AEON Security Best Practices
Overview
In addition to the formal security conventions, AEON’s deterministic structure also supports more advanced integrity patterns.
These are not defined as normative conventions in this section, but AEON is structurally well suited to them.
Examples include:
- Merkle-style subtree hashing
- tamper-evident event logs
These patterns are especially relevant for:
- large documents
- append-only histories
- auditability
- selective verification
- agentic AI trace recording
1. Merkle-Style Subtree Hashing
Purpose
Merkle-style hashing allows large AEON documents to be verified partially rather than always hashing the entire document.
This is useful when:
- documents are large
- only one subtree needs verification
- different parts of a document change independently
- proof-oriented verification is needed
Why AEON Supports It Well
AEON already provides the properties needed for subtree hashing:
- canonical paths
- deterministic object structure
- canonical value serialization
- stable hierarchical structure
These make it straightforward to compute hashes for individual subtrees and combine them into a root hash.
Basic Model
Instead of hashing only the whole document, a processor may hash selected subtrees.
Example document:
A processor could compute hashes for:
and then combine them into a root hash.
Conceptually:
Best Practice
1. Use canonical paths as subtree identities
Subtree hashes should always be associated with canonical AEON paths.
Example:
This prevents ambiguity and aligns hashing with AEON’s addressing model.
2. Hash canonical subtree state
Each subtree should be hashed using the same canonicalization discipline as full-document integrity:
- canonical paths
- canonical values
- deterministic ordering
3. Sign only the root hash
If signatures are used, best practice is to sign the final root hash rather than signing each subtree independently.
4. Keep proofs external or envelope-scoped
Merkle proofs may be:
- kept external to the document
- stored in a dedicated envelope extension
- transmitted separately
Avoid mixing proof mechanics directly into ordinary business data unless the use case clearly requires it.
Typical Use Cases
- large datasets
- product manifests
- chunked document verification
- content-addressable archives
- selective disclosure systems
2. Tamper-Evident Event Logs
Purpose
AEON can also represent event histories that are cryptographically chained over time.
This is useful for:
- audit logs
- AI action traces
- system histories
- append-only records
- compliance evidence
Why AEON Supports It Well
AEON’s structure naturally supports event logging because it already has:
- ordered arrays
- canonicalization
- structured records
- deterministic hashing
- an Assignment Event Stream model at the processing layer
This makes it suitable for representing sequences of events whose integrity depends on order.
Important Distinction
There are two different integrity models:
State integrity
Protects the final meaning of a document.
Event integrity
Protects the ordered sequence of events.
These are not the same thing.
A normal signed AEON document uses state integrity. An audit log uses event integrity.
Recommended Representation
For homogeneous event records, use an array.
Example:
This is the recommended pattern when:
- events have broadly similar structure
- order matters
- each event is one record in a sequence
For heterogeneous ordered traces, nodes may be appropriate, but arrays should be preferred for regular event logs.
Best Practice
1. Use arrays for uniform event sequences
Arrays make ordering explicit and are easier to validate and process.
2. Include a prior-hash field
Each event should carry a hash of the previous event or previous sealed state.
Example:
This makes tampering detectable.
3. Hash events in sequence
Unlike document integrity, event-log hashing must preserve event order.
Do not reorder events lexicographically.
4. Seal logs periodically
For long-running logs, it is good practice to periodically add a document-level seal or signature over the current event sequence.
This prevents silent rewriting of the tail.
5. Distinguish log integrity from document integrity
A log document may still use aeon.gp.integrity.v1 for overall document sealing, but the log’s internal trust model should treat event order as part of meaning.
Typical Use Cases
- user activity logs
- workflow approval histories
- AI decision traces
- infrastructure audit trails
- evidence chains
3. Practical Relationship to the Existing Security Model
These patterns fit naturally beside the existing conventions.
Current formal conventions
aeon.gp.security.v1aeon.gp.integrity.v1aeon.gp.signature.v1aeon.gp.encryption.v1
Advanced best-practice patterns
- Merkle subtree hashing
- tamper-evident event logs
This gives AEON a visible path toward:
- partial verification
- large-scale integrity
- historical traceability
without needing to fully standardize those patterns yet.
4. Recommended Spec Framing
I would present them as:
Appendix — Advanced Integrity Patterns (Informative)
with two subsections:
- Merkle-Style Subtree Verification
- Tamper-Evident Event Logs
That wording makes it clear they are:
- supported by AEON’s structure
- good implementation patterns
- not yet formal interoperability conventions
5. Suggested One-Line Summary
AEON’s deterministic paths, canonicalization model, and structured containers make it suitable not only for whole-document signing, but also for advanced integrity patterns such as subtree hashing and ordered tamper-evident logs.
