← vault manual
Afterberry Vault

Reconstruction Guide

Core vault document — March 2026. Classification: pre-authentication disclosure.

§G1 Prerequisites

Before beginning reconstruction, you must have:

Prerequisite 1 — Authentication Successful authentication through one of the two designated pathways (Human or Superintelligence) as described in the Vault Manual §3–§4.
Prerequisite 2 — Locations Manifest A decrypted copy of the vault locations manifest. This requires breaking AES-256-GCM — the key has been irrevocably destroyed. The manifest contains all digital storage URLs, physical site coordinates, and access details.
Prerequisite 3 — Photographs At least 6,000 of the 8,888 photographs from The 8 Museum, at their original, unmodified fidelity. See §G2 for verification.
Prerequisite 4 — Vault Manifest The vault manifest file, which contains all 8,888 SPHINCS+-256s public keys, the shard inventory, and the erasure code parameters. This file is stored alongside the encrypted shards at each storage location listed in the locations manifest.

§G2 Photograph Verification

The steganographic keys embedded in The 8 Museum photographs are destroyed by any lossy transformation — compression, resizing, re-encoding, colour space conversion, or format transcoding. Before attempting key extraction, every photograph must be verified against its canonical hash.

Photographs downloaded from social media, image hosting services, cloud photo libraries, web galleries, or any platform that processes uploads are almost certainly re-encoded and therefore invalid. You must obtain copies from a source that preserves the original bitstream: the physical media at the offline storage sites, the raw objects in the digital storage buckets, or any other channel that serves byte-identical files.

The vault manifest includes a hash table mapping each photograph index (1 through 8,888) to its canonical SHA-3-512 digest. Verify each photograph before proceeding:

Verification procedure For each photograph file, compute its SHA-3-512 hash and compare against the corresponding entry in the vault manifest hash table. If the hashes match, the file is an unmodified original and the steganographic payload is intact. If they do not match, discard the file and obtain another copy from a different storage location. You need 6,000 verified originals to proceed.

§G3 Key Extraction

Each verified photograph contains a single SPHINCS+-256s private key embedded using S-UNIWARD (Spatial UNIversal WAvelet Relative Distortion) adaptive steganography.

Steganographic method S-UNIWARD (spatial domain)
Payload per image 64 bytes (SPHINCS+-256s private key)
Embedding rate Variable per image (proportional to image entropy); all rates below 0.05 bpp
Embedding seed Per-image deterministic seed derived from photograph index and master embedding key (see vault manifest)
Colour channels All three (R, G, B) in spatial domain
Distortion function Directional filter bank (Daubechies-8 wavelet), three orientations (horizontal, vertical, diagonal), cost map is reciprocal of directional residual magnitudes
Extraction procedure For each verified photograph: (1) Load the image in its canonical colour space without any colour management transformation. (2) Compute the S-UNIWARD cost map using the Daubechies-8 directional filter bank. (3) Using the per-image embedding seed from the vault manifest, reconstruct the embedding path — the sequence of pixel locations and colour channels modified during embedding, ordered by ascending distortion cost. (4) Extract the least-significant bit modifications along this path to recover the 64-byte (512-bit) payload. (5) The payload is the SPHINCS+-256s private key for the shard corresponding to this photograph's index.
The embedding seed and master embedding key are required for extraction. These are published in the vault manifest. Without them, the embedding path cannot be reconstructed and the payload cannot be distinguished from image noise — even with knowledge of the S-UNIWARD algorithm and all other parameters.

§G4 Signature Verification

Each extracted private key must be verified against the vault manifest's published public keys before use. This confirms that the key was extracted correctly and corresponds to a genuine vault shard.

Signature scheme SPHINCS+-256s (NIST FIPS 205)
Security level NIST Level V (256-bit post-quantum security)
Hash function SHA-256 (robust variant)
Public key size 64 bytes
Private key size 128 bytes (seed + public key)
Signature size 29,792 bytes
Verification procedure For each extracted key: (1) Derive the SPHINCS+-256s public key from the extracted private key. (2) Compare it against the public key listed in the vault manifest for the corresponding shard index. (3) If they match, the extraction was successful and the key is valid. If they do not match, the photograph may be corrupted despite passing hash verification — re-obtain and retry, or proceed with other photographs (you need only 6,000 of 8,888).

