Your university signed it.
Now anyone can check.

Degrees and transcripts get a cryptographic signature at the point of issue. Employers drop in the PDF — four checks run, done.

Sign in

The process

No trust required.

The registrar uploads a PDF.

We hash it, sign it with the institution’s private key, and get a timestamp from an independent authority. The registrar never touches the key.

The graduate keeps the signed file.

It sits in their dashboard. They can download it, email it, or hand someone a verification link. The proof is baked into the document itself.

Anyone can check it.

Drop in the PDF or paste the document ID. Four checks run — integrity, authority, revocation, timestamp. A few seconds, no phone calls, no middleman.

Verification

Four checks,
every single time.

Is the signature intact? Is the institution real? Has it been revoked? Does the timestamp check out? If anything is off, you know immediately.

RSA-4096SHA-256RFC 3161
verify.acadcert.com
Bachelor_of_Science.pdf
Uploaded just now
Document integrity
Issuing authority
Revocation status
Timestamp proof
Credential verified

Under the hood

Nothing is trusted by default.

No passwords anywhere in the system. Login is a hashed one-time code. Every private key is encrypted at rest and only decrypted in memory during signing.

RSA-4096

Each institution gets its own keypair. When keys rotate, old public keys stay so historical documents still verify.

AES-256-GCM

Private keys encrypted with a unique salt per institution. Never written to disk in plaintext, never sent over the wire.

SHA-256

Change one byte in the PDF and the hash is completely different. Tampering is mathematically obvious.

RFC 3161

A third-party timestamp authority confirms when the document was signed. We don’t control that clock — no one does.

Ready to issue
tamper-proof credentials?

If your institution is already on AcadCert, sign in. If not, reach out and we’ll get you set up.

Privacy·Terms·FAQ·Contact© 2026 AcadCert