Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 178 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Integrity, in the context of KERI and verifiable data systems, refers to the property that information is whole, sound, and unimpaired—meaning nothing is missing, and the data is complete and in its intended good order. This definition, attributed to Neil Thomson, establishes a crucial distinction: integrity concerns the completeness and consistency of data, not its correctness or truthfulness (which is termed veracity).
Data can possess integrity while being factually incorrect. For example, a newspaper story that is faithfully reproduced maintains integrity even if the story itself contains false information. This separation between structural soundness and semantic truth is fundamental to understanding how KERI approaches data verification.
KERI's "security first" approach defines integrity through two complementary mechanisms:
In KERI's framework, authenticity includes technical integrity of data. This means that when KERI establishes the authenticity of a message or credential, it simultaneously establishes its integrity through cryptographic binding.
KERI's definition of integrity has clear boundaries. The protocol's criterion is cryptographic verifiability—once something cannot be verified cryptographically, it falls outside KERI's narrow definition of integrity. Specifically excluded are:
As the specification states: "For KERI integrity, as an assessment of the substance or the content itself, does not fall within its narrow definition." This technical precision ensures that integrity claims in KERI-based systems can be verified through cryptographic mechanisms without requiring trust in intermediaries or subjective evaluation of content.
Hash Functions: KERI supports multiple collision-resistant hash functions (Blake3-256, Blake2b-256, SHA3-256) for computing digests. Implementations must ensure proper algorithm selection based on security requirements.
SAID Computation: When computing SAIDs for integrity verification:
Verification Process: To verify integrity:
Hash Chain Validation: Each event in a KEL must reference the previous event's digest. Implementations must:
Duplicity Detection: Implementations should:
Domain Transformation: When implementing CESR encoding:
Caching: Implementations can cache verified integrity results to avoid redundant verification:
Batch Verification: When verifying multiple credentials:
The concept of data integrity has evolved significantly across computing history:
Traditional Database Systems: Integrity constraints (referential integrity, entity integrity) focused on maintaining consistency within relational databases through rules and transactions.
Cryptographic Hash Functions: The development of collision-resistant hash functions (MD5, SHA family, Blake3) provided mathematical tools for detecting data tampering, establishing the foundation for cryptographic integrity verification.
Certificate Transparency: Google's Certificate Transparency project demonstrated how append-only logs with cryptographic commitments could provide verifiable integrity for certificate issuance, influencing KERI's design.
Blockchain Systems: Distributed ledgers popularized the concept of tamper-evident data structures through hash chaining, though KERI achieves similar properties without requiring global consensus.
The evolution toward cryptographically verifiable integrity represents a shift from trust-based systems (where integrity depends on trusted administrators) to mathematically provable systems (where integrity can be independently verified by any party).
KERI implements integrity through Authentic Chained Data Containers (ACDCs), where integrity is "self-verifying" through the SAID (Self-Addressing Identifier) mechanism. A SAID is simultaneously:
This creates an intrinsic verification property: any modification to the data invalidates the SAID, making tampering immediately evident. The SAID contained within the data is also the hash of the data itself, creating an unbreakable cryptographic binding between the identifier and the content it represents.
For streaming data, KERI's CESR (Composable Event Streaming Representation) protocol establishes integrity through:
Code Tables: Define primitive types and their encodings, ensuring consistent interpretation
Round-Robin Composability: The ability to convert between text and binary representations without loss. As the specification states: "If you can toggle between the text - and binary representation, then that's the integrity proof, if not, then it's provably lacking integrity."
This transformation capability itself serves as an integrity proof—successful conversion demonstrates that the data structure maintains its integrity across domain transformations.
KERI distinguishes between two types of consistency that together establish integrity:
Internal Consistency: Within a single Key Event Log (KEL), events must:
Internal inconsistency makes a KEL unverifiable—it fails basic cryptographic checks.
