V
SeraphVPN
CompareResearchFAQCompany
Overview
PALISADE Specification
Table of Contents1. Introduction2. Terminology3. Security Properties4. Protocol Overview5. Cryptographic Dependencies6. Key Schedule7. Handshake Protocol8. Encrypted Packet Format9. Nonce Construction10. Traffic Shaping Modes11. Rekeying12. Session Resumption13. Migration / Roaming14. Control Frames15. Error Handling16. Extensibility and Versioning17. Security Considerations18. IANA Considerations
Replay Protection
Deterministic Serialization
Control Plane
Security Invariants
Threat Model
Test Vectors
Proofs
Implementation
State MachineWire Format ExamplesMessage FlowResumption HandshakeMigration FlowEvent Transition TablesError Codes
Draft Status

PALISADE Specification

Table of Contents

  1. Introduction
  2. Terminology
  3. Security Properties
  4. Protocol Overview
  5. Cryptographic Dependencies
  6. Key Schedule
  7. Handshake Protocol
  8. Encrypted Packet Format
  9. Nonce Construction
  10. Traffic Shaping Modes
  11. Rekeying
  12. Session Resumption
  13. Migration / Roaming
  14. Control Frames
  15. Error Handling
  16. Extensibility and Versioning
  17. Security Considerations
  18. IANA Considerations

PALISADE Protocol Specification Draft 00

INFORMATIONAL

V
SeraphVPN

Secure, private and fast post-quantum-native VPN designed to protect modern networks from today's threats and tomorrow's quantum attacks.

Product

  • Compare
  • Downloads
  • FAQ

Company

  • About
  • Technology

Support

  • Contact
  • Server Status

© 2026 SeraphVPN. All rights reserved.

PrivacyTerms