CITADEL - Secure Licensing with 5×5 Keys & ECDSA
Project CITADEL by AIC delivers high-assurance, cryptographically verifiable software licensing with Base24-encoded 5×5 keys, ECDSA signatures, offline validation, and device locking — establishing a new standard for secure digital activation.
Category
Commercial
Category
Commercial
Category
Commercial
Client
Internal / Multiple Products
Client
Internal / Multiple Products
Client
Internal / Multiple Products
Services
Crypto Design, Client/Server Validation
Services
Crypto Design, Client/Server Validation
Services
Crypto Design, Client/Server Validation
Location
UK
Location
UK
Location
UK
Year
2025
Year
2025
Year
2025
TRL
6
TRL
6
TRL
6



Overview
Project CITADEL is AIC’s high-assurance software licensing and activation framework, designed to protect mission-critical applications through cryptographically verifiable 5×5 product keys, ECDSA signatures, and device-locked validation.
Developed to military and enterprise-grade standards, CITADEL ensures that every activation is authentic, auditable, and uniquely bound to the authorised user or system — even in air-gapped or disconnected environments.
Built on AIC’s secure architecture, the platform provides a unified trust model for digital licensing across on-premise, clean-cloud, and tactical deployments, combining asymmetric cryptography, offline verification, and key versioning to create a system that is as resilient as it is adaptable.
Core Principles
Authenticity – Every license key carries a digitally signed payload verifiable against AIC’s public key infrastructure.
Integrity – Keys cannot be forged, replayed, or tampered with thanks to ECDSA-based cryptographic proof.
Sovereignty – Operates without third-party dependency or online validation servers, suitable for classified and disconnected systems.
Auditability – Every issued key, signature, and device bind event is logged immutably for compliance and traceability.
Longevity – Backward-compatible key versioning enables future algorithm upgrades without invalidating existing deployments.
Technical Architecture
Component | Function | Key Technologies |
|---|---|---|
Key Minting Authority (KMA) | Generates, signs, and issues Base24-encoded 5×5 product keys. | .NET 9, ECDSA P-256, HSM-backed signing |
Validation Engine | Verifies license authenticity and device lock locally or remotely. | ECDSA Verify, SHA-256 hashing, offline validation module |
Device Binding Module | Derives unique hardware fingerprints using CPU, TPM, and OS identifiers. | C#, Windows API, TPM 2.0 |
License Registry | Stores immutable activation and revocation records. | MongoDB Atlas, Azure Blob Storage |
Revocation Service | Issues signed invalidation lists and manages key roll-over events. | Azure Functions, Event Grid |
SDK & API Layer | Developer integration for validation, telemetry, and lifecycle operations. | NuGet Package, REST / GraphQL API |
Key Features
Base24-Encoded 5×5 Keys – Compact, human-readable, error-resistant key format supporting up to 120 bits of entropy.
Asymmetric ECDSA Signatures – Each key digitally signed using the platform’s private key; verified locally using the public key.
Offline Verification – No external network dependency; suitable for air-gapped military, industrial, or lab systems.
Device Locking – Optionally binds the key to a hardware fingerprint to prevent redistribution or cloning.
Key Versioning & Rotation – Supports multiple signing authorities and evolving crypto suites without breaking old installations.
Encrypted License Payloads – Embedded product metadata (edition, expiry, features) encrypted and integrity-checked at runtime.
Developer SDK – Cross-platform library enabling integration with desktop, server, and embedded products.
Telemetry Opt-In – Optional anonymised activation tracking for analytics and support.
Security & Compliance Alignment
CITADEL applies Zero-Trust and cryptographic verification principles aligned to:
NIST FIPS 186-4 / 140-3 – Digital signature and cryptographic module validation
ISO 27001 / 27017 / 27018 – Information and cloud security controls
UK MoD JSP 440 / 604 – Secure information infrastructure standards
GDPR / UK Data Protection Act 2018 – Lawful processing of identifiable activation data
BSI PAS 754 – Software trustworthiness and lifecycle integrity
All private keys are stored in Hardware Security Modules (HSMs) and never leave the secure boundary of the minting authority.
Deployment Model
Clean-Cloud (Azure) – Managed service with regional redundancy and automated key lifecycle management.
Private Mint Authority – Standalone deployment for classified or sovereign customers.
Hybrid Mode – Public issuance with offline verification endpoints for internal use.
Developer Integration Kits – Plug-and-play SDKs for .NET, C++, Go, and Python.
Use Cases
Defence & Government Software – Air-gapped license enforcement for secure mission systems.
Enterprise SaaS / On-Prem Products – Hybrid activation across online and disconnected installations.
Embedded & Industrial Devices – Tamper-resistant licensing for firmware or machine-bound deployments.
Research & Simulation Tools – Controlled academic or partner access with expiration and usage logging.
Strategic Value
Project CITADEL establishes AIC’s sovereign licensing and trust infrastructure, ensuring that every distributed component — from fielded defence software to commercial SaaS — can prove its authenticity without external dependency.