====
Below is a spec-style appendix you could drop into the AEON documentation. It stays informative (non-normative) but clearly shows that AEON supports these patterns.
Appendix — Advanced Integrity Patterns (Informative)
Status
Informative guidance for implementers.
The patterns described in this appendix are not defined as formal interoperability conventions. They are included to demonstrate how AEON’s deterministic structure supports advanced integrity mechanisms such as subtree hashing and tamper-evident event logs.
Future conventions may formalize these patterns.
A.1 Merkle-Style Subtree Verification
A.1.1 Overview
Merkle-style hashing allows integrity verification of subsections of a document without hashing the entire document.
This technique is useful for:
- large documents
- distributed verification
- selective disclosure
- content-addressable storage
- efficient updates to partially modified documents
A.1.2 Why AEON Supports It Well
AEON provides structural properties that make subtree hashing straightforward:
- canonical paths
- deterministic value serialization
- deterministic object ordering
- hierarchical structure
Because each node in an AEON document has a canonical path, a subtree can be hashed independently while maintaining a clear identity.
Example canonical paths:
A.1.3 Example Document
A processor may compute subtree hashes for:
Conceptually forming a tree:
Each node’s hash is derived from the hashes of its children.
A.1.4 Recommended Practice
Implementations that adopt subtree hashing should:
- Use canonical AEON paths to identify subtrees.
- Hash canonical subtree state using the same canonicalization model used for full document integrity.
- Combine child hashes deterministically to produce parent hashes.
- Sign or seal the final root hash if cryptographic verification is required.
Proof structures for subtree verification may be:
- stored externally
- transported alongside the document
- included in an envelope extension if appropriate.
A.1.5 Typical Use Cases
Merkle-style verification is commonly used for:
- very large structured datasets
- chunked document distribution
- distributed storage systems
- partial document verification
- supply-chain manifests
A.2 Tamper-Evident Event Logs
A.2.1 Overview
AEON documents can also represent ordered sequences of events whose integrity depends on chronological order.
Such structures are commonly used for:
- audit trails
- system activity logs
- AI decision traces
- workflow histories
- append-only operational records
Unlike document integrity, which protects the final document state, event-log integrity protects the sequence of events over time.
A.2.2 Event Integrity vs Document Integrity
Two different integrity models exist:
| Model | Purpose |
|---|---|
| Document integrity | Protect final document meaning |
| Event integrity | Protect chronological sequence of events |
AEON’s standard integrity convention (aeon.gp.integrity.v1) is state-based and does not preserve event chronology.
Event logs therefore require a different approach.
A.2.3 Recommended Event Representation
For homogeneous event records, arrays provide the clearest representation.
Example:
Each event references the hash of the previous event.
This creates a hash chain that makes tampering detectable.
A.2.4 Recommended Practice
Implementations should consider the following practices when representing event logs.
Use arrays for homogeneous events
Arrays provide explicit ordering and predictable structure.
Include a prior-hash reference
Each event should reference the previous event’s hash or prior sealed state.
Example:
Preserve chronological order
Event sequences should not be reordered during integrity processing.
Periodically seal the log
Long-running logs should periodically be sealed with a document-level signature or integrity envelope.
This prevents rewriting of the event history.
A.2.5 Typical Use Cases
Tamper-evident event logs are useful for:
- operational auditing
- regulatory compliance
- AI system traceability
- workflow verification
- infrastructure monitoring
A.3 Relationship to AEON Security Conventions
These patterns complement the AEON security conventions.
Formal conventions currently defined include:
aeon.gp.security.v1aeon.gp.integrity.v1aeon.gp.signature.v1aeon.gp.encryption.v1
The patterns described in this appendix demonstrate how AEON’s structure may also support:
- subtree hashing
- partial document verification
- cryptographically chained event histories
Future versions of the AEON specification may introduce additional conventions that formalize these mechanisms.
A.4 Summary
AEON’s deterministic paths, canonicalization model, and structured containers allow it to support advanced integrity mechanisms beyond whole-document signing.
These include:
- Merkle-style subtree verification
- tamper-evident event logs
- partial document integrity proofs
- scalable verification of large structured datasets
These patterns extend AEON’s security capabilities while preserving the minimal design philosophy of the core language.