Skip to main content

An experimental, high-performance cryptographic library using a dynamic network architecture as the key.

Project description

ACN: Artificial Cryptographic Network

PyPI version

ACN is an experimental, high-performance cryptographic library that introduces a novel approach to symmetric-key encryption, inspired by the architectural principles of neural networks. Instead of using a traditional fixed-length bit string as a key, ACN utilizes the entire architecture of a dynamic network as the secret key itself.

This library is designed for performance, leveraging GPU acceleration via CuPy for massively parallel processing, making it suitable for encrypting large volumes of data at high speeds.

Disclaimer: This is an experimental cryptographic library. While it is built on strong cryptographic principles, it has not undergone formal, public cryptographic analysis. Use in production for critical data is not recommended until it has been peer-reviewed by security experts.

Key Concepts

The security of ACN is rooted in a unique blend of modern cryptographic primitives and a dynamic, key-defined structure.

1. Key-as-Architecture

The core innovation of ACN is its keying mechanism. The "key" is not a simple password or a file of bits; it is a comprehensive blueprint that defines a unique cryptographic network. This blueprint specifies:

  • The size of the data blocks to be processed.
  • The internal width of the core processing function.
  • The number of processing rounds (equivalent to layers of security).
  • The unique sequence of mathematical operations within each of the network's "cryptographic neurons."

This results in an astronomical key space, where the secret is the entire algorithm's structure, making brute-force attacks on the key itself practically impossible.

2. Feistel Network Structure

At its highest level, ACN employs a Feistel network, a well-established cryptographic structure used in many proven ciphers (like DES). This structure processes data in rounds, repeatedly applying a non-reversible "F-function" to parts of the data. The Feistel design guarantees that the entire process is fully reversible for decryption, even if the core function is not.

3. The "F-Function" as a Cryptographic Network

The heart of each Feistel round is the F-function. In ACN, this function is a single-layer, parallel cryptographic network. It takes a block of data and processes each part simultaneously through its "cryptographic neurons." Each neuron is a unique sequence of strong cryptographic operations, including:

  • Non-linear Substitution: Using a highly non-linear S-Box (from the AES standard) to create confusion.
  • Bitwise Rotations: To shuffle bit patterns.
  • Modular Arithmetic: To combine bitwise and arithmetic operations, adding complexity.
  • XOR Operations: For fast, secure mixing of data.

4. Key Scheduling

To prevent attacks that exploit repetition across rounds, ACN uses a key scheduling algorithm. It takes a 256-bit master key (stored in the key file) and derives unique subkeys for every operation in every neuron in every round. This ensures that the cryptographic transformation is different at each stage of the process.

5. CTR (Counter) Mode of Operation

To securely encrypt data of any length and enable high-speed parallel processing, ACN uses the Counter (CTR) mode.

  1. A random, single-use number (a "nonce") is generated.
  2. A series of "counter blocks" is created from this nonce.
  3. These counter blocks are encrypted by the Feistel network to produce a high-security keystream.
  4. The plaintext data is simply XORed with this keystream to produce the ciphertext.

This mode is highly secure, prevents patterns in the plaintext from appearing in the ciphertext, and is perfectly suited for GPU acceleration.

Installation

pip install acn-crypto

Note: This library requires an NVIDIA GPU and a working installation of the CUDA Toolkit and CuPy.

Quickstart

from acn import ACN

# 1. Create a new cipher with a specific architecture
#    Architecture: [Block_Size, F_Function_Width, Num_Rounds]
try:
    cipher = ACN(architecture=[32, 16, 24])
except Exception as e:
    print(f"Configuration Error: {e}")
    exit()

# 2. Save the generated key (the network's architecture)
#    PROTECT THIS FILE. It's your secret key.
cipher.save_key("my_secret.key")

# 3. Encrypt data (strings or bytes)
message = "This is a secret message."
encrypted_data = cipher.encrypt(message)
print(f"Encrypted (hex): {encrypted_data.hex()}")

# 4. Decrypt data using a new ACN instance loaded from the key file
decryption_cipher = ACN.from_key_file("my_secret.key")
decrypted_message = decryption_cipher.decrypt(encrypted_data)
print(f"Decrypted: {decrypted_message}")

assert message == decrypted_message

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

acn_crypto-0.5.0.tar.gz (10.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

acn_crypto-0.5.0-py3-none-any.whl (11.9 kB view details)

Uploaded Python 3

File details

Details for the file acn_crypto-0.5.0.tar.gz.

File metadata

  • Download URL: acn_crypto-0.5.0.tar.gz
  • Upload date:
  • Size: 10.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.5

File hashes

Hashes for acn_crypto-0.5.0.tar.gz
Algorithm Hash digest
SHA256 4ea6626aee07f50cf089789bcbe4020abf4403b23987e6c871c64e2df739833c
MD5 391a7925c1b0770153e8e089a1c46442
BLAKE2b-256 a7d22238785452d5aae5cf1e029743dab40ead246a6f1cefc33daf136b6d66c4

See more details on using hashes here.

File details

Details for the file acn_crypto-0.5.0-py3-none-any.whl.

File metadata

  • Download URL: acn_crypto-0.5.0-py3-none-any.whl
  • Upload date:
  • Size: 11.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.5

File hashes

Hashes for acn_crypto-0.5.0-py3-none-any.whl
Algorithm Hash digest
SHA256 762395d70317fba95735528bc461ba8373782adaf37c370c6dea23f30885ec7c
MD5 ab69dcab11f144d285464e6bac64103d
BLAKE2b-256 28971094d9130ef83a83241250612094a9fd45e641852179db397b70625b4e4e

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page