Sovereign Cryptography Guide
Layered cryptography curriculum and resource index, curated for long-horizon, state-grade adversaries, Bitcoin-native systems, and anti-backdoor threat models.
Operating Assumptions & Discipline
Everything below assumes: global passive/active adversaries, long-term confidentiality, post-quantum migration pressure, and the need to remain independent of vendor, government, and platform capture.
- Discipline
- Signal over novelty
- Bitcoin-native bias
Baseline: “Right Answers” & Hygiene
First, lock in a default stack of primitives and libraries that are hard to misuse and sane for 95% of use cases.
Foundations: Intuition, Math, & Classical Primitives
Establish a rigorous but practical understanding of symmetric crypto, public-key systems, and security definitions.
Engineering, Protocols & System Design
Move from primitives to real-world protocols, threat modeling, and system-level failure modes.
Bitcoin-Native, Protocols & Network Privacy
Study the live systems that already run at planetary scale under adversarial conditions.
- Tor Project network
Curves, ECC & Modern Public-Key
Understand how modern elliptic-curve systems are chosen and where the landmines are.
Post-Quantum, Lattices & New Primitives
Track the emerging standardization of lattice-based schemes and understand migration paths without premature deployment.
Zero-Knowledge, zk-SNARKs & ZK Systems
For privacy-preserving systems, understand ZK at the level of math, protocols, and real implementations.
Fully Homomorphic Encryption & Encrypted Compute
FHE is still specialized and expensive; treat it as experimental and niche, but track it as future infrastructure for encrypted compute.
Backdoors, Standards Capture & Crypto Wars
Cryptographic design is inseparable from political attempts to outlaw, backdoor, or co-opt it. These materials keep the context clear.
Exploration Surfaces & Research Feeds
Use these as moving frontiers to pull in new results; never as direct production guidance.
Sequencing: Recommended Pass Through the Stack
High-level walk of the sequence; adapt to existing strengths, but keep the dependency order intact.
- Phase 1 — Baseline & Hygiene
- Phase 2 — Foundations
- Phase 3 — Protocol & Systems
- Phase 4 — Bitcoin & Networked Systems
- Phase 5 — Curves, PQC, ZK, FHE
- Phase 6 — Political Layer & Adversarial Context