By replacing fragile serial-number models with cryptographically verifiable proof-of-use, CITADEL reinforces software supply-chain integrity, supports digital sovereignty, and provides audit-ready compliance for customers operating in regulated, high-assurance environments.
It is not merely a licensing service — it is a trust anchor for the next generation of secure software distribution.
Overview
Project CITADEL is AIC’s high-assurance software licensing and activation framework, designed to protect mission-critical applications through cryptographically verifiable 5×5 product keys, ECDSA signatures, and device-locked validation.
Developed to military and enterprise-grade standards, CITADEL ensures that every activation is authentic, auditable, and uniquely bound to the authorised user or system — even in air-gapped or disconnected environments.
Built on AIC’s secure architecture, the platform provides a unified trust model for digital licensing across on-premise, clean-cloud, and tactical deployments, combining asymmetric cryptography, offline verification, and key versioning to create a system that is as resilient as it is adaptable.
Core Principles
Authenticity – Every license key carries a digitally signed payload verifiable against AIC’s public key infrastructure.
Integrity – Keys cannot be forged, replayed, or tampered with thanks to ECDSA-based cryptographic proof.
Sovereignty – Operates without third-party dependency or online validation servers, suitable for classified and disconnected systems.
Auditability – Every issued key, signature, and device bind event is logged immutably for compliance and traceability.
Longevity – Backward-compatible key versioning enables future algorithm upgrades without invalidating existing deployments.
Technical Architecture
Component | Function | Key Technologies |
|---|---|---|
Key Minting Authority (KMA) | Generates, signs, and issues Base24-encoded 5×5 product keys. | .NET 9, ECDSA P-256, HSM-backed signing |
Validation Engine | Verifies license authenticity and device lock locally or remotely. | ECDSA Verify, SHA-256 hashing, offline validation module |
Device Binding Module | Derives unique hardware fingerprints using CPU, TPM, and OS identifiers. | C#, Windows API, TPM 2.0 |
License Registry | Stores immutable activation and revocation records. | MongoDB Atlas, Azure Blob Storage |
Revocation Service | Issues signed invalidation lists and manages key roll-over events. | Azure Functions, Event Grid |
SDK & API Layer | Developer integration for validation, telemetry, and lifecycle operations. | NuGet Package, REST / GraphQL API |
Key Features
Base24-Encoded 5×5 Keys – Compact, human-readable, error-resistant key format supporting up to 120 bits of entropy.
Asymmetric ECDSA Signatures – Each key digitally signed using the platform’s private key; verified locally using the public key.
Offline Verification – No external network dependency; suitable for air-gapped military, industrial, or lab systems.
Device Locking – Optionally binds the key to a hardware fingerprint to prevent redistribution or cloning.
Key Versioning & Rotation – Supports multiple signing authorities and evolving crypto suites without breaking old installations.
Encrypted License Payloads – Embedded product metadata (edition, expiry, features) encrypted and integrity-checked at runtime.
Developer SDK – Cross-platform library enabling integration with desktop, server, and embedded products.
Telemetry Opt-In – Optional anonymised activation tracking for analytics and support.
Security & Compliance Alignment
CITADEL applies Zero-Trust and cryptographic verification principles aligned to:
NIST FIPS 186-4 / 140-3 – Digital signature and cryptographic module validation
ISO 27001 / 27017 / 27018 – Information and cloud security controls
UK MoD JSP 440 / 604 – Secure information infrastructure standards
GDPR / UK Data Protection Act 2018 – Lawful processing of identifiable activation data
BSI PAS 754 – Software trustworthiness and lifecycle integrity
All private keys are stored in Hardware Security Modules (HSMs) and never leave the secure boundary of the minting authority.
Deployment Model
Clean-Cloud (Azure) – Managed service with regional redundancy and automated key lifecycle management.
Private Mint Authority – Standalone deployment for classified or sovereign customers.
Hybrid Mode – Public issuance with offline verification endpoints for internal use.
Developer Integration Kits – Plug-and-play SDKs for .NET, C++, Go, and Python.
Use Cases
Defence & Government Software – Air-gapped license enforcement for secure mission systems.
Enterprise SaaS / On-Prem Products – Hybrid activation across online and disconnected installations.
Embedded & Industrial Devices – Tamper-resistant licensing for firmware or machine-bound deployments.
Research & Simulation Tools – Controlled academic or partner access with expiration and usage logging.
Strategic Value
Project CITADEL establishes AIC’s sovereign licensing and trust infrastructure, ensuring that every distributed component — from fielded defence software to commercial SaaS — can prove its authenticity without external dependency.
By replacing fragile serial-number models with cryptographically verifiable proof-of-use, CITADEL reinforces software supply-chain integrity, supports digital sovereignty, and provides audit-ready compliance for customers operating in regulated, high-assurance environments.
It is not merely a licensing service — it is a trust anchor for the next generation of secure software distribution.
