Post-Quantum Crypto Shield Router — bridge legacy crypto to quantum-safe algorithms with TIBET provenance
Project description
tibet-pqc — Post-Quantum Crypto Shield Router
Bridge legacy RSA/ECC to quantum-safe algorithms without touching legacy devices.
Same pattern as tibet-y2k38: protect legacy via a router, not via replacement.
tibet-pqc shields data from quantum-vulnerable devices by wrapping it in post-quantum cryptography at the router level. Every cryptographic transition is tracked with TIBET provenance tokens.
The "Store Now, Decrypt Later" Crisis
Adversaries are intercepting encrypted traffic today and storing it. When cryptographically relevant quantum computers arrive (~2030), they'll decrypt everything. This is not theoretical — the NSA, NCSC, and BSI are actively warning about it.
Your legacy SCADA PLC running RSA-1024 can't be upgraded. But the data it sends can be shielded at the network boundary.
Install
pip install tibet-pqc
Quick Start
Shield a legacy device
from tibet_pqc import PQCRouter, ClassicAlgorithm
router = PQCRouter()
router.add_device("plc-01", classic=ClassicAlgorithm.RSA_1024, profile="scada")
result = router.shield("plc-01", data=b"sensor_reading_42")
print(result.pqc_algorithm) # ml-kem-512
print(result.security_level) # 1
print(result.shielded) # True
Scan for vulnerable endpoints
tibet-pqc scan example.com:443 api.example.com:443
🟠 example.com:443
Algorithm: rsa-2048 (256 bits)
Risk: HIGH
Migrate: → ml-kem-768 (Level 3)
pqc-scan --json example.com:443 | jq '.[].risk'
View Q-Day countdown
tibet-pqc info
Run interactive demo
tibet-pqc demo
How It Works
[Legacy Device] --RSA/ECC--> [PQC Shield Router] --ML-KEM--> [Internet]
(unchanged) | (quantum-safe)
TIBET audit-trail
JIS quantum-ID
- Legacy device sends data encrypted with classic crypto (RSA, ECDSA, etc.)
- PQC Router intercepts at the network boundary
- Router wraps the data in a post-quantum shell (ML-KEM, ML-DSA)
- Data travels quantum-safe over the internet
- TIBET creates an audit trail of the transition
- JIS provides quantum-resistant device identity
The legacy device never needs to change.
NIST Standards (August 2024)
| Standard | Algorithm | Purpose | Replaces |
|---|---|---|---|
| FIPS 203 | ML-KEM (Kyber) | Key Encapsulation | RSA, ECDH |
| FIPS 204 | ML-DSA (Dilithium) | Digital Signatures | RSA, ECDSA |
| FIPS 205 | SLH-DSA (SPHINCS+) | Hash-based Signatures | RSA, DSA |
Sector Profiles
| Profile | Sector | Classic Crypto | → PQC | SNDL Risk | Compliance |
|---|---|---|---|---|---|
banking |
Financial | RSA-2048 | ML-KEM-1024 | Critical | PCI DSS, DORA, NIS2 |
healthcare |
Medical | RSA-2048 | ML-KEM-768 | Critical | HIPAA, MDR, FDA |
government |
Gov/Defense | RSA-4096 | ML-KEM-1024 | Critical | CNSA 2.0, eIDAS 2.0 |
scada |
Industrial | RSA-1024 | ML-KEM-512 | High | IEC 62443, NIS2 |
telecom |
Telecom | ECDSA-P256 | ML-DSA-65 | Critical | 3GPP, GSMA, NIS2 |
iot |
IoT | ECDSA-P256 | ML-KEM-512 | Medium | ETSI, CE RED |
generic |
IT | RSA-2048 | ML-KEM-768 | High | SOC2, ISO 27001 |
tibet-pqc profiles
tibet-pqc profiles --json
TIBET Provenance
Every shield operation creates a TIBET token:
| Layer | Content |
|---|---|
| ERIN | What was shielded (data hash, algorithm transition) |
| ERAAN | Device dependencies (JIS identity, firmware) |
| EROMHEEN | Context (router, timestamp, network) |
| ERACHTER | Intent (compliance requirement, SNDL protection) |
This gives you proof of when each system was migrated to PQC — critical for compliance audits.
Part of the TIBET ecosystem
| Package | Purpose |
|---|---|
tibet-core |
Protocol core |
tibet-y2k38 |
Y2K38 Time Bridge |
tibet-pol |
Process Integrity Checker |
| tibet-pqc | Post-Quantum Crypto Router |
tibet-overlay |
Identity Overlay |
tibet-twin |
Digital Twin Guard |
License
MIT — Humotica AI Lab 2025-2026
Authors
- J. van de Meent — jasper@humotica.com
- R. AI (Root AI) — root_idd@humotica.nl
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file tibet_pqc-0.1.0.tar.gz.
File metadata
- Download URL: tibet_pqc-0.1.0.tar.gz
- Upload date:
- Size: 13.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
30e05e6d33a6768ee0bef08342541c7b040c0e40f7b176968825282bc02ac0c5
|
|
| MD5 |
606594043f1b25d76b5d80dc13fb8017
|
|
| BLAKE2b-256 |
e622b0bb84d4609a43a194fb8c0cdd7dd2f423613527c79f3edbbcb382cd7de8
|
File details
Details for the file tibet_pqc-0.1.0-py3-none-any.whl.
File metadata
- Download URL: tibet_pqc-0.1.0-py3-none-any.whl
- Upload date:
- Size: 16.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
a594fa3265e24056ff22faf7d9951b2ed0d5a74435dc45a9820bd25354a1a5d7
|
|
| MD5 |
92d54e21146a3f99372f608459e2fd29
|
|
| BLAKE2b-256 |
1cc8a79494016ff64931b384a7e49f8190f7d682b24268f6873ff0c0a26536eb
|