THIIC Tokenized Healthcare Identity Interchange Cryptography
SESSION ACTIVE · ----
Get in touch
PROTOCOL · BREAKDOWN

How THIIC Works

An 8-step bilateral protocol that exchanges audience identifiers between two parties without either party transmitting raw PII across the wire.

PROTOCOL STEPS · 01–08
01
Key Agreement & Session Initialization

Both parties generate Ed25519 keypairs independently. Public keys are exchanged over an authenticated channel. No private key material leaves either system at any point in the protocol.

Ed25519 · RFC 8032
02
Session Key Derivation

HKDF-SHA256 derives a symmetric session key from the shared secret and a freshly generated nonce. The derived key is scoped to this session only — it cannot be reused across sessions or parties.

HKDF-SHA256 · RFC 5869
03
Sender Hashes Patient Identifiers

The sending party applies SHA-256 to each raw identifier (phone, email, or similar) using a salt derived from the session key. The original PII never enters the transport layer — only the hash does.

SHA-256 · FIPS 180-4
04
AES-256-GCM Payload Encryption

The hashed payload is encrypted with AES-256-GCM using the session key. GCM provides authenticated encryption — the recipient can verify ciphertext integrity before decryption, preventing tampering in transit.

AES-256-GCM · FIPS 197
05
Signed Transmission

The sender signs the ciphertext envelope with their Ed25519 private key. The signature is appended to the transmission. The recipient can verify provenance before decrypting — a spoofed packet fails signature verification immediately.

Ed25519 Signing · RFC 8032
06
Recipient Verification & Decryption

The recipient verifies the Ed25519 signature against the sender's public key. Only upon successful verification does AES-256-GCM decryption proceed. Any modification to the ciphertext fails the GCM authentication tag.

Verify → Decrypt
07
Token Resolution & Matching

The recipient applies the same HKDF-derived salt to their own identifier pool, producing SHA-256 hashes locally. Matches are resolved by hash comparison — the recipient's raw identifiers never leave their system either.

Bilateral Zero-Disclosure
08
Audit Log & Key Rotation

Every exchange event is appended to a tamper-evident audit log with HMAC integrity. Session keys are single-use and destroyed post-exchange. Key rotation schedules are enforced at the protocol layer — not by policy alone.

HMAC-SHA256 · Append-Only
PROTOCOL METADATA
Authored Summit Audience Segments
Protocol THIIC v1.0
Runtime Web Crypto API
Transport TLS 1.3 minimum
Status ACTIVE
PRIMITIVES
SHA-256
FIPS 180-4 · Identifier hashing
HKDF-SHA256
RFC 5869 · Session key derivation
AES-256-GCM
FIPS 197 / NIST SP 800-38D · Authenticated encryption
Ed25519
RFC 8032 · Signing & verification
SECURITY MODEL
No PII in transit
Authenticated encryption
Bilateral key generation
Single-use session keys
Tamper-evident audit log
Protocol-enforced key rotation
THREAT ANALYSIS

Known Attack Scenarios

How THIIC responds to four categories of adversarial input. Verified against OWASP and NIST threat frameworks.

Man-in-the-middle intercepts the encrypted payload
● BLOCKED

AES-256-GCM authentication tag fails on any modification. Ed25519 signature fails on any tampering. Payload is discarded before decryption begins.

Attacker replays a captured ciphertext envelope
● BLOCKED

Session nonces are single-use. Replay of a prior envelope produces a nonce collision, which is rejected at the session layer before signature verification.

Recipient leaks the decrypted hash set
● CONTAINED

SHA-256 hashes are non-reversible. A leaked hash set is computationally useless without the original salted identifier pool — no PII can be recovered from hashes alone.

Insider compromises session key post-exchange
● CONTAINED

Session keys are single-use and destroyed post-exchange. A compromised key cannot decrypt any future or past sessions. Each exchange generates fresh key material from scratch.

PROTOCOL AUDIT

Tamper-Evident Audit Logs

Every THIIC exchange event is appended to a cryptographically chained log. Each entry contains a timestamp, event type, session ID, and an HMAC-SHA256 integrity tag computed over the preceding entry.

Any modification to a prior entry breaks all subsequent HMAC chains — making log tampering detectable immediately. Logs are append-only by architectural constraint, not just policy.

Partners may independently verify log integrity using the THIIC public audit key published on docs.thiic.com. No trust in a third-party intermediary is required.

AUDIT LOG · SAMPLE LIVE
14:02:31.481
SESSION_INIT
session_id: 9a3f… · keys exchanged
14:02:31.512
KEY_DERIVED
HKDF-SHA256 · nonce: c7d4…
14:02:31.544
PAYLOAD_ENCRYPTED
AES-256-GCM · 59,421 tokens
14:02:31.577
SIGNATURE_APPENDED
Ed25519 · sender verified
14:02:31.610
DELIVERED · VERIFIED
signature OK · GCM tag OK · log sealed
NEXT STEP

See It Running Live

The interactive demo runs all five cryptographic operations in your browser using the real Web Crypto API. Zero network calls. Synthetic data only.

OPEN LIVE DEMO DOWNLOAD WHITEPAPER