# Norsh ## Docs - Norsh > Usage Guide [Cryptographic Identity](https://docs.norsh.org/1069598m0.md): - Norsh [API](https://docs.norsh.org/2784137f0.md): - Norsh > API [Crypto](https://docs.norsh.org/2833956f0.md): - NTP - Norsh Technical Paper [LICENSE-NCL-11](https://docs.norsh.org/805631m0.md): - NTP - Norsh Technical Paper > Published [NTP-1: Norsh Technical Paper Specification](https://docs.norsh.org/ntp/ntp-1.md): - NTP - Norsh Technical Paper > Published [NTP-2: Standards for Encoding, Time and Localization](https://docs.norsh.org/ntp/ntp-2.md): - NTP - Norsh Technical Paper > Published [NTP-3: Cryptography and Hash Specification](https://docs.norsh.org/ntp/ntp-3.md): - NTP - Norsh Technical Paper > Published [NTP-4: Interchangeable Data Standard](https://docs.norsh.org/ntp/ntp-4.md): - NTP - Norsh Technical Paper > Published [NTP-5: Temporal Time-Step Model](https://docs.norsh.org/ntp/ntp-5.md): - NTP - Norsh Technical Paper > Published [NTP-6: Modular Prime Fragmentation](https://docs.norsh.org/ntp/ntp-6.md): - NTP - Norsh Technical Paper > Published [NTP-7: The End of Mining - PoW](https://docs.norsh.org/ntp/ntp-7.md): - NTP - Norsh Technical Paper > Published [NTP-8: The Fallacy of Stake - PoS](https://docs.norsh.org/ntp/ntp-8.md): - NTP - Norsh Technical Paper > Published [NTP-9: The Myth of Absolute Non-Censorship](https://docs.norsh.org/ntp/ntp-9.md): - NTP - Norsh Technical Paper > Published [NTP-10: Structural Failures of Decentralization](https://docs.norsh.org/ntp/ntp-10.md): - NCL - Norsh Commons License [NCL-0: Norsh Commons License](https://docs.norsh.org/ncl/ncl-0.md): - NCL - Norsh Commons License [NCL-1: Attribution Requirement](https://docs.norsh.org/805225m0.md): - NCL - Norsh Commons License [NCL-2: Restricted Commercialization](https://docs.norsh.org/805227m0.md): - NCL - Norsh Commons License [NCL-4: Commercialization with Agreement or Royalties](https://docs.norsh.org/805229m0.md): - NCL - Norsh Commons License [NCL-8: Educational Use Permission](https://docs.norsh.org/805601m0.md): - NCL - Norsh Commons License [NCL-16: Complementary Use and Integration Permission](https://docs.norsh.org/805603m0.md): - NCL - Norsh Commons License [NCL-32: Pre-Approval for Application Publication](https://docs.norsh.org/805608m0.md): - NCL - Norsh Commons License [NCL-64: Restricted or Authorized Derivatives](https://docs.norsh.org/805609m0.md): - NCL - Norsh Commons License [NCL-128: Contribution Terms](https://docs.norsh.org/805626m0.md): - [LICENSE-NCL-11](https://docs.norsh.org/805631m0.md?nav=01JHEJBW2GXV9QK947VQSP3M7V): - Published [NTP-1: Norsh Technical Paper Specification](https://docs.norsh.org/ntp/ntp-1.md?nav=01JHEJBW2GXV9QK947VQSP3M7V): - Published [NTP-2: Standards for Encoding, Time and Localization](https://docs.norsh.org/ntp/ntp-2.md?nav=01JHEJBW2GXV9QK947VQSP3M7V): - Published [NTP-3: Cryptography and Hash Specification](https://docs.norsh.org/ntp/ntp-3.md?nav=01JHEJBW2GXV9QK947VQSP3M7V): - Published [NTP-4: Interchangeable Data Standard](https://docs.norsh.org/ntp/ntp-4.md?nav=01JHEJBW2GXV9QK947VQSP3M7V): - Published [NTP-5: Temporal Time-Step Model](https://docs.norsh.org/ntp/ntp-5.md?nav=01JHEJBW2GXV9QK947VQSP3M7V): - Published [NTP-6: Modular Prime Fragmentation](https://docs.norsh.org/ntp/ntp-6.md?nav=01JHEJBW2GXV9QK947VQSP3M7V): - Published [NTP-7: The End of Mining - PoW](https://docs.norsh.org/ntp/ntp-7.md?nav=01JHEJBW2GXV9QK947VQSP3M7V): - Published [NTP-8: The Fallacy of Stake - PoS](https://docs.norsh.org/ntp/ntp-8.md?nav=01JHEJBW2GXV9QK947VQSP3M7V): - Published [NTP-9: The Myth of Absolute Non-Censorship](https://docs.norsh.org/ntp/ntp-9.md?nav=01JHEJBW2GXV9QK947VQSP3M7V): - Published [NTP-10: Structural Failures of Decentralization](https://docs.norsh.org/ntp/ntp-10.md?nav=01JHEJBW2GXV9QK947VQSP3M7V): - [NCL-0: Norsh Commons License](https://docs.norsh.org/ncl/ncl-0.md?nav=01JHEJC5Y3586Q4M6H1X8VF5R6): - [NCL-1: Attribution Requirement](https://docs.norsh.org/805225m0.md?nav=01JHEJC5Y3586Q4M6H1X8VF5R6): - [NCL-2: Restricted Commercialization](https://docs.norsh.org/805227m0.md?nav=01JHEJC5Y3586Q4M6H1X8VF5R6): - [NCL-4: Commercialization with Agreement or Royalties](https://docs.norsh.org/805229m0.md?nav=01JHEJC5Y3586Q4M6H1X8VF5R6): - [NCL-8: Educational Use Permission](https://docs.norsh.org/805601m0.md?nav=01JHEJC5Y3586Q4M6H1X8VF5R6): - [NCL-16: Complementary Use and Integration Permission](https://docs.norsh.org/805603m0.md?nav=01JHEJC5Y3586Q4M6H1X8VF5R6): - [NCL-32: Pre-Approval for Application Publication](https://docs.norsh.org/805608m0.md?nav=01JHEJC5Y3586Q4M6H1X8VF5R6): - [NCL-64: Restricted or Authorized Derivatives](https://docs.norsh.org/805609m0.md?nav=01JHEJC5Y3586Q4M6H1X8VF5R6): - [NCL-128: Contribution Terms](https://docs.norsh.org/805626m0.md?nav=01JHEJC5Y3586Q4M6H1X8VF5R6): ## API Docs - Norsh > API > Crypto [Generates a public and private key pair](https://docs.norsh.org/v1/crypto/keys.md): This API generates a new **elliptic curve (EC)** key pair using the **secp256r1** (a.k.a. **P-256**) curve. The result includes the **public** and **private** keys in **Base64**, **Hexadecimal**, and **PEM** encodings. These keys can be used for cryptographic signing, identity, and address generation within the **Norsh ecosystem**. - Norsh > API > Crypto [Generates an address from a public key.](https://docs.norsh.org/v1/crypto/address.md): This API generates a unique cryptographic address derived from a provided public key. The address is calculated using the **SHA3-256** hashing algorithm and can be used as an identifier within the Norsh ecosystem.