External Consistency (Duplicity Detection): Across multiple copies of a KEL, consistency means:
External inconsistency (duplicity) occurs when multiple verifiable but conflicting versions of a KEL exist. KERI's duplicity detection mechanisms make such inconsistencies evident and attributable.
KERI implements complementary integrity verification—a mechanism that can verify integrity independently without requiring access to previous versions of the information for comparison. This is achieved through the use of public keys from data controllers.
For example, once a KEL has been verified back to its root-of-trust at a specific date and time, that verified portion (tail) can be safely discarded. Future verifications do not need to re-verify this historical chain, as the cryptographic integrity has already been established. This enables efficient storage and processing while maintaining security guarantees.
While not inherent to the definition of integrity itself, KERI's integrity implementation produces non-repudiation as a side benefit. Crypto-hash verification using the signer's public key ensures that:
This property emerges from the integrity mechanisms but represents a distinct security guarantee.
KERI makes a critical distinction between verification and validation:
Verification: Cryptographic checking of signatures, digests, and structural integrity—this establishes integrity
Validation: Assessment of previously verified data in context, applying business logic and trust policies—this approaches veracity judgment
As the specification notes: "Validation in relation to integrity, in KERI's view would be an assessment of what's been verified before; in a certain context from a certain angle. And this mechanism is too close to veracity judgement, to be an objective verdict over integrity of data."
By keeping integrity focused on cryptographic verifiability, KERI provides objective, automatable integrity guarantees without requiring subjective judgments about information quality or truthfulness.
Verifiable Credentials: ACDCs use SAIDs to ensure credential integrity from issuance through presentation. Any modification to credential attributes invalidates the SAID, making tampering evident.
Supply Chain Tracking: Data provenance chains maintain integrity through cryptographic commitments at each transformation step, enabling end-to-end verification without trusted intermediaries.
Legal Documents: Ricardian contracts embedded in ACDCs maintain integrity through SAID binding, ensuring contract terms cannot be altered without detection.
Key Event Logs: KELs maintain integrity through hash chaining and signature verification, enabling validators to independently verify the complete history of identifier control.
Independent Verification: Any party can verify data integrity without requiring access to trusted third parties or centralized infrastructure.
Tamper Evidence: Cryptographic binding makes any modification immediately detectable, providing strong security guarantees.
Efficient Processing: Complementary integrity verification enables efficient validation by avoiding redundant re-verification of previously validated data.
Interoperability: CESR's composability property ensures integrity is maintained across different serialization formats and transport mechanisms.
Auditability: Integrity mechanisms create verifiable audit trails for data transformations and custody transfers.
Narrow Scope: KERI's integrity definition deliberately excludes semantic correctness, meaning integrity verification does not establish truth or accuracy of content.
Cryptographic Dependency: Integrity guarantees depend on the strength of underlying cryptographic primitives. Advances in cryptanalysis or quantum computing could potentially weaken these guarantees.
Complexity: Implementing proper integrity verification requires understanding of cryptographic protocols, hash functions, and signature schemes.
Storage Requirements: Maintaining verifiable integrity often requires storing additional cryptographic material (signatures, digests, receipts), increasing storage overhead.
Performance Considerations: Cryptographic operations for integrity verification introduce computational overhead, though KERI's design minimizes this through efficient primitives and caching strategies.
While KERI provides cryptographic integrity, establishing veracity (truthfulness) requires additional layers:
Governance Frameworks: Organizations define policies for what constitutes valid and trustworthy credentials
Reputation Systems: Track issuer behavior over time to establish trust in their attestations
Verification Procedures: Business logic determines whether cryptographically valid credentials meet specific use case requirements
Legal Frameworks: Contracts and regulations establish accountability for false attestations
KERI's integrity mechanisms provide the foundation upon which these higher-level trust systems can be built, but they do not replace the need for governance and policy frameworks to establish veracity and trust.
Integrity Failures: When integrity verification fails:
Graceful Degradation: In systems with mixed integrity requirements: