ZelEn MTE-PQ5

MTE makes the private key alone insufficient.

Morphological Topos Encryption, or MTE, is one of the most powerful ideas inside ZelEn.

Normal encryption asks Can the data be decrypted with the private key?
MTE asks Should this encrypted object even be reconstructed into a decryptable form?

That is the breakthrough. ZelEn PQ5 protects the ciphertext. ZelEn MTE governs the object.

With MTE, an encrypted file is no longer just a random blob of ciphertext. It becomes a governed encrypted object. The data remains protected by post-quantum cryptography, but the object also requires a private morphic reconstruction datum before it can reach the decryption stage.

That datum is called τ.

What Is MTE?

Morphological Topos Encryption is an optional governed-object layer built into the ZelEn encryption architecture.

MTE does not replace ZelEn’s existing cryptography. It does not replace ML-KEM, ML-DSA, AES-256-GCM, Argon2id, the ZELEN container, or fail-closed authentication.

Instead, MTE sits around the already encrypted object.

PQ5 is the lock. MTE is the governed structure around the locked object.

The encrypted payload is still protected by standard post-quantum encryption. MTE adds a second layer of control by requiring the encrypted object to be reconstructed through an authorized τ datum before normal decryption can proceed.

The Simple Explanation

Traditional encryption Encrypted file + private key = decryption attempt
ZelEn MTE Encrypted file + private key + τ datum + valid policy + valid reconstruction = decryption attempt

MTE separates two powers that are normally treated as one: cryptographic authority and reconstruction authority. The .zkey file provides cryptographic authority. The .ztau file provides reconstruction authority. Without both, the MTE-protected object cannot be decrypted.

Why MTE Exists

Most encryption systems treat the encrypted file as a simple blob. Once the file is encrypted, it sits there waiting for someone with the private key.

If the private key is stolen, copied, exposed, or misused, the encrypted object becomes immediately vulnerable.

MTE changes that model. With MTE, the encrypted object is stored as a morphic governed structure. It must be reconstructed correctly before the cryptographic decryption stage can even begin.

Correct τ datum
Correct reconstruction policy
Intact object structure
Valid MTE envelope
Passing PQ5 authentication

This creates governed decryptability.

Governed Decryptability

Governed decryptability means the encrypted object must pass through a controlled reconstruction process before plaintext can ever be released.

Normal encryption says: if you have the key, try to decrypt.

MTE says: before the key can even be useful, the object must be reconstructed correctly.

The private key is no longer the entire event. The object itself has a second private condition: τ.

What Is τ?

τ is the private morphic reconstruction datum used by ZelEn MTE. It can be understood as the hidden structural map required to reconstruct the encrypted object.

tau model
τ = cover_selector, decoding_seed, local_section_map, reconstruction_policy
cover_selectorDecides how the encrypted object is divided into governed sections.
decoding_seedHelps control the deterministic reconstruction path.
local_section_mapDescribes how encrypted sections relate to the canonical encrypted body.
reconstruction_policyDefines the rules that must be satisfied before reconstruction is allowed.
alice.zkeyPrivate key bundle
alice.zpubPublic key bundle
alice.ztauPrivate MTE reconstruction datum

The .ztau file must be protected. It should not be shared publicly, uploaded to GitHub, sent casually, or treated like a public key.

How MTE Works

First, PQ5 encryption

  • ML-KEM-1024 establishes the shared secret.
  • The key schedule derives encryption and authentication material.
  • AES-256-GCM encrypts the payload.
  • The ZELEN container header is built.
  • The ZELC marker is placed at 0x7D.
  • Authentication tags and optional ML-DSA signatures are applied.

Then, MTE begins

  • MTE takes the encrypted body and applies a governed structural transform.
  • The ciphertext body is divided into morphic sections.
  • Those sections are arranged through τ-controlled mapping.
  • The MTE envelope stores the governed structure.
  • The final output is an MTE-governed .zelen object.

On decryption, ZelEn verifies the container, verifies the MTE envelope, requires the correct .ztau datum, reconstructs the canonical encrypted body, and only then proceeds with normal PQ5 decryption. If reconstruction fails, ZelEn fails closed.

MTE Encryption Flow

Plaintext PQ5 encryption Authenticated ciphertext MTE section transform τ-governed morphic envelope .zelen object

MTE Decryption Flow

.zelen object Verify ZELEN container Verify ZELC marker Load τ Reconstruct encrypted object Run PQ5 decryption Verify authentication Release plaintext

Why the Private Key Alone Is Not Enough

In normal encryption, the private key is the main authority. If someone steals the private key and knows the passphrase, the encrypted object can usually be decrypted.

With MTE, that is not enough.

The private key can only decrypt the correctly reconstructed encrypted body. But the MTE object is not stored in that canonical form.

The key opens the lock. The τ datum assembles the locked object. Without τ, the key has nothing correctly assembled to open.

What Problem MTE Solves

MTE solves the private-key-only decryption problem. It adds a new control layer to encrypted objects.

Stolen private keys without matching τ
Unauthorized reconstruction attempts
Morphic object tampering
Policy bypass around encrypted objects
Blind encrypted archive abuse
Structural manipulation of encrypted containers
Overreliance on one secret
Loss of governance after encryption

MTE makes encrypted objects harder to misuse because the object is not just locked. It is governed.

MTE Is Not Security by Obscurity

MTE is designed so that ZelEn confidentiality does not depend on hiding the idea of MTE. Even if the MTE design is public, the plaintext remains protected by ZelEn PQ5.

ML-KEM-1024 ML-DSA-87 AES-256-GCM Argon2id Authenticated headers ZELC marker validation Fail-closed decryption

MTE adds governed reconstructability on top. Even if someone understands the MTE design, they still need the correct τ datum, private key, passphrase, object, and all authentication checks must pass.

MTE and Quantum Safety

PQ5protects against quantum cracking
MTEcontrols object reconstruction
Togetherquantum-safe encryption + governed decryptability

MTE does not beat quantum attacks by itself. The quantum-safe layer is ZelEn PQ5. The attacker must face both the cryptographic wall and the reconstruction wall.

MTE File Types

FilePurposeHandling
.zkeyPrivate key bundle protected by Argon2id. Used for cryptographic decryption and signing.Private
.zpubPublic key bundle. Used for encryption and verification.Safe to share
.ztauPrivate MTE reconstruction datum required for MTE-governed objects.Private
.zelenEncrypted object container. Can hold standard PQ5 or MTE-governed encrypted objects.Encrypted object
.sigDetached ML-DSA signature.Signature artifact

The important distinction: .zkey is not enough for MTE. .ztau is not enough by itself. MTE requires the correct combination.

MTE Command Examples

mte commands
# Generate an MTE identity
zelen keys generate --subject [email protected] --name Alice --suite mte-pq5 --out alice

# Creates: alice.zkey, alice.zpub, alice.ztau

# Encrypt a file with MTE
zelen encrypt file --recipient alice.zpub --tau alice.ztau --suite mte-pq5 --input secret.pdf --out secret.mte.zelen

# Decrypt a file with MTE
ZELEN_PASS=mysecret zelen decrypt file --key alice.zkey --tau alice.ztau --passphrase-env ZELEN_PASS --input secret.mte.zelen --out recovered.pdf

# Inspect an MTE object
zelen inspect secret.mte.zelen

Expected inspection output includes

Magic: ZELEN Suite: MTE-PQ5 Security tier: 5 ZELC marker: present at 0x7D MTE envelope: present Payload mode: morphic envelope Fail-closed: yes

What Happens If Something Is Wrong?

MTE is fail-closed. If anything is wrong, ZelEn rejects the operation.

Missing .ztau
Wrong .ztau
Expired .ztau
.ztau bound to a different key
MTE envelope missing
MTE section map corrupted
Section digest mismatch
Wrong reconstruction policy
Tampered morphic body
Bad AES-GCM tag after reconstruction
Wrong private key
Wrong passphrase

No plaintext is released. No partial decrypt is returned. No attacker-helpful error path is exposed. The object fails closed.

MTE vs Normal Encryption

Normal encryption

  • The encrypted file is a ciphertext blob.
  • The private key is the main authority.
  • If the key is valid, decryption can be attempted.
  • Object structure usually does not matter.
  • Governance lives outside the encrypted file.

ZelEn MTE

  • The encrypted file is a governed object.
  • The private key is not enough.
  • τ reconstruction is required.
  • The object must be structurally valid.
  • Governance is built into the encrypted-object lifecycle.

MTE vs Access Control

MTE is not ordinary access control. Access control usually happens outside the encrypted object: a server checks your login, a policy engine checks your permissions, or a KMS decides whether to release a key.

MTE makes the encrypted object itself require governed reconstruction. It does not replace IAM, KMS, DLP, SIEM, or policy engines. It complements them by bringing governance closer to the encrypted object itself.

MTE vs Double Encryption

MTE is not double encryption. Double encryption means encrypting ciphertext again with another encryption layer.

MTE structurally transforms the already encrypted object into a morphic envelope that must be reconstructed before decryption. The goal is not simply more encryption. The goal is governed reconstructability.

MTE in One Analogy

Imagine a locked safe. Normal encryption gives you the safe and the key. If the key is correct, you can open the safe.

MTE changes the safe into a governed machine. Before the keyhole is even reachable, the safe must be assembled into the correct shape using τ. Without τ, the keyhole is not correctly exposed.

The key opens the lock. τ assembles the object. Policy permits reconstruction.

Why This Matters

The post-quantum era will not only require stronger algorithms. It will require better encrypted-object governance.

Encrypted archives
Auditability
Tamper rejection
Inspectable containers
Policy-bound objects
Protection when one secret is exposed

MTE moves ZelEn toward that future: not just encryption, but governed post-quantum object security.

The Core Statement

ZelEn PQ5 protects ciphertext.

ZelEn MTE-PQ5 governs the object.

MTE introduces governed decryptability: the ciphertext remains protected by post-quantum encryption, but the encrypted object cannot reach the cryptographic decryption stage unless its morphic structure is reconstructed through the authorized τ datum.

Short Website Hero Copy

MTE makes the private key alone insufficient.

Morphological Topos Encryption transforms encrypted data into a governed object that must be reconstructed through τ before decryption can begin.

It is not a replacement for PQ5. It is the morphic envelope around the locked object.

Short Marketing Block

Private key stolen?

With normal encryption, that can be catastrophic. With ZelEn MTE, the private key alone is not enough.

No τ. No reconstruction. No plaintext.

Feature Cards

Governed Decryptability

MTE separates cryptographic decryption from object reconstruction. The key decrypts, but τ reconstructs.

Private Key Alone Is Not Enough

An MTE object cannot reach the decryption stage unless the correct .ztau datum is present.

Post-Encryption Morphic Envelope

MTE wraps an already encrypted PQ5 payload. It does not replace the cryptographic lock.

Fail-Closed by Design

Wrong τ, missing τ, corrupted envelope, or tampered sections cause rejection before plaintext is released.

Built for Object Security

MTE treats encrypted files as governed objects, not anonymous blobs.

Quantum-Safe Foundation

MTE sits on top of ZelEn PQ5, using ML-KEM-1024, ML-DSA-87, AES-256-GCM, and Argon2id.

FAQ

What does MTE stand for?

MTE stands for Morphological Topos Encryption.

Is MTE a replacement for encryption?

No. MTE is not a replacement for encryption. ZelEn still uses PQ5 cryptography for the core protection. MTE is an optional governed-object layer around the encrypted payload.

Does MTE make ZelEn quantum-safe?

ZelEn’s quantum safety comes from PQ5, using post-quantum cryptography such as ML-KEM and ML-DSA. MTE adds governed reconstructability on top.

What is τ?

τ is the private morphic reconstruction datum required to reconstruct an MTE-protected encrypted object.

What is a .ztau file?

A .ztau file stores the private τ datum used by MTE. It is required to reconstruct MTE-governed encrypted objects.

Can I share .ztau?

No. Treat .ztau like sensitive private material. It should not be shared publicly.

Can I decrypt an MTE object with only .zkey?

No. With MTE, the private key alone is not enough. You need the matching .ztau datum.

What happens if someone tampers with an MTE object?

ZelEn rejects it. The system fails closed and releases no plaintext.

Does MTE break existing ZelEn commands?

No. MTE is an optional layer. Standard PQ3, PQ5, and PQ5-SLH workflows continue to work normally.

What is the simplest way to describe MTE?

Encryption locks the data. MTE governs the locked object.

MTE is the next layer of encrypted-object thinking.

It does not ask only whether data is encrypted. It asks whether the encrypted object is authorized to become decryptable.

That is the heart of governed post-quantum object security.

ZelEn PQ5 protects ciphertext. ZelEn MTE-PQ5 governs the object.

Built with 💛 by Haja Mo.