Post-quantum cryptographic framework with fractal encoding and semantic keys - resistant to quantum attacks
Project description
CSF-Crypto: Post-Quantum Cryptographic Security Framework
CSF-Crypto is a military-grade, post-quantum cryptographic system that integrates fractal geometry with semantic keys to provide unprecedented security against both classical and quantum attacks.
What is CSF-Crypto?
CSF-Crypto (Cryptographic Security Framework) is a revolutionary encryption protocol that combines:
- Post-Quantum Cryptography: NIST PQC standards (CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+)
- Fractal Encoding: Messages encoded into Julia set parameters for unique geometric signatures
- Semantic Keys: Text-derived numerical vectors adding a contextual security layer
- Constant-Time Operations: Side-channel attack protection built-in
Unlike traditional cryptography (RSA, AES), CSF-Crypto is designed from the ground up to resist both Shor's and Grover's quantum algorithms while maintaining the simplicity of standard cryptographic libraries.
Key Features
🔒 Quantum-Resistant Security
- Implements complete NIST PQC standards (FIPS 203, 204, 205)
- Dual-layer key system: mathematical + semantic keys
- Resistant to Shor's algorithm (key exchange) and Grover's algorithm (search attacks)
🌐 Fractal-Based Encoding
- Messages encoded into dynamic fractal structures (Julia sets)
- Each encryption generates a unique fractal signature
- Visual and cryptographic authentication through fractal fingerprints
🎯 Military-Grade Protection
- Constant-time operations throughout
- Secure memory wiping
- Comprehensive input validation
- Side-channel attack resistant
💻 Developer-Friendly API
Works exactly like standard cryptographic libraries:
from csf import FractalCryptoSystem
from csf.core.keys import KeyManager
# Initialize
crypto = FractalCryptoSystem()
key_manager = KeyManager()
# Generate keys
public_key, private_key = key_manager.generate_key_pair()
# Encrypt
message = "Secret message"
encrypted = crypto.encrypt(message, "semantic_key", public_key, private_key)
# Decrypt
decrypted = crypto.decrypt(encrypted, "semantic_key", private_key)
print(decrypted) # "Secret message"
Installation
Standard Installation
pip install csf-crypto
With Post-Quantum Cryptography Support
Note: CSF-Crypto includes built-in fallback implementations of NIST PQC algorithms. The optional [pqc] extra is currently empty as external PQC libraries may not be available on PyPI. CSF works perfectly without these extras - all PQC functionality is included by default with internal implementations.
# Standard installation (includes all PQC features)
pip install csf-crypto
CSF includes internal implementations of CRYSTALS-Kyber, CRYSTALS-Dilithium, and SPHINCS+ algorithms, so no additional packages are required for post-quantum cryptography functionality.
Development Installation
pip install csf-crypto[dev]
Use Cases
- Secure Communications: Encrypt messages with quantum-resistant algorithms
- Digital Signatures: Generate and verify fractal-based signatures
- Key Exchange: Post-quantum key exchange using lattice cryptography
- IoT Security: Lightweight but robust encryption for embedded systems
- Blockchain: Fractal signatures for transaction verification
Technical Specifications
- Python: 3.9+
- Dependencies: numpy, scipy, matplotlib
- Post-Quantum Standards: CRYSTALS-Kyber (FIPS 203), CRYSTALS-Dilithium (FIPS 204), SPHINCS+ (FIPS 205)
- Security Level: Up to 256-bit post-quantum security
Architecture
CSF-Crypto uses a modular architecture:
- Core: Lattice-based cryptography, key management, randomness generation
- Crypto: Encryption, decryption, signing, verification
- Fractal: Julia set encoding/decoding, fractal signature generation
- Semantic: Text-to-vector transformation, semantic key derivation
- PQC: Post-quantum cryptography implementations (Kyber, Dilithium, SPHINCS+)
- Security: Constant-time operations, side-channel protection, validation
Why CSF-Crypto?
Traditional encryption methods (RSA, ECC) are vulnerable to quantum computers. CSF-Crypto provides:
- Future-Proof: Designed for the quantum computing era
- Unique Approach: Only system combining fractals + semantics + post-quantum
- Proven Standards: Based on NIST-approved algorithms
- Easy Integration: Simple API, works like any cryptographic library
Documentation
- Quick Start: See examples in the GitHub repository
- Full Documentation: Complete usage guide and API reference
- Whitepaper: Technical details and cryptographic specifications
Inventor
Jeremy Noverraz (1988 - 2025) based on an idea by Ivàn Àvalos AND JCZD (engrenage.ch)
License
This project is provided for private/government use.
Project Links
CSF-Crypto: The next generation of cryptographic security, combining mathematics, geometry, and language to transcend the limits of classical and quantum computation.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file csf_crypto-1.0.12.tar.gz.
File metadata
- Download URL: csf_crypto-1.0.12.tar.gz
- Upload date:
- Size: 43.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1d0f503d64772bfeab97f28a24062a703f79faf2659b4a7be28b5d98ae5a37ea
|
|
| MD5 |
34634e97e87d7b85eb6788e02530e299
|
|
| BLAKE2b-256 |
87e4a9cbd49cae356ee31ef0e16a07c2d7ac63f675a02a5da5a46ee8a7021f48
|
File details
Details for the file csf_crypto-1.0.12-py3-none-any.whl.
File metadata
- Download URL: csf_crypto-1.0.12-py3-none-any.whl
- Upload date:
- Size: 49.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
6e322ba08e2a2ea888ec488117203527efffa0d6e3ae73c55ad2b975bc0b2f63
|
|
| MD5 |
939900ecab1910de3bbbc699dbafc5f6
|
|
| BLAKE2b-256 |
5fa7925b24c578045224dca05fb0874559f84b4d640cbcd7c630008239abe981
|