Skip to main content

High-performance, cryptographically secure hybrid PRNG library.

Project description

🎲 Hyrandom

The Ultimate Cryptographically Secure PRNG for Python. Faster than random. Securer than secrets.

📊 Benchmarks

Generating 10,000,000 floats on a standard multi-core CPU.

Library / Engine Security Speed (Time) Performance Gain
random (Stdlib) ❌ Insecure ~1.85s Baseline
secrets (Stdlib) ✅ Secure ~18.35s 10x Slower
hyrandom (Native) ✅ Secure ~2.10s 8x Faster (vs secrets)
hyrandom[secure] ✅ Secure ~0.22s 83x Faster
hyrandom[fast] ❌ Insecure ~0.09s 200x Faster (Best for ML/AI)
hyrandom[rust] ✅ Secure ~0.001s 18,000x Faster 🚀

Note: hyrandom[fast] intentionally bypasses cryptographic safety to provide raw statistical throughput for Monte Carlo simulations and machine learning.

🛑 The Problem

For decades, Python developers have been forced to make a dangerous compromise:

  1. Use import random: Blazing fast, but relies on the predictably insecure Mersenne Twister algorithm. (Vulnerable)
  2. Use import secrets: Cryptographically secure (CSPRNG), but agonizingly slow, crippling high-throughput web servers and simulations. (Bottleneck)

🚀 The Solution: hyrandom

hyrandom eliminates the compromise. By implementing a dynamic, multi-backend architecture, it intelligently routes your randomness requests to the fastest available hardware-accelerated engine on your system—scaling from pure Python SHA-256 entropy stretching up to a hyper-optimized Rust-based ChaCha20 engine.

You get military-grade security at simulation-grade speeds.

🔥 Key Strengths

  • 100% Drop-In Replacement: Fully implements the standard Python random API. Zero code refactoring required.
  • Zero-Friction Fallback: The library never fails. It attempts to load Rust -> falls back to Vectorized NumPy -> falls back to Pure Python Native buffering.
  • Fork & Thread Safe: Built-in safeguards against PID forking vulnerabilities (a notorious issue in multi-worker servers like Gunicorn/uWSGI).
  • Unprecedented Speed: Up to 18,000x faster than the standard secrets module.
  • Developer CLI Tool: Instantly generate secure tokens or benchmark your server directly from the terminal.

⚡ Simplicity at its Core

1. Installation & Performance Tiers

hyrandom is highly modular. You only install what you need. (No Rust compiler is required for end-users when pre-compiled wheels are downloaded).

# 1. Native Tier (Zero dependencies. Best for lightweight microservices)
pip install hyrandom

# 2. Fast Tier (Maximum simulation speed via NumPy SFC64. Not for cryptography)
pip install hyrandom[fast]

# 3. Secure Tier (High-throughput vectorized cryptography via NumPy)
pip install hyrandom[secure]

# 4. Ultimate Tier (Hardware-accelerated ChaCha20 via Rust)
pip install hyrandom[rust]

# 5. Full Installation (Installs all Python dependencies and backends)
pip install hyrandom[full]

2. The 1-Line Integration

Simply swap your import statement. Every standard distribution (gauss, uniform, choice, shuffle) works flawlessly.

# Before: import random
import hyrandom as random

# Cryptographically secure, incredibly fast.
user_id = random.randint(100000, 999999)
session_token = random.token_urlsafe(64)
winning_item = random.choice(['Apple', 'Banana', 'Orange'])

# Check which backend your system is utilizing:
print(random.get_current_engine()) 
# Output: "Rust (ChaCha20)"


3. Command Line Interface (CLI)

hyrandom acts as a powerful system tool right out of the box.

# Generate a secure 64-byte hex token for JWTs or API Keys
$ hyrandom token --length 64 --format hex
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855...

# Benchmark the active engine on your current hardware
$ hyrandom bench --iterations 5000000
--- hyrandom Benchmark ---
Engine: Rust (ChaCha20)
Generating 5,000,000 floats...
Time elapsed: 0.0042 seconds
Operations/sec: 1,190,476,190


🛡️ Security Posture & Architecture

hyrandom doesn't just "guess" numbers. It is engineered for enterprise-grade cryptographic operations.

  1. OS Entropy Injection: All engines seed from os.urandom() (the operating system's raw physical entropy pool).
  2. State Protection: Functions like getstate() and setstate() intentionally raise NotImplementedError. This prevents malicious actors from extracting the PRNG state or executing replay attacks.
  3. Entropy Stretching: By using modern stream ciphers (like ChaCha20 in Rust) and hashing algorithms (SHA-256 in Python), hyrandom expands a small, highly secure physical seed into billions of random numbers without starving the OS entropy pool.

📜 License

Released under the MIT License. Free for personal, academic, and commercial use. See the LICENSE file in the repository for full details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

hyrandom-1.0.4.tar.gz (12.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

hyrandom-1.0.4-cp314-cp314-win_amd64.whl (10.5 kB view details)

Uploaded CPython 3.14Windows x86-64

File details

Details for the file hyrandom-1.0.4.tar.gz.

File metadata

  • Download URL: hyrandom-1.0.4.tar.gz
  • Upload date:
  • Size: 12.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for hyrandom-1.0.4.tar.gz
Algorithm Hash digest
SHA256 720bccd3b76871e6b2618300563b998ebeb86272fec84d5c8ed6384428226dc0
MD5 540d4586d150e72cb3fef0a7116b092c
BLAKE2b-256 3ba4e80c3c9121c61d2b21f53d26f39b1e45beb26d9307bd3664c1941c045c4b

See more details on using hashes here.

File details

Details for the file hyrandom-1.0.4-cp314-cp314-win_amd64.whl.

File metadata

  • Download URL: hyrandom-1.0.4-cp314-cp314-win_amd64.whl
  • Upload date:
  • Size: 10.5 kB
  • Tags: CPython 3.14, Windows x86-64
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for hyrandom-1.0.4-cp314-cp314-win_amd64.whl
Algorithm Hash digest
SHA256 a9259dbb4b076bdfa0a8cc93a29456933a517a1e7210bedb8297c833d8a88935
MD5 c90b4815de7f7c05ea4b7f220cd9ce41
BLAKE2b-256 0d9c9d8bb691772fdeb589c77fa2c1a071e24fcf217c478a3729e6233113db1e

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page