Security › Cryptographic ID
thumb_up Follow me on GitHub to get notifications about my projects (like Fossdroid Core), thanks! close

Cryptographic ID

Attest the trustworthiness of a device using asymmetric cryptography
Version: 0.4.2
Added: 09-12-2022
Updated: 23-05-2023
This app has three use cases:

- Attest the state of a Linux computer

When your computer is in a trustworthy state, you can generate a private
key hidden in the TPM2 of your computer. This private key can be sealed with
the current state of the computer (PCRs). Then the computer can only sign a
message with this key when it is in the correct state according to the PCRs.
For example, you can seal the key against the secure boot state (PCR7). If your
computer is booting an operating system signed by another vendor, the TPM2
cannot unseal the private key. So if your computer can generate a correct
signature, it is in this known state.
You can create a sealed private key and create such a signature with
This is similar to [tpm2-totp](
but uses asymmetric cryptography. This means you do not need to keep the
verification code a secret, but you can share it safely with the world.

- Verify the identity of a phone

You can generate a private key when your phone is in a trustworthy state.
If your phone can create a correct signature, you know it is the same phone.
Since the operating system can access the private key, the security guarantees
are much weaker than with a TPM2. So the verification is just as secure as
your phone.
If you use Graphene OS, I recommend Auditor (

- Verify that a person is in possession of a private key

This works as the section above and has the same shortcomings. It can be used
to verify someone in person when he sends his public key to you
in advance over a secure channel.

Screenshot of Cryptographic ID Screenshot of Cryptographic ID Screenshot of Cryptographic ID
code Source file_download Download