Sov · Research The N-Helix

Geometric Identity Architecture for Sovereign Computation
DNA, Warrants, and the Thermodynamic Authorization Model

N
Helix Strands
768D
Semantic Space
3D
Spatial Projections
e−λt
Warrant Decay
HN
Hash Chain
θ
SAGE Threshold

Abstract

We present the N-Helix, a geometric identity primitive for sovereign computation. Every entity in Sov — every query, every action, every agent session — is encoded as a Wisp: a living cell carrying an N-strand DNA.

The DNA holds the entity's semantic meaning (high-dimensional vector), spatial projection (3D execution coordinates), and cryptographic authorization (a thermodynamic warrant). This paper describes the mathematical structure, the phase transitions between Intent and Act, and the decay dynamics that make every authorization finite.

1. The Wisp Identity Cell

The Wisp is the fundamental unit of identity. It moves through the sovereignty stack like a white blood cell through the body: created at Logos, verified by SAGE, authorized by Knox, and executed in Aegis.

Fig. 1 — Wisp lifecycle. Birth at Logos, governance traversal through SAGE, Knox authorization, Aegis execution. Opacity = warrant validity.

A Wisp carries three things: a birth timestamp (genesis_t0), a biometric locality-sensitive hash (biometric_lsh), and the geometric payload — the DNA.

2. DNA: The N-Helix

2.1 Strand Architecture

The original triple helix is preserved, but the N-Helix generalizes to arbitrary named strands with distinct engine consumers.

StrandTypeEngineDimension
SemanticVec<f32>SAGE gravity768D
SyntacticVec<[f32; 3]>Aegis spatial execution3D per point
TelomereWarrantKnox authorizationScalar decay
CustomRaw(Vec<u8>)Domain-specificVariable
DNA = { si : Strand  |  si ∈ {Semantic, Spatial, Contract, Raw} }(1)
Fig. 2 — N-Helix structure. Purple = semantic strand. Green = syntactic strand. Red = telomere with decay pulse.

2.2 Narrative Mass

The semantic strand encodes meaning as a high-dimensional vector. Its L2 norm — the narrative mass — determines governance friction.

mnarrative = ‖ ssemantic2 = √(Σ xi²)(2)

Higher mass means more friction across SAGE. Dense payloads push harder through the field.

Fig. 3 — Narrative mass field. Larger mass means larger radius and slower traversal through governance density.

3. The Musashi Warrant

3.1 Thermodynamic Authorization

The warrant is the telomere of DNA. It converts inert Intent into executable Act.

Kill1: uses_remaining = 0     (chain exhaustion)
Kill2: V(t) ≤ θsage     (temporal decay) (3)

3.2 Validity Decay

Warrant validity decays exponentially from mint time:

V(t) = mtoken · e−λ · Δt    where    Δt = t − t0(4)
Fig. 4 — Warrant validity decay with multiple lambda values and threshold boundary.

3.3 The Hash Chain

The second kill condition is thermodynamic chain exhaustion:

HN(secret) → HN-1(secret) → … → H0(secret) = exhausted(5)
Fig. 5 — Hash chain burn visualization.

4. Phase Transitions

A Wisp exists in two phases:

PhaseConditionEnergyMetaphor
IntentNo valid warrantPotentialUnlit match
ActValid warrant and uses remainKineticBurning match
is_act(t, θ) = (uses_remaining > 0) ∧ (V(t) > θsage)(6)
Fig. 6 — Phase space with threshold crossing from Act to Intent.

5. The Half-Hash Identity

The warrant binds biological identity through dual hemispheres:

HemisphereHash TypeProperty
RigidBLAKE3 (cryptographic)Any bit change = imposter detected
ProbabilisticLSH (locality-sensitive)Physically close inputs produce close hashes

6. Implementation

The N-Helix is implemented in Rust across three files:

FileLinesContents
a_lexicon/src/dna.rs273DNA struct, Strand enum, N-Helix builder, narrative mass
a_lexicon/src/warrant.rs186Warrant struct, validity decay, hash chain, kill conditions
a_lexicon/src/wisp.rs143Wisp identity cell, lifecycle delegates

No external dependencies. BLAKE3 for hashing. Serde for serialization. Zero allocation on the hot path.

§

Mirror · Sov Research Papers
The N-Helix — Geometric Identity Architecture
← Back to Mirror