In the Norsh ecosystem, your identity is created and validated through a pair of cryptographic keys. There are no usernames, passwords or conventional accounts. Instead, all authentication, ownership and communication are tied to a public key, and to a unique address derived from it.If you lose your private key, your identity cannot be recovered.
If your private key is exposed, your identity can be stolen.There is no fallback, no password reset, and no admin override.
Security begins at the key.
This process involves two fundamental steps.
Step 1 - Generate your key pair#
A private key, which must be stored with absolute security
A public key, which can be shared and is used to generate your address
The private key is your only proof of control.
If it is lost or exposed, your identity, assets and permissions are irreversibly compromised.
Never share it, never transmit it, never expose it to client interfaces or third-party systems.
Your private key must be stored in a secure location, such as a hardware device, an encrypted file, or a certified key vault. Norsh does not store or recover any keys. Responsibility is entirely on the user or the application managing the keys.
Step 2 - Derive your address#
Provide your public key as input. You will receive a 64-character SHA3-256 address. This is your unique and permanent identifier across the Norsh network.Sender and recipient in all transactions
Once generated, this address is used in all interactions with Norsh, including sending transactions, executing actions, authorizing elements, and receiving assets.
Ongoing usage#
From this point forward, the public key and the derived address are used in all systems. The private key is used to sign any request or transaction that requires proof of authority.Every API that performs a sensitive operation expects the request to be signed using the private key, and verifiable using the public key. This guarantees that only the rightful holder of a key can perform operations under that identity.
Reference Standards#
This process is based on the technical rules defined in:All keys are generated using ECDSA with curve secp256r1, and all addresses are derived using SHA3-256 from the raw bytes of the public key, as described in the specifications.
This cryptographic identity model is the foundation of all security, ownership and trust within the Norsh ecosystem. Its correct implementation and secure management are non-negotiable.