The Cryptography endpoints manage the cryptographic keys that underpin Legal Identities, smart contracts, vault links, and other signing operations on the Neuron platform. Before you can apply for a Legal Identity or sign a contract, you must:Documentation Index
Fetch the complete documentation index at: https://docs.neuro-tech.io/llms.txt
Use this file to discover all available pages before exploring further.
- Call Get algorithms to discover which algorithms are available on the broker.
- Call Create key to generate a key pair using one of those algorithms.
- Use the resulting
keyIdin identity applications, contract signing, and vault link creation.
Endpoints
| Endpoint | Description |
|---|---|
| Get algorithms | List all cryptographic algorithms supported by the broker, including security strength, PQC status, and a score for ordering. |
| Create key | Create a new cryptographic key pair on the server, protected by a key password. Returns the key’s creation timestamp. |
| Get public key | Retrieve the server’s public key, or the public key of a specific account key. Use this to verify server-issued signatures. |
Algorithm properties
Each algorithm returned by Get algorithms includes:| Field | Description |
|---|---|
localName / namespace | Unique algorithm identifier used in Create key. |
securityStrength | Security strength in bits. |
safe | Whether the curve is considered safe per safecurves.cr.yp.to. |
slow | Whether the algorithm is computationally intensive. |
pqc | Whether the algorithm is Post-Quantum Cryptography (PQC). |
score | Relative score — use with securityStrength to rank algorithms. |
Key storage and security
- Keys are stored encrypted on the server, protected by the key password.
- The key password is never stored — instead, a signature derived from it is used to reconstruct the encryption key.
- All operations that use a key require
keySignature(signed with the key password) andrequestSignature(signed with the account password). - Reusing a
noncewill result in an error.
Related
- Legal identities — keys are required to apply for and sign identity applications.
- Contracts — keys are required to sign smart contracts.
- Storage — keys are used to sign vault link creation requests.