to its origin context, timestamp, and sealing key. The binding root enables chain-of-custody verification across multiple sealing events and full audit trail reconstruction.

SOC 2

Service Organization Control 2 — an auditing framework developed by the AICPA covering security, availability, processing integrity, confidentiality, and privacy. 0REI is SOC 2 aligned, with architecture and controls mapping to SOC 2 Trust Service Criteria.

FIPS

Federal Information Processing Standards — cryptographic standards published by NIST for US federal systems. 0REI is FIPS-ready, using FIPS-approved algorithms (SHA-256, Ed25519) in an architecture compatible with FIPS 140-2 validated environments.

Need more detail? Read the Technical Whitepaper or review the Security Posture.