Skip to main content

Post-quantum cryptographic framework with fractal encoding and semantic keys - resistant to quantum attacks

Project description

CSF-Crypto: Post-Quantum Cryptographic Security Framework

CSF-Crypto is a military-grade, post-quantum cryptographic system that integrates fractal geometry with semantic keys to provide unprecedented security against both classical and quantum attacks.

What is CSF-Crypto?

CSF-Crypto (Cryptographic Security Framework) is a revolutionary encryption protocol that combines:

  • Post-Quantum Cryptography: NIST PQC standards (CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+)
  • Fractal Encoding: Messages encoded into Julia set parameters for unique geometric signatures
  • Semantic Keys: Text-derived numerical vectors adding a contextual security layer
  • Constant-Time Operations: Side-channel attack protection built-in

Unlike traditional cryptography (RSA, AES), CSF-Crypto is designed from the ground up to resist both Shor's and Grover's quantum algorithms while maintaining the simplicity of standard cryptographic libraries.

Key Features

🔒 Quantum-Resistant Security

  • Implements complete NIST PQC standards (FIPS 203, 204, 205)
  • Dual-layer key system: mathematical + semantic keys
  • Resistant to Shor's algorithm (key exchange) and Grover's algorithm (search attacks)

🌐 Fractal-Based Encoding

  • Messages encoded into dynamic fractal structures (Julia sets)
  • Each encryption generates a unique fractal signature
  • Visual and cryptographic authentication through fractal fingerprints

🎯 Military-Grade Protection

  • Constant-time operations throughout
  • Secure memory wiping
  • Comprehensive input validation
  • Side-channel attack resistant

💻 Developer-Friendly API

Works exactly like standard cryptographic libraries:

from csf import FractalCryptoSystem
from csf.core.keys import KeyManager

# Initialize
crypto = FractalCryptoSystem()
key_manager = KeyManager()

# Generate keys
public_key, private_key = key_manager.generate_key_pair()

# Encrypt
message = "Secret message"
encrypted = crypto.encrypt(message, "semantic_key", public_key, private_key)

# Decrypt
decrypted = crypto.decrypt(encrypted, "semantic_key", private_key)
print(decrypted)  # "Secret message"

Installation

Standard Installation

pip install csf-crypto

With Post-Quantum Cryptography Support

Note: CSF-Crypto includes built-in fallback implementations of NIST PQC algorithms. The optional [pqc] extra is currently empty as external PQC libraries may not be available on PyPI. CSF works perfectly without these extras - all PQC functionality is included by default with internal implementations.

# Standard installation (includes all PQC features)
pip install csf-crypto

CSF includes internal implementations of CRYSTALS-Kyber, CRYSTALS-Dilithium, and SPHINCS+ algorithms, so no additional packages are required for post-quantum cryptography functionality.

Development Installation

pip install csf-crypto[dev]

Use Cases

  • Secure Communications: Encrypt messages with quantum-resistant algorithms
  • Digital Signatures: Generate and verify fractal-based signatures
  • Key Exchange: Post-quantum key exchange using lattice cryptography
  • IoT Security: Lightweight but robust encryption for embedded systems
  • Blockchain: Fractal signatures for transaction verification

Technical Specifications

  • Python: 3.9+
  • Dependencies: numpy, scipy, matplotlib
  • Post-Quantum Standards: CRYSTALS-Kyber (FIPS 203), CRYSTALS-Dilithium (FIPS 204), SPHINCS+ (FIPS 205)
  • Security Level: Up to 256-bit post-quantum security

Architecture

CSF-Crypto uses a modular architecture:

  • Core: Lattice-based cryptography, key management, randomness generation
  • Crypto: Encryption, decryption, signing, verification
  • Fractal: Julia set encoding/decoding, fractal signature generation
  • Semantic: Text-to-vector transformation, semantic key derivation
  • PQC: Post-quantum cryptography implementations (Kyber, Dilithium, SPHINCS+)
  • Security: Constant-time operations, side-channel protection, validation

Why CSF-Crypto?

Traditional encryption methods (RSA, ECC) are vulnerable to quantum computers. CSF-Crypto provides:

  1. Future-Proof: Designed for the quantum computing era
  2. Unique Approach: Only system combining fractals + semantics + post-quantum
  3. Proven Standards: Based on NIST-approved algorithms
  4. Easy Integration: Simple API, works like any cryptographic library

Documentation

  • Quick Start: See examples in the GitHub repository
  • Full Documentation: Complete usage guide and API reference
  • Whitepaper: Technical details and cryptographic specifications

Inventor

Jeremy Noverraz (1988 - 2025) based on an idea by Ivàn Àvalos AND JCZD (engrenage.ch)

License

This project is provided for private/government use.

Project Links


CSF-Crypto: The next generation of cryptographic security, combining mathematics, geometry, and language to transcend the limits of classical and quantum computation.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

csf_crypto-1.0.8.tar.gz (38.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

csf_crypto-1.0.8-py3-none-any.whl (44.3 kB view details)

Uploaded Python 3

File details

Details for the file csf_crypto-1.0.8.tar.gz.

File metadata

  • Download URL: csf_crypto-1.0.8.tar.gz
  • Upload date:
  • Size: 38.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.2

File hashes

Hashes for csf_crypto-1.0.8.tar.gz
Algorithm Hash digest
SHA256 541d8ce2be594b49ceca6f41fe89cdd80370631dab259014bca085c7448b3295
MD5 65496375da553aca365d5652af9bd4cc
BLAKE2b-256 5bb44980a93926e8a002b830ea204515d48d533fddebd3bf683c7ddfda213ef8

See more details on using hashes here.

File details

Details for the file csf_crypto-1.0.8-py3-none-any.whl.

File metadata

  • Download URL: csf_crypto-1.0.8-py3-none-any.whl
  • Upload date:
  • Size: 44.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.2

File hashes

Hashes for csf_crypto-1.0.8-py3-none-any.whl
Algorithm Hash digest
SHA256 e6cfb3a65998a3722c3c3bfa8c2c8ede9bfd3ae49e0ea0cfe5f321af513d7dcf
MD5 8846cb6a7a5083912d9e400332ad46cc
BLAKE2b-256 3d8659d38538fef73f680804d4a072593c45ae24a7fdfbef2272d16e1b2e3fb6

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page