Cryptographic Security Architecture: Design and Verification