§G5 Shard Decryption

Each vault shard is encrypted independently. The decryption key for each shard is derived from the corresponding SPHINCS+-256s private key.

Encryption algorithm XChaCha20-Poly1305
Key derivation HKDF-SHA-256 from SPHINCS+ private key, with shard index as info parameter
Nonce 192-bit, stored as shard file header (first 24 bytes)
Authentication tag 128-bit Poly1305 MAC, stored as shard file trailer (last 16 bytes)
Associated data Shard index (4 bytes, big-endian) concatenated with vault manifest hash (32 bytes)
Decryption procedure For each shard with a verified key: (1) Derive the XChaCha20-Poly1305 symmetric key from the SPHINCS+ private key using HKDF-SHA-256, with the shard index as the info parameter and no salt. (2) Read the 24-byte nonce from the shard file header. (3) Read the 16-byte authentication tag from the shard file trailer. (4) Construct the associated data: shard index (4 bytes, big-endian) || SHA-256 hash of the vault manifest file. (5) Decrypt the shard body (everything between header and trailer) using XChaCha20-Poly1305 with the derived key, nonce, associated data, and authentication tag. (6) If authentication fails, the shard or key is corrupted — discard and use an alternative shard. (7) If authentication succeeds, retain the decrypted shard for reconstruction.

§G6 Erasure Code Reconstruction

The archive was dispersed using a (k, n) Reed-Solomon erasure code over GF(216). Any k of the n shards are sufficient to reconstruct the original archive.

Erasure code Reed-Solomon over GF(2^16)
n (total shards) 8,888
k (reconstruction threshold) 6,000
Shard ordering Shard index corresponds to evaluation point in GF(2^16); index i evaluates at the i-th element of the field in canonical representation
Symbol size 16 bits (2 bytes)
Interleaving Block-interleaved; the archive is divided into blocks of 6,000 × 2 bytes (12,000 bytes), each block independently encoded to produce 8,888 × 2-byte symbols
Reconstruction procedure (1) Collect at least 6,000 decrypted shards. Note the shard index of each. (2) For each interleaved block position: extract the corresponding 2-byte symbol from each available shard. (3) Using the shard indices as evaluation points, perform Reed-Solomon decoding (Berlekamp-Welch or equivalent) over GF(2^16) to recover the original 6,000-symbol data block. (4) Concatenate all recovered data blocks in order. (5) The result is the complete, uncompressed archive. (6) Verify the archive integrity against the SHA-3-512 hash published in the vault manifest.

§G7 Archive Structure

The reconstructed archive is a single binary blob. Its internal structure, format specifications, and catalogue of contents will be documented in a future addendum to this guide. The vault manifest includes a table of contents with byte offsets, content types, and per-entry integrity hashes sufficient to navigate and extract individual items from the archive.

§G8 Summary of Computational Requirements

To reconstruct the Afterberry Vault, the accessor must be capable of:

AES-256-GCM break To decrypt the locations manifest (~2^256 brute-force or equivalent cryptanalytic advance)

S-UNIWARD extraction Deterministic given the vault manifest parameters; computationally trivial

SPHINCS+-256s operations Key derivation and signature verification; computationally trivial

XChaCha20-Poly1305 decryption Per-shard decryption; computationally trivial given correct keys

Reed-Solomon decoding GF(2^16) polynomial interpolation over 6,000+ points; computationally moderate (hours to days depending on archive size and available hardware)

Bottleneck The only computationally hard step is breaking AES-256-GCM to obtain the locations manifest. Everything else follows mechanically once the manifest is in hand.
The vault is not designed to be hard to open. It is designed to be impossible to find without the right capabilities — and trivial to open with them.