High-performance, cryptographically secure hybrid PRNG library.
Project description
🎲 Hyrandom
The Ultimate Cryptographically Secure PRNG for Python. Faster than random. Securer than secrets.
📊 Benchmarks
Generating 10,000,000 floats on a standard multi-core CPU.
| Library / Engine | Security | Speed (Time) | Performance Gain |
|---|---|---|---|
random (Stdlib) |
❌ Insecure | ~1.85s | Baseline |
secrets (Stdlib) |
✅ Secure | ~18.35s | 10x Slower |
hyrandom (Native) |
✅ Secure | ~2.10s | 8x Faster (vs secrets) |
hyrandom[secure] |
✅ Secure | ~0.22s | 83x Faster |
hyrandom[fast] |
❌ Insecure | ~0.09s | 200x Faster (Best for ML/AI) |
hyrandom[rust] |
✅ Secure | ~0.001s | 18,000x Faster 🚀 |
Note:
hyrandom[fast]intentionally bypasses cryptographic safety to provide raw statistical throughput for Monte Carlo simulations and machine learning.
🛑 The Problem
For decades, Python developers have been forced to make a dangerous compromise:
- Use
import random: Blazing fast, but relies on the predictably insecure Mersenne Twister algorithm. (Vulnerable) - Use
import secrets: Cryptographically secure (CSPRNG), but agonizingly slow, crippling high-throughput web servers and simulations. (Bottleneck)
🚀 The Solution: hyrandom
hyrandom eliminates the compromise. By implementing a dynamic, multi-backend architecture, it intelligently routes your randomness requests to the fastest available hardware-accelerated engine on your system—scaling from pure Python SHA-256 entropy stretching up to a hyper-optimized Rust-based ChaCha20 engine.
You get military-grade security at simulation-grade speeds.
🔥 Key Strengths
- 100% Drop-In Replacement: Fully implements the standard Python
randomAPI. Zero code refactoring required. - Zero-Friction Fallback: The library never fails. It attempts to load Rust -> falls back to Vectorized NumPy -> falls back to Pure Python Native buffering.
- Fork & Thread Safe: Built-in safeguards against PID forking vulnerabilities (a notorious issue in multi-worker servers like Gunicorn/uWSGI).
- Unprecedented Speed: Up to 18,000x faster than the standard
secretsmodule. - Developer CLI Tool: Instantly generate secure tokens or benchmark your server directly from the terminal.
⚡ Simplicity at its Core
1. Installation & Performance Tiers
hyrandom is highly modular. You only install what you need. (No Rust compiler is required for end-users when pre-compiled wheels are downloaded).
# 1. Native Tier (Zero dependencies. Best for lightweight microservices)
pip install hyrandom
# 2. Fast Tier (Maximum simulation speed via NumPy SFC64. Not for cryptography)
pip install hyrandom[fast]
# 3. Secure Tier (High-throughput vectorized cryptography via NumPy)
pip install hyrandom[secure]
# 4. Ultimate Tier (Hardware-accelerated ChaCha20 via Rust)
pip install hyrandom[rust]
# 5. Full Installation (Installs all Python dependencies and backends)
pip install hyrandom[full]
2. The 1-Line Integration
Simply swap your import statement. Every standard distribution (gauss, uniform, choice, shuffle) works flawlessly.
# Before: import random
import hyrandom as random
# Cryptographically secure, incredibly fast.
user_id = random.randint(100000, 999999)
session_token = random.token_urlsafe(64)
winning_item = random.choice(['Apple', 'Banana', 'Orange'])
# Check which backend your system is utilizing:
print(random.get_current_engine())
# Output: "Rust (ChaCha20)"
3. Command Line Interface (CLI)
hyrandom acts as a powerful system tool right out of the box.
# Generate a secure 64-byte hex token for JWTs or API Keys
$ hyrandom token --length 64 --format hex
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855...
# Benchmark the active engine on your current hardware
$ hyrandom bench --iterations 5000000
--- hyrandom Benchmark ---
Engine: Rust (ChaCha20)
Generating 5,000,000 floats...
Time elapsed: 0.0042 seconds
Operations/sec: 1,190,476,190
🛡️ Security Posture & Architecture
hyrandom doesn't just "guess" numbers. It is engineered for enterprise-grade cryptographic operations.
- OS Entropy Injection: All engines seed from
os.urandom()(the operating system's raw physical entropy pool). - State Protection: Functions like
getstate()andsetstate()intentionally raiseNotImplementedError. This prevents malicious actors from extracting the PRNG state or executing replay attacks. - Entropy Stretching: By using modern stream ciphers (like ChaCha20 in Rust) and hashing algorithms (SHA-256 in Python),
hyrandomexpands a small, highly secure physical seed into billions of random numbers without starving the OS entropy pool.
📜 License
Released under the MIT License. Free for personal, academic, and commercial use. See the LICENSE file in the repository for full details.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file hyrandom-1.0.5.tar.gz.
File metadata
- Download URL: hyrandom-1.0.5.tar.gz
- Upload date:
- Size: 13.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
9740c42fcd75c87c365e783426e4baa20cbaaf9069b4a33f804ba9f1020ac43e
|
|
| MD5 |
739afbded7b154e81889e617e82a0c06
|
|
| BLAKE2b-256 |
b79d3bc79ef3f6f5eebc7a9a6d5cb713fe85f936b1c09eac7bfb9f16d152f204
|
File details
Details for the file hyrandom-1.0.5-cp314-cp314-win_amd64.whl.
File metadata
- Download URL: hyrandom-1.0.5-cp314-cp314-win_amd64.whl
- Upload date:
- Size: 110.8 kB
- Tags: CPython 3.14, Windows x86-64
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
8b789276c023bb6d46ea5fad31b794c3610e64b5442b7576cfefcd046fda003e
|
|
| MD5 |
2aa44179120ef86f14598a6d6a9ac7a1
|
|
| BLAKE2b-256 |
aa4f978fab6a82cb3b02a22072c030b6039ce4d75a582cbd06e51c42bd5b98c7
|