BenchmarksStack RankingHICS (Free)
APIsPricingDocsWhite PaperTokenBlogAbout
Log InGet API Key
H33-ARCHIVESIGN · LONG-TERM

Every Signature
Valid for 50 Years

Documents signed today must be legally valid in 2055. RSA won't survive that long. Neither will the CA that issued your signing certificate. ArchiveSign solves both problems — post-quantum signatures with embedded timestamps, certificate chains, and revocation snapshots that survive infrastructure decay.

50yr
Verifiability
<3s
Per Signature
6
Formats
38
Tests Passing

Six Capabilities. One Archival Pipeline.

Every capability is designed for documents that must remain legally verifiable for decades — long after the signing CA has disappeared and the original algorithms have been deprecated.

1
Core Signing
SLH-DSA + ML-DSA + Dual Mode

The Problem

RSA and ECDSA signatures have a shelf life. Key lengths that are secure today will be breakable within 10–15 years. Single-algorithm signatures create a single point of failure: one cryptanalytic breakthrough invalidates every document you have ever signed.

H33 Solution

Dual-sign every document with SLH-DSA (hash-based, stateless, NIST FIPS 205) and ML-DSA (lattice-based, FIPS 204). SHA3-256 + BLAKE3 dual hashing. If one algorithm family falls, the other holds. Batch mode: 500 documents per signing request.

Document SHA3-256 + BLAKE3 SLH-DSA sign ML-DSA sign Dual envelope
Why dual signing matters

NIST selected both SLH-DSA and ML-DSA because they rely on fundamentally different mathematical hardness assumptions. A lattice breakthrough does not affect hash-based signatures, and vice versa. Dual signing is the only architecture that survives an unknown future attack.

2
RFC 3161 Timestamp Authority
H33-Operated · 50-Year Commitment

The Problem

A signature proves who signed. It does not prove when. Without a trusted timestamp, an adversary who compromises a key can backdate forgeries. Commercial TSAs use RSA — their timestamps will be forgeable once quantum arrives. Most TSAs make no long-term storage commitment.

H33 Solution

H33 operates its own RFC 3161-compliant Timestamp Authority. Every timestamp token is signed with Dilithium (ML-DSA). Tokens are stored indefinitely with a contractual 50-year availability commitment. The TSA itself is post-quantum from day one.

Document hash TSA request Dilithium sign RFC 3161 token Indefinite storage
Why this matters

A timestamp is the anchor that makes long-term signatures possible. Without it, key compromise at any point in the future retroactively invalidates every signature. A Dilithium-signed timestamp is the only kind that survives a quantum adversary.

3
Certificate Authority & Chain Embedding
Real CA · Revocation Snapshots · Key Transparency

The Problem

CAs disappear. OCSP responders go offline. CRL distribution points return 404. Within 10 years of signing, the infrastructure needed to validate a certificate chain often no longer exists. Your signature is technically valid but practically unverifiable.

H33 Solution

ArchiveSign embeds the full certificate chain, OCSP responses, and CRL snapshots directly into the signature envelope at signing time. A key transparency log (append-only Merkle tree) records every certificate issuance. Verification requires zero external lookups.

Signer cert Chain collect OCSP snapshot CRL snapshot Embed in envelope
Why embedding matters

ETSI long-term signature formats (PAdES-LTA, CAdES-A) require this. The entire validation context must travel with the document. If a verifier needs to contact an external server, the signature is not truly archival.

4
7-Stage Verifier
Hash · Timestamp · Chain · Revocation · Algorithm · Validity · Temporal

The Problem

Standard signature verification checks one thing: does the math work? It does not check whether the timestamp is still trustworthy, whether the certificate chain is complete, whether the signing algorithm has been deprecated, or whether the signature will still be valid in 5 years.

H33 Solution

Seven verification stages: (1) hash integrity, (2) timestamp validation, (3) certificate chain completeness, (4) revocation status, (5) algorithm health assessment, (6) projected validity window, and (7) temporal consistency across all embedded proofs. Returns a structured report, not just pass/fail.

Hash check Timestamp Cert chain Revocation Algo health Projected validity Temporal consistency
Why 7 stages

A signature that passes hash verification but uses a deprecated algorithm is a ticking time bomb. The 7-stage verifier catches signatures that are technically valid today but will fail within a predictable window — giving you time to re-sign before it is too late.

5
Long-Term Maintenance
Re-Timestamping · Algorithm Upgrades · Bulk Health

The Problem

Algorithms age. SHA-1 was deprecated. RSA-1024 is broken. Every archival signature will eventually need maintenance: new timestamps with stronger algorithms, algorithm upgrades, health assessments across millions of stored documents. Nobody does this today.

