ETERNIS Digital Splicing

How your genomic data is protected — from raw DNA sequence to distributed, quantum-resistant encrypted storage that no single party can access.

1Raw Data
2Encrypt
3Key Gen
4Split
5Distribute
6Secured
7Live Proof

Your Genomic Data

3.2 billion base pairs. The most personal data that exists.

Raw Genomic Sequence (FASTQ)
3.2B
Base Pairs
~200 GB
Raw Data
100%
Readable
Exposed
Status
Problem: Anyone with access to this file can read your complete genetic code.
Threat: Genetic discrimination, insurance denial, identity theft, surveillance — for you and every blood relative.

AES-256-GCM Encryption

Military-grade authenticated encryption. Your data becomes indistinguishable from random noise.

Plaintext Genomic Data
AES-256-GCM
Encrypted Ciphertext
🔑 256-bit key
🛡 128-bit auth tag
🔄 Unique nonce per chunk
Algorithm: AES-256-GCM (NIST SP 800-38D)
Key: 256-bit random (CSPRNG)
Auth: Galois/Counter Mode — tamper detection built in

Hybrid Key Generation

Quantum-resistant key pair. Secure against both today's computers and tomorrow's quantum machines.

Key Ceremony — runs in your browser, never leaves your device
X25519
Classical DH
+
ML-KEM 768
Post-Quantum (FIPS 203)
=
Hybrid Keypair
Best of both
🔓 Public Key — given to the lab for Crypt4GH encryption
🔒 Private Key — 32 bytes, never stored whole, about to be split
X25519
Classical Security
ML-KEM
Quantum Resistance
Browser
Where It Runs
0 bytes
Sent to Server
Why hybrid: Genomic data must stay confidential for 50 years. Quantum computers may break X25519 in 15-20 years. ML-KEM survives both.

Shamir Secret Sharing

The private key is mathematically split into 5 pieces. Any 3 can reconstruct it — but 2 or fewer reveal absolutely nothing.

Private Key (32 bytes)
a7f3 e891 4b2c d056 8e19 3fa7 c4d2 b108 ...
Shamir 3-of-5 Split
👤
Shard 1
Member
🤝
Shard 2
Beneficiary 1
🤝
Shard 3
Beneficiary 2
🔒
Shard 4
Escrow
🏢
Shard 5
Eternis
1
2
-
4
-
During life
Member + any 2 = Access
|
-
2
3
-
5
After death
Beneficiaries + Eternis = Access
|
-
-
-
-
5
Eternis alone
Cannot decrypt. Ever.
Field: GF(2^256 - 189)
Auth: HMAC-SHA256 per shard
Threshold: 3-of-5 — mathematically impossible to reconstruct with fewer

Shard Encryption & Distribution

Each shard is individually encrypted for its custodian. Five holders, five different trust boundaries.

👤
Member
Your device + mnemonic backup
PBKDF2 (600K)
+ AES-256-GCM
Passphrase-encrypted
.shard file download
🤝
Beneficiary 1
Primary heir
HPKE encrypted
to their public key
Delivered via
secure channel
🤝
Beneficiary 2
Secondary heir
HPKE encrypted
to their public key
Independent
from Beneficiary 1
🔒
Escrow
Conditional release
Lit Protocol
+ institution backup
Released on death
or 2-year liveness timeout
🏢
Eternis
Custody escrow
AES-256-GCM
HSM-protected KEK
Combinable only
with 2 other shards
Key Material Status After Ceremony
Private Key
ZEROED
Raw Shards
ZEROED
Passphrase
CLEARED
Public Key
STORED
All sensitive key material erased from browser memory immediately after ceremony.

Genomic Data: Secured

Your DNA sequence is now protected by multiple independent layers of cryptography.

Data Encryption

AlgorithmAES-256-GCM
StandardNIST SP 800-38D
Auth Tag128-bit (tamper-proof)
NonceUnique per chunk

Key Protection

ClassicalX25519 ECDH
Post-QuantumML-KEM 768
ApproachHybrid (both required)
StandardFIPS 203

Key Splitting

SchemeShamir SSS
Threshold3-of-5 required
Custodians5 independent holders
AuthHMAC-SHA256/shard

Access Control

Eternis aloneCannot decrypt
Any 2 shardsCannot decrypt
HackerSees random noise
Any 3 of 5Full access
Integrity Verification
SHA-256
Plaintext hash (from lab)
+
SHA-256
Ciphertext hash (our storage)
=
Dual-hash
Tamper-evident at every layer
Your data's integrity can be verified at any time — by you, not by us.
The promise: Your genome is encrypted before it reaches us, the key is split across 5 independent custodians (3 required to reconstruct), and the entire system uses quantum-resistant cryptography designed to last 50 years.

Live Proof

Don't take our word for it. This runs real AES-256-GCM encryption and Shamir secret sharing in your browser — right now.

Step 1 — Enter any text (simulating genomic data)
Step 2 — AES-256-GCM Encryption
Encryption Key (256-bit random)
Nonce (96-bit random)
Ciphertext (your data is now unreadable)
Step 3 — Shamir 3-of-5 Key Split
The 256-bit encryption key has been split into 5 shares. Each share alone reveals nothing.
Step 4 — Select exactly 3 shards to recover the key
Pick any 3 of the 5 shards. The key will be mathematically reconstructed. Try different combinations — they all work.