How SALT-sealed archives remain verifiable as cryptographic standards evolve. The plan for re-sealing without losing the original chain of attestation.
SHA-256 is currently considered cryptographically sound. The same was true of MD5 and SHA-1, both of which have since been deprecated as cryptographic primitives. Any system designed for long-term integrity must anticipate the eventual deprecation of its current algorithms.
SALT-sealed archives are designed to remain verifiable across decades. This document describes how that property is maintained as cryptographic standards evolve. The procedure is standard practice in long-lived digital archiving — it is not novel — but documenting it explicitly is part of audit-grade discipline.
The core principle: an archive's evidentiary value should not depend on the continued strength of any single algorithm. Re-sealing under newer algorithms preserves the original timestamp chain as historical evidence and adds a fresh attestation under contemporary cryptography.
Sealed Ledger monitors recommendations from major standards bodies (NIST, IETF, ENISA) and adjusts the SALT cryptographic profile as their guidance evolves. The triggers for a re-sealing campaign are:
Re-sealing does not modify the existing archive. It produces a new layer of attestation over the existing archive, computed under a stronger algorithm and signed by a current TSA. The original seal remains intact and verifiable as long as its algorithm holds; the new seal provides a fresh attestation under the new algorithm.
The result is an archive with cumulative attestations: a chain of seals across cryptographic generations, each providing evidence that the archive existed in its current form before the next era's algorithms were used.
_seal table accommodates multiple seals across generations. The original seal record is preserved verbatim.A re-sealed archive carries a chain of attestations:
A reviewer evaluating a re-sealed archive can choose which generation of attestation to verify against. The original seal proves "this archive existed in this form before [original date]." The new seal proves "this archive exists in this form as of [new date], verified under [new algorithm]." Together they form an unbroken chain.
If a hash algorithm is broken before an archive is re-sealed, the archive's seal under that algorithm becomes forgeable in principle. The archive's evidentiary value diminishes — though it does not necessarily reach zero.
For this reason, archives expected to retain evidentiary value for decades should be re-sealed proactively, not reactively. Sealed Ledger will offer re-sealing services to past customers when triggers are met, but the user's custody of the archive is what makes re-sealing possible at all.
Regarding cryptographic migration:
What Sealed Ledger does not commit to:
As of this document's revision date, SALT uses:
snapshot.db file as a single unitopenssl (PBKDF2 key derivation, 600,000 iterations) or ChaCha20-Poly1305 via age. Symmetric, user-supplied passphrase, no escrow.The next anticipated profile change is the addition of SHA-3 as a co-recorded hash, expected when commercial TSA support for SHA-3 is widely available. This would not deprecate SHA-256 but would add a parallel attestation under a different cryptographic family.
A formal post-quantum profile will be published once NIST finalizes its post-quantum hash recommendations and TSA infrastructure supports them.