Post-quantum cryptographic framework with fractal encoding and semantic keys - resistant to quantum attacks
Project description
CSF-Crypto: Post-Quantum Cryptographic Security Framework
CSF-Crypto is a military-grade, post-quantum cryptographic system that integrates fractal geometry with semantic keys to provide unprecedented security against both classical and quantum attacks.
What is CSF-Crypto?
CSF-Crypto (Cryptographic Security Framework) is a revolutionary encryption protocol that combines:
- Post-Quantum Cryptography: NIST PQC standards (CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+)
- Noverraz Engine: Next-generation fractal engine replacing Julia sets (10-100x faster)
- Fractal Encoding: Messages encoded into fractal parameter space for unique geometric signatures
- Semantic Keys: Text-derived numerical vectors adding a contextual security layer
- Constant-Time Operations: Side-channel attack protection built-in
Unlike traditional cryptography (RSA, AES), CSF-Crypto is designed from the ground up to resist both Shor's and Grover's quantum algorithms while maintaining the simplicity of standard cryptographic libraries.
Key Features
🔒 Quantum-Resistant Security
- Implements complete NIST PQC standards (FIPS 203, 204, 205)
- Dual-layer key system: mathematical + semantic keys
- Resistant to Shor's algorithm (key exchange) and Grover's algorithm (search attacks)
- Quantum resistance: ~2^256 operations (vs ~2^128 for traditional methods)
🌐 Noverraz Fractal Engine
- Noverraz: Revolutionary fractal engine replacing Julia sets
- 10-100x faster than Julia sets through optimized iteration formula
- Guaranteed convergence via exponential damping
- Direct key injection for enhanced cryptographic properties
- Vectorized processing with Numba JIT compilation (optional)
- Parallel processing for multi-core systems
- Memory optimization with streaming support
Noverraz Formula:
z_{n+1} = (z_n^2 + c) * exp(-α|z_n|^2) + β * K_math * K_sem
This provides:
- Convergence guarantee (no divergence)
- Direct mathematical and semantic key injection
- Enhanced cryptographic properties
- Superior performance
🎯 Military-Grade Protection
- Constant-time operations throughout
- Secure memory wiping
- Comprehensive input validation
- Side-channel attack resistant
⚡ High Performance
- Numba JIT compilation: 5-10x faster fractal calculations (optional)
- LZ4 compression: 2-3x faster than zlib (optional)
- Key caching: Avoids regeneration overhead
- Automatic chunking: Parallel processing for large files (>8KB)
- Optimized signatures: 32x32 pixel images (64x fewer pixels)
Performance Results:
- 1 KB: ~0.04s total
- 10 KB: ~0.12s total
- 100 KB: ~1.1s total
- Throughput: 150-200 KB/s encryption, 200+ KB/s decryption
Installation
Standard Installation
pip install csf-crypto
With Performance Optimizations (Recommended)
# Install with optional performance packages
pip install csf-crypto
pip install numba lz4 # Optional but recommended
Note: CSF-Crypto works perfectly without these optional packages, but they provide significant performance improvements:
- numba: 5-10x faster fractal calculations via JIT compilation
- lz4: 2-3x faster compression than zlib
Quick Start
from csf import FractalCryptoSystem
from csf.core.keys import KeyManager
# Initialize
crypto = FractalCryptoSystem()
key_manager = KeyManager()
# Generate keys
public_key, private_key = key_manager.generate_key_pair()
# Encrypt
message = "Secret message"
encrypted = crypto.encrypt(message, "semantic_key", public_key, private_key)
# Decrypt
decrypted = crypto.decrypt(encrypted, "semantic_key", private_key)
print(decrypted) # "Secret message"
That's it! CSF works exactly like cryptography or pycryptodome.
