XSOC Corp Validated P2PE

XSOC Validated P2PE

Multi-gateway validated P2PE without shared root key. Live API for processor evaluation.

What this is

This is the live deployment of the XSOC validated P2PE solution architecture. It exposes an HTTP API surface that demonstrates the architectural property no current PCI-listed P2PE solution can claim: a single point of interaction can route encrypted account data to multiple decryption environments, in real time, with cryptographic isolation between them. No shared root key. No re-injection. No cleartext re-encryption hop.

This service is wired into the same XSOC NIE-Go identity backbone that authenticates every public XSOC deployment. Authentication, attestation, scoped action tokens, and three-channel revocation are all governed by the production NIE-Go gateway at nie.xsoccorp.com.

Four properties you can validate from your own machine

  1. Multi-gateway derivation isolation. One POI enrolled into two gateways produces two cryptographically distinct session keys.
  2. Pre-encryption route selection. Gateway selection completes before the POI derives a session key. The session key is bound cryptographically to the chosen gateway.
  3. Cross-gateway decryption rejection. Ciphertext bound for gateway alpha cannot be decrypted at gateway beta, even when both are inside the same Solution Provider audit scope.
  4. Three-channel revocation. A revocation event invalidates every prior session token across the fabric in real time. Validation requires a NIE-Go scoped action token.

Quick start

The fastest path to evaluation is the bash test harness. It walks the full demonstration and prints labeled OK or FAIL for each property. Requires curl and jq.

curl -fsSL https://p2pe.xsoccorp.com/test.sh | bash -s -- https://p2pe.xsoccorp.com

Or, exercise individual endpoints directly. Two demo gateways (gw_alpha and gw_beta) are pre-enrolled, so you can begin testing immediately. Properties one through three require no authentication.

# Enroll a POI (gets independent enrollment secrets per gateway)
curl -X POST https://p2pe.xsoccorp.com/p2pe/v1/poi/enroll \
  -H "Content-Type: application/json" \
  -d '{"poi_id":"poi_eval_001"}'

# Encrypt PAN bound for gateway alpha
curl -X POST https://p2pe.xsoccorp.com/p2pe/v1/encrypt \
  -H "Content-Type: application/json" \
  -d '{"poi_id":"poi_eval_001","gateway_id":"gw_alpha","pan":"4111111111111111"}'

# Try to decrypt at gateway beta (will return 403)
curl -X POST https://p2pe.xsoccorp.com/p2pe/v1/decrypt \
  -H "Content-Type: application/json" \
  -d @decrypt-attempt.json

Auth model

Properties one through three are open. Property four (revocation) requires a ScopedActionToken issued by the XSOC NIE-Go gateway. The token binds:

To request a token for evaluation use, contact ssaddigh@xsoccorp.com. Tokens are issued by the same fabric that authenticates every other public XSOC service. The reference does not maintain its own admin credential.

Reference materials

What this reference does not claim

DSKAG, QSIG, and SP-VERSA are XSOC trade-secret primitives. They are stubbed in this reference using HKDF-SHA256, HMAC-SHA256, and AES-256-GCM respectively. The API contract and protocol flow are identical between the reference and production. The cryptographic security properties of the reference are those of the underlying public primitives. Production-grade properties are documented in the controlled-distribution Executive Validation Report under separate NDA, ECCN 5D002.C1.

Validation lineage

The cryptographic claims behind the production primitives are anchored in independent academic audit and statistical validation. Perrin and Biryukov audits in 2020 and 2024 of the legacy cryptosystem predating DSKAG. Cal Poly San Luis Obispo Dieharder v3.31.1 entropy validation at 99.4 percent aggregate across 98 tests. GMU SENTINEL FP5223 full report scheduled June 2026. FIPS 140-3 CMVP submission targeted Q3 2026. XSOC-NIE-GUARD published at Zenodo DOI 10.5281/zenodo.19685360 v2. XSOC-QSIG specification at DOI 10.5281/zenodo.19639166.

Operational rights

XSOC will be the listed Solution Provider on the PCI Security Standards Council P-ROV. Operational rights to the validated solution are licensed through a structured process. Initial bidder briefings are open. Direct inquiries to ssaddigh@xsoccorp.com.

XSOC Corp, 16400 Bake Parkway, Irvine CA 92618. CAGE 8ZXJ8 · UEI G1R1NKS81NF5 · ECCN 5D002.C1 · Non-Traditional Defense Contractor. Reference distribution under NDA. Trade-secret notice in the LICENSE file of the source repository.