Military Grade Hardened Encryption Library - AES-256-GCM + Argon2id + SecureMemory - Professional Secure Hashing & Encryption Library - AES-256-GCM Backend
Project description
⚡ Flash512-Vanguard Bastion v2.1
🔐 Military Grade Hardened Encryption
Next-Gen Secure Encryption Library for Python
Standard industriel AES-256-GCM + Argon2id/PBKDF2 durci + Gestion de clés professionnelle
Engineered for extreme privacy, designed for the international cybersecurity community.
🛡️ Why Flash512-Vanguard?
Standard encryption can be vulnerable if implemented incorrectly. Flash512-Vanguard provides a secure-by-default abstraction layer that combines:
| Layer | Implementation | Standard |
|---|---|---|
| Primary KDF | Argon2id (memory-hard, GPU/ASIC resistant) | OWASP ASVS V2.4 |
| Fallback KDF | PBKDF2-HMAC-SHA512 with 100,000 iterations | OWASP recommended |
| Authenticated Encryption | AES-256-GCM (128-bit tag) | NIST FIPS 197 |
| Secure Nonce | Cryptographically random per operation | NIST SP 800-38D |
| Memory Protection | SecureBuffer with automatic wiping | Military-grade hygiene |
| Secret Management | Environment-based + Key Manager | SOC2 compliant |
🔒 v2.1 Military Grade: Introduction d'Argon2id par défaut, SecureBuffer pour l'effacement mémoire automatique, et vérification d'intégrité du module au chargement (anti-tampering).
🚀 Key Features
- ✅ Polymorphic Output: Same message encrypted twice = different tokens (random nonce)
- ✅ Full Integrity: GCM authentication tag detects any tampering
- ✅ Key Rotation: Built-in
rotate_secret()for password changes - ✅ Audit Logging: Enterprise-ready audit trail (SOC2/HIPAA compatible)
- ✅ Memory Wiping: SecureBuffer efface automatiquement les données sensibles après usage
- ✅ Anti-Brute Force: Argon2id memory-hard KDF résiste aux GPU/ASIC
- ✅ Module Integrity: Vérification HMAC-SHA512 au chargement contre les modifications non autorisées
- ✅ Simple API: Méthodes
protect()/open(), zero crypto expertise needed
📢 Official Release: Flash512-Vanguard Bastion v2.1
erabytse is proud to announce the launch of Flash512-Vanguard Bastion v2.1.
This Military Grade release introduces critical security hardening:
- 🔰 Argon2id : Dérivation de clé memory-hard pour résister aux attaques par force brute matérielles
- 🧹 SecureBuffer : Effacement automatique et garanti des données déchiffrées en mémoire
- 🛡️ Module Integrity : Vérification d'intégrité au chargement empêchant l'exécution de code modifié
- 🔒 Core Dump Lock : Désactivation automatique des core dumps sur Linux
The underlying industry-standard AES-256-GCM ensures:
- 🌍 Interoperability with other systems and languages
- 🔐 Auditability by third-party security firms
- ⚡ Performance via hardware acceleration (AES-NI)
- 📜 Compliance with NIST, FIPS, and enterprise security policies
The legacy v1.0 algorithm remains available via use_legacy=True for backward compatibility only.
🛡️ Vision
In an era of increasing cyber threats, we believe that encryption should be more than just a standard; it should be an evolving fortress. Flash512-Vanguard is our first step toward a suite of tools dedicated to Digital Sovereignty and Advanced Privacy.
Our commitment: Security through transparency, not obscurity. We use peer-reviewed standards so you can sleep at night.
💼 Commercial & Support
While the core engine is open-source under Apache 2.0, erabytse offers professional tiers for enterprise needs:
| Tier | Features | Price |
|---|---|---|
| Core | AES-GCM engine, Key Manager, audit logging, SecureBuffer | Free (Apache 2.0) |
| Pro Support | SLA 24h, priority patches, integration help | 499€/month |
| Enterprise | HSM/TPM support, SIEM integration, training | Custom quote |
Services:
- 🔐 Custom Core Provisioning: Tailored solutions for enterprise-grade isolation
- 🛡️ Security Consulting: Implementation audits for your infrastructure
- 📚 Training: Team workshops on secure encryption practices
📧 Contact: contact@fbfconsulting.org
💻 Quick Start
🔧 Installation v2.1
pip install flash512-vanguard==2.1.1
🔑 Configuration
Before using the engine, you must provision your Internal Core Secret. This secret acts as the unique architectural soul of your encryption.