Use Cases
- Secure Communications: Encrypt messages with quantum-resistant algorithms
- Digital Signatures: Generate and verify fractal-based signatures using Noverraz
- Key Exchange: Post-quantum key exchange using lattice cryptography
- IoT Security: Lightweight but robust encryption for embedded systems
- Blockchain: Fractal signatures for transaction verification
- Large File Encryption: Automatic chunking and parallel processing for efficient handling
Technical Specifications
- Python: 3.9+
- Core Dependencies: numpy, scipy, matplotlib, msgpack
- Optional Dependencies: numba (JIT compilation), lz4 (fast compression)
- Post-Quantum Standards: CRYSTALS-Kyber (FIPS 203), CRYSTALS-Dilithium (FIPS 204), SPHINCS+ (FIPS 205)
- Security Level: Up to 256-bit post-quantum security
- Fractal Engine: Noverraz (replacing Julia sets)
Architecture
CSF-Crypto uses a modular architecture:
- Core: Lattice-based cryptography, key management (with caching), randomness generation
- Crypto: Encryption (with chunking), decryption, signing, verification
- Fractal: Noverraz engine, fractal encoding/decoding, fractal signature generation
- Semantic: Text-to-vector transformation, semantic key derivation
- PQC: Post-quantum cryptography implementations (Kyber, Dilithium, SPHINCS+)
- Security: Constant-time operations, side-channel protection, validation
- Utils: Compression (lz4/zlib), serialization (MessagePack), optimization
Why CSF-Crypto?
Traditional encryption methods (RSA, ECC) are vulnerable to quantum computers. CSF-Crypto provides:
- Future-Proof: Designed for the quantum computing era
- Unique Approach: Only system combining Noverraz fractals + semantics + post-quantum
- Proven Standards: Based on NIST-approved algorithms
- High Performance: 10-100x faster than traditional fractal methods thanks to Noverraz
- Easy Integration: Simple API, works like any cryptographic library
Performance
Current Performance (v1.0.14 with Noverraz)
| Data Size | Encryption | Decryption | Total | Throughput |
|---|---|---|---|---|
| 1 KB | ~0.02s | ~0.02s | ~0.04s | 66 KB/s |
| 10 KB | ~0.07s | ~0.05s | ~0.12s | 150 KB/s |
| 100 KB | ~0.6s | ~0.5s | ~1.1s | 160 KB/s |
| 1 MB | ~8-10s | ~6s | ~15s | 120 KB/s |
Optimizations
- ✅ Noverraz engine: 10-100x faster than Julia
- ✅ Numba JIT: 5-10x faster calculations
- ✅ LZ4 compression: 2-3x faster compression
- ✅ Key caching: 0.1-0.5s saved per operation
- ✅ Automatic chunking: Parallel processing for large files
- ✅ Optimized signatures: 64x fewer pixels
Documentation
- GitHub Repository: https://github.com/iyotee/csf
- Full Documentation: See GitHub repository for complete usage guide
- Technical Specs: See
docs/spec/cryptographic_spec.mdin repository
Inventor
Jeremy Noverraz (1988 - 2025) based on an idea by Ivàn Àvalos and JCZD (engrenage.ch)
License
This project is provided for private/government use.
Project Links
CSF-Crypto: The next generation of cryptographic security, combining mathematics, geometry, and language to transcend the limits of classical and quantum computation.
Powered by Noverraz Engine: Revolutionary fractal cryptography for the quantum era.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file csf_crypto-1.0.24.tar.gz.
File metadata
- Download URL: csf_crypto-1.0.24.tar.gz
- Upload date:
- Size: 63.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
40dbfd878c198d7d1d192aee2a8d9ca3b4b40e1970e084a0af715e9fa9119bb7
|
|
| MD5 |
c9fd62bf97eb4bba2892b592dae7e1d7
|
|
| BLAKE2b-256 |
f4d06632912cd7dc244daef41bef919899da10e36a3ea90b549baab6895b6d9c
|
File details
Details for the file csf_crypto-1.0.24-py3-none-any.whl.
File metadata
- Download URL: csf_crypto-1.0.24-py3-none-any.whl
- Upload date:
- Size: 73.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
560d928db877d99caec228ec70ff664a8478e65665552dbbdde97233ff46be87
|
|
| MD5 |
65ab7db87e3400a024d84efa3c81d8a1
|
|
| BLAKE2b-256 |
6d13addf3238c593e5a393ce48b2d983894955b1e8381b3d6378b55c8940ddbb
|