Security › Cryptographic ID
thumb_up Follow me on GitHub to get notifications about my projects (like Fossdroid Core), thanks! close

Cryptographic ID

Attest the trustworthiness of a device using asymmetric cryptography
Version: 0.5.1
Added: 09-12-2022
Updated: 17-05-2024
Use cases:

- Attest the state of a Linux computer

When your computer is in a trustworthy state, you can generate a private key hidden in the TPM2 of your computer. This private key can be sealed with the current state of the computer (PCRs). Then the computer can only sign a message with this key when it is in the correct state according to the PCRs. For example, you can seal the key against the secure boot state (PCR7). If your computer is booting an operating system signed by another vendor, the TPM2 cannot unseal the private key. So if your computer can generate a correct signature, it is in this known state. You can create a sealed private key and create such a signature with cryptographic-id-rs ( This is similar to tpm2-totp ( but uses asymmetric cryptography. This means you do not need to keep the verification code secure. You can share it safely with the world.

- Verify the identity of a phone

You can generate a private key when your phone is in a trustworthy state. If your phone can create a correct signature, you know it is the same phone. Since the operating system can access the private key, the security guarantees are much weaker than with a TPM2. So the verification is just as secure as your phone. If you use Graphene OS, also have a look at Auditor (

- Verify that a person is in possession of a private key

This works as well as the section above but has the same shortcomings. It can be used to verify someone in person when he sends his public key to you in advance over a secure channel.

Screenshot of Cryptographic ID Screenshot of Cryptographic ID Screenshot of Cryptographic ID
code Source file_download Download