| Crates.io | cypheron-core |
| lib.rs | cypheron-core |
| version | 0.1.2 |
| created_at | 2025-09-06 03:46:02.736756+00 |
| updated_at | 2025-11-16 01:32:20.689983+00 |
| description | Post-quantum cryptography library with NIST-standardized quantum-resistant algorithms |
| homepage | https://cypheronlabs.com/ |
| repository | https://github.com/CypheronLabs/Cypheron-core |
| max_upload_size | |
| id | 1826706 |
| size | 4,757,399 |
IMPORTANT DEVELOPMENT STATUS NOTICE
This library is currently in ACTIVE DEVELOPMENT (v0.1.1) and is EXPERIMENTAL.
This is a Rust wrapper around official NIST reference implementations - not custom cryptography. The core algorithms are NIST-certified, but the Rust integration layer has NOT undergone:
- Independent security audits of FFI bindings
- Formal verification of memory safety wrappers
- Production environment validation
DO NOT USE IN PRODUCTION without comprehensive integration review and testing.
Risk areas: FFI safety, memory management, build system - NOT the underlying NIST algorithms.
Post-quantum cryptography library providing NIST-standardized quantum-resistant algorithms for secure applications.
Cypheron Core implements post-quantum cryptographic algorithms that protect against both classical and quantum computer attacks. The library provides a secure, high-performance foundation for building quantum-resistant applications.
cargo add cypheron-core
Or add manually to your Cargo.toml:
[dependencies]
cypheron-core = "0.1.1"
git clone https://github.com/CypheronLabs/Cypheron-core.git
cd Cypheron-core/core-lib
cargo build --release
Basic usage:
use cypheron_core::kem::ml_kem_768::MlKem768;
// Generate quantum-resistant key pair
let (public_key, secret_key) = MlKem768::generate_keypair();
// Encapsulate shared secret
let (ciphertext, shared_secret) = MlKem768::encapsulate(&public_key);
// Decapsulate on recipient side
let recovered_secret = MlKem768::decapsulate(&secret_key, &ciphertext);
assert_eq!(shared_secret, recovered_secret);
seccomp-bpf feature)For Linux deployments, Cypheron Core supports seccomp-BPF sandboxing to restrict syscalls and reduce attack surface:
[dependencies]
cypheron-core = { version = "0.1.1", features = ["seccomp-bpf"] }
use cypheron_core::platform::linux::enable_production_security;
// Enable restrictive syscall filtering before cryptographic operations
enable_production_security()?;
// Now only whitelisted syscalls are permitted
// All cryptographic operations continue to work normally
This feature is particularly useful for:
See examples/linux_sandboxing.rs for a complete working example.
Run cargo doc --open to build and view complete API documentation locally.
Or visit cypheron-core-docs
cargo bench for platform-specific metricsWe invite security researchers and cryptography experts to audit this library.
This experimental implementation includes:
cargo test --test test_runner for comprehensive security validationcargo fuzz for robustness testingSecurity findings welcome: Report to security@cypheronlabs.com following our Security Policy.
We welcome contributions! Please see CONTRIBUTING.md for guidelines.
Licensed under the Apache License, Version 2.0. See LICENSE for details.
Built by Cypheron Labs - Advancing post-quantum cryptography.