On Linux/Mac:
export FLASH512_VANGUARD_CORE="your-secure-random-secret-64-chars-min"
On Windows (PowerShell):
$env:FLASH512_VANGUARD_CORE="your-secure-random-secret-64-chars-min"
Or create a .env file at your project root:
FLASH512_VANGUARD_CORE=your-secure-random-secret-64-chars-min
⚠️ Security Note: Never commit .env to version control. Add it to .gitignore.
📖 Usage Basic Encryption (Zero Expertise Required)
from flash512 import Flash512Vanguard
# Encrypt
token = Flash512Vanguard.protect("Classified Data", "MyUltraStrongSecret")
print(f"Secure Token: {token}")
# Decrypt
original = Flash512Vanguard.open(token, "MyUltraStrongSecret")
print(f"Decrypted: {original}")
# Verify without decrypting
if Flash512Vanguard.verify(token, "MyUltraStrongSecret"):
print("Token is valid ✓")
# Rotate user password
new_token = Flash512Vanguard.rotate_secret(token, "OldPassword", "NewPassword")
Military Grade Decryption with SecureBuffer (v2.1+)
from flash512 import Flash512Vanguard
token = Flash512Vanguard.protect("Message Top Secret", "MotDePasse")
# Use the “with” context for automatic memory deallocation
with Flash512Vanguard.open(token, "MotDePasse") as buffer:
# Process sensitive data ONLY within this protected block
traiter_donnees_sensibles(buffer.data)
# Here, the data has already been cleared from the random access memory (RAM)
# Any attempt to access it will raise a RuntimeError
🧪 Testing
# Install dev dependencies
pip install -e .[dev]
# Run all tests (500+ random cases)
pytest tests/ -v
# Run military-grade specific tests
pytest tests/test_military_grade.py -v
# Run property-based tests
pytest tests/test_property.py -v
📜 License & Commercial Use
This project is released under the Apache 2.0 License.
| Use Case | License Required |
|---|---|
| Open-source projects | Apache 2.0 (free) |
| Commercial proprietary software | Apache 2.0 (free, no disclosure required) |
| Enterprise support & SLA | Commercial agreement |
| HSM/TPM integration | Enterprise license |
For commercial integration support or enterprise features, please contact the author:
📧 Email: contact@fbfconsulting.org
🌐 GitHub: https://github.com/erabytse/flash512-vanguard
🙏 Credits
-
Author: @erabytse
-
Architecture v2.0: Industry-standard AES-256-GCM backend
-
Inspired by: OWASP, NIST, cryptography.io
-
Built for: The international cybersecurity community
📞 Support & Security
| Need | Contact |
|---|---|
| Technical support | support@fbfconsulting.org |
| Security vulnerability | contact@fbfconsulting.org (do not open public issue) |
| Commercial inquiry | contact@fbfconsulting.org |
Security Policy: See SECURITY.md for vulnerability disclosure process.
Last updated: May 2026 | Version: 2.1.1
This project is released under the License apache 2.0. For commercial integration into proprietary software without disclosing your source code, please contact the author for a Commercial License.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file flash512_vanguard-2.1.1.tar.gz.
File metadata
- Download URL: flash512_vanguard-2.1.1.tar.gz
- Upload date:
- Size: 26.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
081dd06f99ae514b246441e7ecbada3bca793b58b01799250a8498a190e676b8
|
|
| MD5 |
e4290170b37c5e647ff4ef47ce75a545
|
|
| BLAKE2b-256 |
ba726854a7a8b6a51fe9d59898a7ab6effbf6128d25d7605061aa97062fd73bf
|
File details
Details for the file flash512_vanguard-2.1.1-py3-none-any.whl.
File metadata
- Download URL: flash512_vanguard-2.1.1-py3-none-any.whl
- Upload date:
- Size: 23.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
ce57cf5757fbb283d6c80f613f84a04f304330eeb3cc06e99f4c3a6daf2ecaf5
|
|
| MD5 |
1ef86a448daf9c2c026997015d7ac58c
|
|
| BLAKE2b-256 |
d8878edbc64bdf9c6407a572887bac67654d7fcbe0481c2dfcd941036679c954
|