Skip to main content

Post-Quantum Crypto Shield Router — bridge legacy crypto to quantum-safe algorithms with TIBET provenance

Project description

tibet-pqc — Post-Quantum Crypto Shield Router

Bridge legacy RSA/ECC to quantum-safe algorithms without touching legacy devices.

Same pattern as tibet-y2k38: protect legacy via a router, not via replacement.

tibet-pqc shields data from quantum-vulnerable devices by wrapping it in post-quantum cryptography at the router level. Every cryptographic transition is tracked with TIBET provenance tokens.

The "Store Now, Decrypt Later" Crisis

Adversaries are intercepting encrypted traffic today and storing it. When cryptographically relevant quantum computers arrive (~2030), they'll decrypt everything. This is not theoretical — the NSA, NCSC, and BSI are actively warning about it.

Your legacy SCADA PLC running RSA-1024 can't be upgraded. But the data it sends can be shielded at the network boundary.

Install

pip install tibet-pqc

Quick Start

Shield a legacy device

from tibet_pqc import PQCRouter, ClassicAlgorithm

router = PQCRouter()
router.add_device("plc-01", classic=ClassicAlgorithm.RSA_1024, profile="scada")
result = router.shield("plc-01", data=b"sensor_reading_42")

print(result.pqc_algorithm)    # ml-kem-512
print(result.security_level)   # 1
print(result.shielded)         # True

Scan for vulnerable endpoints

tibet-pqc scan example.com:443 api.example.com:443

  🟠 example.com:443
     Algorithm: rsa-2048 (256 bits)
     Risk:      HIGH
     Migrate:    ml-kem-768 (Level 3)
pqc-scan --json example.com:443 | jq '.[].risk'

View Q-Day countdown

tibet-pqc info

Run interactive demo

tibet-pqc demo

How It Works

[Legacy Device]  --RSA/ECC-->  [PQC Shield Router]  --ML-KEM-->  [Internet]
  (unchanged)                       |                              (quantum-safe)
                              TIBET audit-trail
                              JIS quantum-ID
  1. Legacy device sends data encrypted with classic crypto (RSA, ECDSA, etc.)
  2. PQC Router intercepts at the network boundary
  3. Router wraps the data in a post-quantum shell (ML-KEM, ML-DSA)
  4. Data travels quantum-safe over the internet
  5. TIBET creates an audit trail of the transition
  6. JIS provides quantum-resistant device identity

The legacy device never needs to change.

NIST Standards (August 2024)

Standard Algorithm Purpose Replaces
FIPS 203 ML-KEM (Kyber) Key Encapsulation RSA, ECDH
FIPS 204 ML-DSA (Dilithium) Digital Signatures RSA, ECDSA
FIPS 205 SLH-DSA (SPHINCS+) Hash-based Signatures RSA, DSA

Sector Profiles

Profile Sector Classic Crypto → PQC SNDL Risk Compliance
banking Financial RSA-2048 ML-KEM-1024 Critical PCI DSS, DORA, NIS2
healthcare Medical RSA-2048 ML-KEM-768 Critical HIPAA, MDR, FDA
government Gov/Defense RSA-4096 ML-KEM-1024 Critical CNSA 2.0, eIDAS 2.0
scada Industrial RSA-1024 ML-KEM-512 High IEC 62443, NIS2
telecom Telecom ECDSA-P256 ML-DSA-65 Critical 3GPP, GSMA, NIS2
iot IoT ECDSA-P256 ML-KEM-512 Medium ETSI, CE RED
generic IT RSA-2048 ML-KEM-768 High SOC2, ISO 27001
tibet-pqc profiles
tibet-pqc profiles --json

TIBET Provenance

Every shield operation creates a TIBET token:

Layer Content
ERIN What was shielded (data hash, algorithm transition)
ERAAN Device dependencies (JIS identity, firmware)
EROMHEEN Context (router, timestamp, network)
ERACHTER Intent (compliance requirement, SNDL protection)

This gives you proof of when each system was migrated to PQC — critical for compliance audits.

Part of the TIBET ecosystem

Package Purpose
tibet-core Protocol core
tibet-y2k38 Y2K38 Time Bridge
tibet-pol Process Integrity Checker
tibet-pqc Post-Quantum Crypto Router
tibet-overlay Identity Overlay
tibet-twin Digital Twin Guard

License

MIT — Humotica AI Lab 2025-2026

Authors

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tibet_pqc-0.1.0.tar.gz (13.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

tibet_pqc-0.1.0-py3-none-any.whl (16.7 kB view details)

Uploaded Python 3

File details

Details for the file tibet_pqc-0.1.0.tar.gz.

File metadata

  • Download URL: tibet_pqc-0.1.0.tar.gz
  • Upload date:
  • Size: 13.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_pqc-0.1.0.tar.gz
Algorithm Hash digest
SHA256 30e05e6d33a6768ee0bef08342541c7b040c0e40f7b176968825282bc02ac0c5
MD5 606594043f1b25d76b5d80dc13fb8017
BLAKE2b-256 e622b0bb84d4609a43a194fb8c0cdd7dd2f423613527c79f3edbbcb382cd7de8

See more details on using hashes here.

File details

Details for the file tibet_pqc-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: tibet_pqc-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 16.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_pqc-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 a594fa3265e24056ff22faf7d9951b2ed0d5a74435dc45a9820bd25354a1a5d7
MD5 92d54e21146a3f99372f608459e2fd29
BLAKE2b-256 1cc8a79494016ff64931b384a7e49f8190f7d682b24268f6873ff0c0a26536eb

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page