Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 45 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A root-of-trust that is cryptographically verifiable all the way to its current controlling key pair in a PKI, where the characteristic 'primary' refers to its one-to-one relationship with the used for creating the of the private keys.
A primary root-of-trust represents the foundational layer of cryptographic trust in KERI's security architecture. Unlike traditional trust models that depend on administrative processes or external authorities, a primary root-of-trust establishes trust through direct cryptographic verification from the current key state all the way back to the original entropy source that generated the private keys.
The defining characteristic that makes a root-of-trust "primary" is its direct, unmediated relationship to entropy. The entropy serves as the ultimate source of randomness for generating the seed (also called bran in KERI terminology), which in turn generates the private keys. This one-to-one mapping between entropy and key generation ensures the trust basis is primary—not derived from another trust source, not dependent on external validation, and not requiring administrative oversight.
Key properties of a primary root-of-trust include:
Traditional Public Key Infrastructure (PKI) systems establish trust through administrative roots-of-trust—Certificate Authorities (CAs) that maintain mappings between identifiers and public keys through trusted third-party processes. These systems suffer from several fundamental weaknesses:
Blockchain-based systems introduced algorithmic roots-of-trust using distributed consensus mechanisms. While these provide stronger guarantees than administrative systems, they still have limitations:
The concept of self-certifying identifiers emerged as an alternative, where identifiers are cryptographically derived from public keys, eliminating the need for external binding authorities. However, basic self-certifying identifiers were ephemeral—they couldn't support key rotation without abandoning the identifier.
KERI revolutionizes the root-of-trust model by creating Autonomic Identifiers (AIDs) that combine self-certification with persistent control through key rotation. The primary root-of-trust in KERI is established through the Key Event Log (KEL), which provides:
The KEL creates an unbroken cryptographic chain from the current key state back to the inception event:
This structure enables end-verifiable proof of control authority—any validator can independently verify the entire history without relying on external infrastructure.
The primary root-of-trust's connection to entropy is critical:
This chain of derivation means the identifier's trust properties trace directly back to the quality of the entropy source. The "primary" designation emphasizes this direct lineage—there are no intermediate trust dependencies.
KERI's pre-rotation mechanism maintains the primary root-of-trust across key rotations:
This approach solves the "hard problem" of secure key rotation that plagued traditional PKI, maintaining the primary root-of-trust even as keys change.
KERI's primary root-of-trust has no security dependency on external infrastructure:
This independence distinguishes primary roots-of-trust from secondary roots-of-trust, which depend on anchoring to primary roots for their security guarantees.
Primary roots-of-trust are essential for:
Cryptographic Assurance: The primary root-of-trust provides the strongest possible security guarantees:
Operational Independence: Organizations maintain complete control:
Auditability: Complete transparency of control history:
Key Management Responsibility: The controller bears full responsibility for:
Unlike administrative systems where a CA might help recover from key loss, primary roots-of-trust place complete responsibility on the controller. This is both a feature (no external dependencies) and a challenge (no external safety net).
Complexity: Implementing primary roots-of-trust requires:
Performance Considerations: While verification is efficient, maintaining the KEL requires:
However, these costs are typically modest compared to blockchain-based systems, and the security benefits far outweigh the resource requirements.
Primary roots-of-trust form the foundation for secondary roots-of-trust such as Transaction Event Logs (TELs):
This hierarchical model allows KERI to support complex use cases (like verifiable credentials) while maintaining a simple, secure foundation in the primary root-of-trust.
The primary root-of-trust concept represents a fundamental shift in how we establish trust in digital systems. By grounding trust directly in cryptographic entropy and maintaining an unbroken chain of verification through the KEL, KERI provides the strongest possible foundation for decentralized identity. This approach eliminates dependencies on external authorities, enables true self-sovereignty, and provides the security guarantees necessary for high-stakes applications in the digital economy.
Implementing a primary root-of-trust requires high-quality entropy generation:
The primary root-of-trust's security depends on protecting the entropy and derived keys:
Validators must verify the entire KEL to confirm the primary root-of-trust:
Maintaining a primary root-of-trust requires ongoing operational security:
While maintaining security, optimize for performance: