Code Monkey home page Code Monkey logo

sartimo / crowntitanium Goto Github PK

View Code? Open in Web Editor NEW
1.0 1.0 0.0 2.1 MB

CROWNTITANIUM: an in-house made asymmetric supercipher encryption with post-quantum resistance

C++ 0.58% C 47.39% Python 0.54% CMake 1.00% Batchfile 0.01% Shell 0.81% Assembly 44.72% PHP 0.34% Makefile 0.87% M4 0.01% Euphoria 0.01% Roff 3.73%
bike cryptography encryption mceliece ntru quantum-resistant quantum-resistant-cryptosystems security wraith dilithium kyber kyber-crystal

crowntitanium's Introduction

CROWNTITANIUM - Asymmetric post-quantum resistant supercipher with 2048 bit security

an in-house made asymmetric supercipher encryption with post-quantum resistance. intended to be used for file encryption. possibly the most powerful open-source encryption to-date.

Features

  • CROWNTITANIUM is a novel in-house made asymmertric supercipher with post-quantum resistancy that I made, so I can encrypt highly dangerous malware and post them here on github so nobody can use them.
  • CROWNTITANIUM is a supercipher encryption, this means it consists of multiple encryption layers combined. I chose 4 different layers. I will outline them quickly for you.

Let's take a plaintext file for our example scenario.

  1. AES 256 bit: Plaintext file will be encrypted using AES 256 bit algorithm.
    1. Generates Public and Private Key used for encrypting and decrypting the file
  2. CAMELLIA Sub-Supercipher 768 bit: On top of that first encryption layer (AES 256), the file will be encrypted again using a sub-supercipher.
    1. Another AES 256 bit Layer: First the file will be encrypted again using AES 256 bit algorithm. this extends the composable security of this sub-cipher.
      1. Generates Public and Private Key for encrypting and decrypting the file
    2. ChaCha20 256 bit: The encrypted AES 256 bit file will go through another layer of encryption. this time with a ChaCha20 256 bit algorithm.
      1. Symmetric Key used
    3. CAMELLIA 256 bit: The final encryption layer of this sub-supercipher uses a strong asymmetric CAMELLIA 256 bit layer.
      1. Generates Public and Private Key
    4. Passphrase hashed SHA3-512 The resulting keys of the sub-supercipher will be hashed using SHA3-512
  3. NTRU Prime (Post-Quantum Resistant): After completing the CAMELLIA sub-supercipher, the file will be encrypted using a quantum-resistant algorithm called NTRU prime. NTRU Prime is known to be very efficient.
    1. Generates Public and Private Key using KEM
  4. Kyber-CRYSTAL and dilithium (Post-Quantum Resistant): The last encryption layer is a Kyber-CRYSTAL and dilithium algorithm which is known to be extremely performant.
    1. Generates Public and Private Key using KEM
  • As you see CROWNTITANIUM uses 11 different keys for a complete encryption or decryption of a file. A single file goes through seven different encryption layers until it is fully encrypted.

add support for custom CROWNTITANIUM-over-HTTPS (CoH) and signing support.

crowntitanium's People

Contributors

sartimo avatar

Stargazers

 avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.