Overview
Project CITADEL is AIC’s high-assurance software licensing and activation framework, designed to protect mission-critical applications through cryptographically verifiable 5×5 product keys, ECDSA signatures, and device-locked validation.
Developed to military and enterprise-grade standards, CITADEL ensures that every activation is authentic, auditable, and uniquely bound to the authorised user or system — even in air-gapped or disconnected environments.
Built on AIC’s secure architecture, the platform provides a unified trust model for digital licensing across on-premise, clean-cloud, and tactical deployments, combining asymmetric cryptography, offline verification, and key versioning to create a system that is as resilient as it is adaptable.
Core Principles
Authenticity – Every license key carries a digitally signed payload verifiable against AIC’s public key infrastructure.
Integrity – Keys cannot be forged, replayed, or tampered with thanks to ECDSA-based cryptographic proof.
Sovereignty – Operates without third-party dependency or online validation servers, suitable for classified and disconnected systems.
Auditability – Every issued key, signature, and device bind event is logged immutably for compliance and traceability.
Longevity – Backward-compatible key versioning enables future algorithm upgrades without invalidating existing deployments.
Technical Architecture
Component | Function | Key Technologies |
|---|---|---|
Key Minting Authority (KMA) | Generates, signs, and issues Base24-encoded 5×5 product keys. | .NET 9, ECDSA P-256, HSM-backed signing |
Validation Engine | Verifies license authenticity and device lock locally or remotely. | ECDSA Verify, SHA-256 hashing, offline validation module |
Device Binding Module | Derives unique hardware fingerprints using CPU, TPM, and OS identifiers. | C#, Windows API, TPM 2.0 |
License Registry | Stores immutable activation and revocation records. | MongoDB Atlas, Azure Blob Storage |
Revocation Service | Issues signed invalidation lists and manages key roll-over events. | Azure Functions, Event Grid |
SDK & API Layer | Developer integration for validation, telemetry, and lifecycle operations. | NuGet Package, REST / GraphQL API |
Key Features
Base24-Encoded 5×5 Keys – Compact, human-readable, error-resistant key format supporting up to 120 bits of entropy.
Asymmetric ECDSA Signatures – Each key digitally signed using the platform’s private key; verified locally using the public key.
Offline Verification – No external network dependency; suitable for air-gapped military, industrial, or lab systems.
Device Locking – Optionally binds the key to a hardware fingerprint to prevent redistribution or cloning.
Key Versioning & Rotation – Supports multiple signing authorities and evolving crypto suites without breaking old installations.
Encrypted License Payloads – Embedded product metadata (edition, expiry, features) encrypted and integrity-checked at runtime.
Developer SDK – Cross-platform library enabling integration with desktop, server, and embedded products.
Telemetry Opt-In – Optional anonymised activation tracking for analytics and support.
Security & Compliance Alignment
CITADEL applies Zero-Trust and cryptographic verification principles aligned to:
NIST FIPS 186-4 / 140-3 – Digital signature and cryptographic module validation
ISO 27001 / 27017 / 27018 – Information and cloud security controls
UK MoD JSP 440 / 604 – Secure information infrastructure standards
GDPR / UK Data Protection Act 2018 – Lawful processing of identifiable activation data
BSI PAS 754 – Software trustworthiness and lifecycle integrity
All private keys are stored in Hardware Security Modules (HSMs) and never leave the secure boundary of the minting authority.
Deployment Model
Clean-Cloud (Azure) – Managed service with regional redundancy and automated key lifecycle management.
Private Mint Authority – Standalone deployment for classified or sovereign customers.
Hybrid Mode – Public issuance with offline verification endpoints for internal use.
Developer Integration Kits – Plug-and-play SDKs for .NET, C++, Go, and Python.
Use Cases
Defence & Government Software – Air-gapped license enforcement for secure mission systems.
Enterprise SaaS / On-Prem Products – Hybrid activation across online and disconnected installations.
Embedded & Industrial Devices – Tamper-resistant licensing for firmware or machine-bound deployments.
Research & Simulation Tools – Controlled academic or partner access with expiration and usage logging.
Strategic Value
Project CITADEL establishes AIC’s sovereign licensing and trust infrastructure, ensuring that every distributed component — from fielded defence software to commercial SaaS — can prove its authenticity without external dependency.
By replacing fragile serial-number models with cryptographically verifiable proof-of-use, CITADEL reinforces software supply-chain integrity, supports digital sovereignty, and provides audit-ready compliance for customers operating in regulated, high-assurance environments.
It is not merely a licensing service — it is a trust anchor for the next generation of secure software distribution.

Let’s Shape the Future of Industry Together
Strategic consultancy, secure technology, and mission-ready expertise, connect with AIC to deliver change where it matters most.

Let’s Shape the Future of Industry Together
Strategic consultancy, secure technology, and mission-ready expertise, connect with AIC to deliver change where it matters most.

Let’s Shape the Future of Industry Together
Strategic consultancy, secure technology, and mission-ready expertise, connect with AIC to deliver change where it matters most.