Technical deep dive into the cryptographic primitives and implementation details of dStack’s TDX attestation.
attestation.rs#L33
. By default, sha512
is used, but options include sha256
, sha384
, all SHA-3 variants, Keccak, and a raw
mode for direct data binding. Every report data input is prefixed with a content tag (e.g., kms-root-ca
, ratls-cert
, app-data
), ensuring context-specific and unambiguous measurements. This allows applications to select the most suitable hash algorithm, while maintaining interoperability and high security.
The flexibility in hash algorithm selection is crucial for supporting a wide range of cryptographic policies and interoperability requirements. By allowing applications to choose the most appropriate algorithm, dStack ensures both forward compatibility and robust security.
get_key
RPC method implements this: a root ECDSA key derives per-application keys by path, then signs the derived public key and usage context. This signature chain allows independent verification that every derived key is both valid and bound to the right application, so that only trusted code can use it.
This approach to key derivation ensures that cryptographic material is never shared across tenants or applications, providing strong isolation and minimizing the risk of key compromise.
Next Component: Learn how attestation integrates with the VMM security architecture.