PHP Classes

Chronicle: Append arbitrary data to a storage container

Recommend this page to a friend!
  Info   View files View files (94)   DownloadInstall with Composer Download .zip   Reputation   Support forum   Blog    
Last Updated Ratings Unique User Downloads Download Rankings
2023-03-19 (19 days ago) RSS 2.0 feedNot yet rated by the usersTotal: 110 This week: 2All time: 9,540 This week: 89Up
Version License PHP version Categories
chronicle 1.0.3MIT/X Consortium ...7Utilities and Tools, Cryptography, Lo..., S..., P...
Description 

Author

Paragon Initiative Enterprises


Contributor

This package can be used to append arbitrary data to a storage container.

It implements a microservice built with Slim Framework that can append cryptographically secure data using a given encryption key.

The data is stored a given database using PDO.

Innovation Award
PHP Programming Innovation award nominee
February 2018
Number 5
Blockchains are means to store sequences of blocks of data that have a relation between them.

Nowadays virtual currencies like bitcoin use blockchains to store data related to transactions that involve currency amounts using cryptgraphy to store the block data in a secure way.

This package provides a PHP solution to append data to blockchains stored in a database using PDO.

Manuel Lemos
Picture of Scott Arciszewski
  Performance   Level  
Innovation award
Innovation award
Nominee: 28x

Winner: 1x

 

Details

<h1 id="chronicle"><img src="https://paragonie.com/static/images/chronicle-logo.svg" width="50" /> Chronicle</h1>

Build Status Latest Stable Version Latest Unstable Version License

Chronicle is a self-hostable microservice, built with Slim Framework, which enables authorized users to commit arbitrary data to an immutable, append-only public ledger.

Chronicle is superior to "blockchain" solutions for most real-world technical problems that don't involve proofs-of-work or Byzantine fault tolerance.

More precisely, Chronicle is a self-hostable microservice exposing an append-only, cryptographically-secure hash chain data structure that accepts arbitrary data from authorized clients through an HTTP API, secured by Sapient, that can be used as a building block for building a cryptographic audit trail similar to Certificate Transparency.

> Chronicle will make you question the need for blockchain technology.

Chronicle was developed by Paragon Initiative Enterprises as part of our continued efforts to make the Internet more secure.

Getting Started with Chronicle (Documentation)

Client-Side Software that Interacts with Chronicle

PHP

What does Chronicle do?

Chronicle allows trusted clients to send data to be included in an immutable, auditable, cryptographic permanent record.

Furthermore, Chronicle has cross-signing and many-to-one replication built-in, which, when used, greatly enhances the auditability and availability of the data written to your local Chronicle instance.

What problems do Chronicle solve?

Chain of Custody

If you have sensitive information, you can write metadata about client access times to a private Chronicle in order to have verifiable, tamper-resistant proof that specific records were accessed by specific user accounts at a specific time.

Proof of Knowledge

By inserting an encrypted message and then revealing the key at a later date, you can provide strong evidence of prior knowledge.

Userbase Consistency Verification

For building a secure code delivery system, committing some metadata and a SHA256 or BLAKE2 hash of each update file to a publicly verifiable Chronicle allows users to compile a whitelist of known update files to help block trojan horse malware (in the event of a compromised update server).

For best results, combine with cryptographic signatures (which may also be registered in the Chronicle) and reproducible builds.

Auditable Security Event Logging

Because of Chronicle's cryptographically assured append-only properties, and its use of modern elliptic curve digital signatures, Chronicle is a good fit for integrating with SIEM solutions and internal SOCs.

How does it work?

All communications are secured with Sapient. Sapient ensures that all published messages are signed with Ed25519. All messages are committed to a hash chain data structure backed by BLAKE2b, which we call Blakechain for short.

There are two hashes for each message:

  1. The hash of the current message, whose BLAKE2b key is the previous message's block. This is just called `currhash` internally.
  2. The summary hash, which is a BLAKE2b hash of all message hashes to date, concatenated together in order. This is called `summaryhash` internally.

The rationale for using the previous message's hash was to add a degree of domain separation in the event that a BLAKE2b collision attack is ever discovered. The keying should reduce the likelihood of any practical attacks, especially if the chain is updated rapidly.

  Files folder image Files  
File Role Description
Files folder image.github (1 directory)
Files folder imagebin (14 files)
Files folder imagedocs (7 files, 2 directories)
Files folder imagelogs (1 file)
Files folder imagepublic (3 files)
Files folder imagesql (1 file, 3 directories)
Files folder imagesrc (5 files, 1 directory)
Files folder imagetemplates (1 file)
Files folder imagetests (2 directories)
Accessible without login Plain text file cli-autoload.php Aux. Auxiliary script
Accessible without login Plain text file composer.json Data Auxiliary data
Accessible without login Plain text file phpunit.xml Data Auxiliary data
Accessible without login Plain text file psalm.xml Data Auxiliary data
Accessible without login Plain text file README.md Doc. Documentation

 Version Control Unique User Downloads Download Rankings  
 100%
Total:110
This week:2
All time:9,540
This week:89Up