Skip to main content

Post-quantum cryptographic framework with fractal encoding and semantic keys - resistant to quantum attacks

Project description

CSF-Crypto: Post-Quantum Cryptographic Security Framework

CSF-Crypto is a military-grade, post-quantum cryptographic system that integrates fractal geometry with semantic keys to provide unprecedented security against both classical and quantum attacks.

What is CSF-Crypto?

CSF-Crypto (Cryptographic Security Framework) is a revolutionary encryption protocol that combines:

  • Post-Quantum Cryptography: NIST PQC standards (CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+)
  • Fractal Encoding: Messages encoded into Julia set parameters for unique geometric signatures
  • Semantic Keys: Text-derived numerical vectors adding a contextual security layer
  • Constant-Time Operations: Side-channel attack protection built-in

Unlike traditional cryptography (RSA, AES), CSF-Crypto is designed from the ground up to resist both Shor's and Grover's quantum algorithms while maintaining the simplicity of standard cryptographic libraries.

Key Features

🔒 Quantum-Resistant Security

  • Implements complete NIST PQC standards (FIPS 203, 204, 205)
  • Dual-layer key system: mathematical + semantic keys
  • Resistant to Shor's algorithm (key exchange) and Grover's algorithm (search attacks)

🌐 Fractal-Based Encoding

  • Messages encoded into dynamic fractal structures (Julia sets)
  • Each encryption generates a unique fractal signature
  • Visual and cryptographic authentication through fractal fingerprints

🎯 Military-Grade Protection

  • Constant-time operations throughout
  • Secure memory wiping
  • Comprehensive input validation
  • Side-channel attack resistant

💻 Developer-Friendly API

Works exactly like standard cryptographic libraries:

from csf import FractalCryptoSystem
from csf.core.keys import KeyManager

# Initialize
crypto = FractalCryptoSystem()
key_manager = KeyManager()

# Generate keys
public_key, private_key = key_manager.generate_key_pair()

# Encrypt
message = "Secret message"
encrypted = crypto.encrypt(message, "semantic_key", public_key, private_key)

# Decrypt
decrypted = crypto.decrypt(encrypted, "semantic_key", private_key)
print(decrypted)  # "Secret message"

Installation

Standard Installation

pip install csf-crypto

With Post-Quantum Cryptography Support

Note: CSF-Crypto includes built-in fallback implementations of NIST PQC algorithms. The optional [pqc] extra is currently empty as external PQC libraries may not be available on PyPI. CSF works perfectly without these extras - all PQC functionality is included by default with internal implementations.

# Standard installation (includes all PQC features)
pip install csf-crypto

CSF includes internal implementations of CRYSTALS-Kyber, CRYSTALS-Dilithium, and SPHINCS+ algorithms, so no additional packages are required for post-quantum cryptography functionality.

Development Installation

pip install csf-crypto[dev]

Use Cases

  • Secure Communications: Encrypt messages with quantum-resistant algorithms
  • Digital Signatures: Generate and verify fractal-based signatures
  • Key Exchange: Post-quantum key exchange using lattice cryptography
  • IoT Security: Lightweight but robust encryption for embedded systems
  • Blockchain: Fractal signatures for transaction verification

Technical Specifications

  • Python: 3.9+
  • Dependencies: numpy, scipy, matplotlib
  • Post-Quantum Standards: CRYSTALS-Kyber (FIPS 203), CRYSTALS-Dilithium (FIPS 204), SPHINCS+ (FIPS 205)
  • Security Level: Up to 256-bit post-quantum security

Architecture

CSF-Crypto uses a modular architecture:

  • Core: Lattice-based cryptography, key management, randomness generation
  • Crypto: Encryption, decryption, signing, verification
  • Fractal: Julia set encoding/decoding, fractal signature generation
  • Semantic: Text-to-vector transformation, semantic key derivation
  • PQC: Post-quantum cryptography implementations (Kyber, Dilithium, SPHINCS+)
  • Security: Constant-time operations, side-channel protection, validation

Why CSF-Crypto?

Traditional encryption methods (RSA, ECC) are vulnerable to quantum computers. CSF-Crypto provides:

  1. Future-Proof: Designed for the quantum computing era
  2. Unique Approach: Only system combining fractals + semantics + post-quantum
  3. Proven Standards: Based on NIST-approved algorithms
  4. Easy Integration: Simple API, works like any cryptographic library

Documentation

  • Quick Start: See examples in the GitHub repository
  • Full Documentation: Complete usage guide and API reference
  • Whitepaper: Technical details and cryptographic specifications

Inventor

Jeremy Noverraz (1988 - 2025) based on an idea by Ivàn Àvalos AND JCZD (engrenage.ch)

License

This project is provided for private/government use.

Project Links


CSF-Crypto: The next generation of cryptographic security, combining mathematics, geometry, and language to transcend the limits of classical and quantum computation.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

csf_crypto-1.0.14.tar.gz (49.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

csf_crypto-1.0.14-py3-none-any.whl (58.5 kB view details)

Uploaded Python 3

File details

Details for the file csf_crypto-1.0.14.tar.gz.

File metadata

  • Download URL: csf_crypto-1.0.14.tar.gz
  • Upload date:
  • Size: 49.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.2

File hashes

Hashes for csf_crypto-1.0.14.tar.gz
Algorithm Hash digest
SHA256 dc315261f922f53a91059b6e695f0528662822d21d5f7f6f0a27a84a51bbafda
MD5 796c413a75de52e9a278bfbe9354e76e
BLAKE2b-256 d8e92137b576759bbcf51b247bf5f3cd418107537a66893e56f1bde39ead0be6

See more details on using hashes here.

File details

Details for the file csf_crypto-1.0.14-py3-none-any.whl.

File metadata

  • Download URL: csf_crypto-1.0.14-py3-none-any.whl
  • Upload date:
  • Size: 58.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.2

File hashes

Hashes for csf_crypto-1.0.14-py3-none-any.whl
Algorithm Hash digest
SHA256 316fd68a515c17079f3314cd98cdb93fc5f49fbac34241d7401f4033241337e0
MD5 999a730b2196775d4ae3ae92340e4e12
BLAKE2b-256 118eb0ace727289ad1d284a2f1632e04619a93bc6a1e25d7ec853d0e17ea63ff

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page