Sovereign Cryptography Guide

Layered cryptography curriculum and resource index, curated for long-horizon, state-grade adversaries, Bitcoin-native systems, and anti-backdoor threat models.

0

Operating Assumptions & Discipline

Everything below assumes: global passive/active adversaries, long-term confidentiality, post-quantum migration pressure, and the need to remain independent of vendor, government, and platform capture.

Threat model & philosophy
  • Discipline — no home-rolled primitives, minimal algorithm surface, lean libraries, reproducible builds, and explicit deprecation plans.
  • Signal over novelty — prefer boring, widely deployed, formally analyzed constructions over experimental systems unless isolation and failure paths are explicit.
  • Bitcoin-native bias — all design choices evaluated against the bar set by Bitcoin's security model, incentives, and openness.
Hard rule: you never design your own cipher, MAC, hash, curve, or protocol from scratch for production. All sovereignty comes from composition, architecture, and implementation rigor, not new primitives.
1

Baseline: “Right Answers” & Hygiene

First, lock in a default stack of primitives and libraries that are hard to misuse and sane for 95% of use cases.

Canonical “right answers”
Implementation defaults
2

Foundations: Intuition, Math, & Classical Primitives

Establish a rigorous but practical understanding of symmetric crypto, public-key systems, and security definitions.

On-ramp / overview
  • Crypto 101 — free, introductory book/course covering core concepts, attacks, and practical examples. intro
  • Cryptography 101 (Menezes) — lecture notes by a coauthor of HAC; bridges from intro to serious math.
Core textbooks
Stanford & academic courses
3

Engineering, Protocols & System Design

Move from primitives to real-world protocols, threat modeling, and system-level failure modes.

Primary engineering texts
Critical blogs / ongoing updates
Awesome & survey lists
4

Bitcoin-Native, Protocols & Network Privacy

Study the live systems that already run at planetary scale under adversarial conditions.

Bitcoin & consensus cryptography
Anonymity & transport
  • Tor Project — practical mix-style network; study design docs and threat models for global adversaries. network
5

Curves, ECC & Modern Public-Key

Understand how modern elliptic-curve systems are chosen and where the landmines are.

Curve selection & safety
6

Post-Quantum, Lattices & New Primitives

Track the emerging standardization of lattice-based schemes and understand migration paths without premature deployment.

Official standards & overviews
7

Zero-Knowledge, zk-SNARKs & ZK Systems

For privacy-preserving systems, understand ZK at the level of math, protocols, and real implementations.

Conceptual introductions
Deep dive: zk-SNARKs
ZK ecosystem overviews
8

Fully Homomorphic Encryption & Encrypted Compute

FHE is still specialized and expensive; treat it as experimental and niche, but track it as future infrastructure for encrypted compute.

Core libraries & docs
Survey & paper indexes
9

Backdoors, Standards Capture & Crypto Wars

Cryptographic design is inseparable from political attempts to outlaw, backdoor, or co-opt it. These materials keep the context clear.

Historical & current crypto wars
Backdoor mandates & critiques
Narrative & history
Design implication: treat all standards, libraries, and hardware as potentially compromised by political pressure. Use diverse implementations, open review, and minimum-trust architectures wherever possible.
10

Exploration Surfaces & Research Feeds

Use these as moving frontiers to pull in new results; never as direct production guidance.

Core awesome lists
11

Sequencing: Recommended Pass Through the Stack

High-level walk of the sequence; adapt to existing strengths, but keep the dependency order intact.

  • Phase 1 — Baseline & Hygiene — read Latacora's “Right Answers” posts, adopt libsodium, and choose Rust/Go as primary languages.
  • Phase 2 — Foundations — complete Crypto 101, then Katz & Lindell or Stinson/Paterson; use HAC as a reference.
  • Phase 3 — Protocol & Systems — work through Real-World Cryptography, Security Engineering, and Boneh's course; implement small protocols using Noise and libsodium.
  • Phase 4 — Bitcoin & Networked Systems — study Bitcoin & Cryptocurrency Technologies, Bitcoin Core docs, and Lightning BOLTs.
  • Phase 5 — Curves, PQC, ZK, FHE — selectively dive into SafeCurves, RFC 7748, FIPS 203, MoonMath, ZK Hack, and OpenFHE depending on target systems.
  • Phase 6 — Political Layer & Adversarial Context — absorb EFF's Crypto Wars materials, “Keys Under Doormats”, and Levy's Crypto to keep the geopolitical layer in view.