H33 Solution

Automated re-timestamping when algorithm strength thresholds are crossed. Algorithm upgrade path that preserves the original signature chain while adding new layers. Bulk health assessment: scan 10,000 documents in a single API call and get a structured report of which signatures need attention.

Scheduled scan Health assessment Re-timestamp Algo upgrade Extended validity
Why maintenance matters

A 50-year signature is not "set and forget." It requires active stewardship. The re-timestamping chain is what converts a 5-year algorithm into a 50-year signature. Without it, every archival promise is empty.

6
Key Escrow & Threshold Cryptography
2-of-5 Threshold · Append-Only Log

The Problem

If the signing key is lost, stolen, or destroyed, every document signed with it becomes suspect. Single-custodian key storage is a single point of failure. Key escrow with a single third party just moves the risk.

H33 Solution

Threshold cryptography splits signing keys across 2–5 independent agents. No single agent can sign or reconstruct the key alone. A key transparency log (append-only Merkle tree) records every key operation — issuance, rotation, escrow deposit, recovery — creating an immutable audit trail.

Key generation Threshold split (k-of-n) Agent distribution Transparency log Audit trail
Why threshold escrow matters

A signing key that lasts 50 years will outlive employees, departments, and possibly the organization that created it. Threshold cryptography ensures the key survives personnel changes, corporate restructuring, and custody disputes without ever existing in a single location.

One Pipeline. Every Format.

Six capabilities, one cryptographic stack. Every component is shared across every supported format.

CapabilityH33 ComponentStandard
Post-quantum signingSLH-DSA + ML-DSA dualFIPS 205 / 204
Hash integritySHA3-256 + BLAKE3 dualNIST / IETF
TimestampsRFC 3161 TSA (Dilithium-signed)RFC 3161
Certificate chainFull chain + OCSP + CRL embedX.509 / RFC 6960
Key managementThreshold escrow (2-of-5)Shamir / Merkle log
Verification7-stage structured verifierETSI EN 319 102
PDF signaturesPAdES-LTA envelopeETSI EN 319 142
XML signaturesXAdES-A envelopeETSI EN 319 132
CMS signaturesCAdES-A envelopeETSI EN 319 122
JSON signaturesJAdES envelopeETSI TS 119 182
Batch signing500 docs per request<3s per signature
MaintenanceRe-timestamp + algo upgrade10K docs per scan

Built to the Standards Auditors Already Require

Not a research prototype. Direct conformance with the frameworks that govern archival signatures in regulated industries.

ETSI PAdES-LTA
Long-term archival PDF signatures with embedded validation data
Full PAdES-LTA envelope with PQ signatures
ETSI CAdES-A
CMS archival signatures for binary and structured data
CAdES-A with chain + revocation embed
ETSI XAdES-A
XML archival signatures for structured documents
XAdES-A with timestamp + cert archive
ETSI JAdES
JSON-based advanced electronic signatures
JAdES with SLH-DSA + ML-DSA dual signing
RFC 3161
Internet X.509 PKI Time-Stamp Protocol
H33-operated TSA, Dilithium-signed tokens
NARA
National Archives electronic records management
50-year verifiability, format preservation
DoD 5015.02
Department of Defense records management standard
PQ signatures, audit trail, chain of custody
eIDAS 2.0
EU regulation on electronic identification and trust services
Qualified signatures with ETSI format compliance

Per-Signature. Per-Timestamp. No Seats.

Simple per-operation pricing. Signatures include dual PQ signing, timestamp embedding, and certificate chain snapshot. Re-timestamps and managed plans for organizations with large archives.

Standard (<10MB)
$2
per signature
Dual PQ sign + timestamp + chain
Timestamp Only
$0.10
per timestamp
RFC 3161 Dilithium token
Re-Timestamp
$0.50
per re-stamp
Maintenance re-timestamp
Enterprise
$25K
per month

A law firm signing 200 contracts/month at $2/sig spends $400/month for 50-year post-quantum verifiability. A government agency archiving 50,000 records/year on the managed plan spends $5,000/month — less than one day of a records management consultant.

See the Entire Pipeline Run.
Twenty Minutes.

Sign a document with dual post-quantum algorithms. Watch the timestamp embed. Watch the certificate chain snapshot. Verify it with the 7-stage verifier. Every step is auditable. Every signature is built to outlast the infrastructure that created it.

Try Live Demo Get API Key → Read the Deep Dive