Protocol suite overview
Core library plus specialized protocols for transport, identity, messaging, and secure tunnels
The QSC Library
The QSC library is a portable MISRA-aligned C library implementing symmetric ciphers, hash and MAC functions, post-quantum ciphers and signature schemes, a complete sockets library, asynchronous threading, and a extensive set of support functions. Emphasizes deterministic lifecycles, constant-time discipline, secure memory handling, and cross-platform builds with reproducible tests and vectors.
Heirarchal Key Distribution System
HKDS provides quantum-safe keying without reliance on asymmetric primitives primitives. Built as a replacement for DUKPT, and designed for durable security properties using the SHA3 SHAKE XOF function and KMAC authentication, minimal assumptions, and straightforward implementation, with emphasis on verifiable hashing workflows and clear operational guidance.
The Post-Quantum Shell
PQS is a remote shell protocol using post-quantum primitives (e.g., Kyber for encryption, Dilithium for signatures) with SHA3 hashing and the RCS AEAD cipher for authenticated encryption. Incorporates strict message sizing, valid-time windows, and anti-replay checks across the key-exchange and packet flow.
Dual Key Tunneling Protocol
DKTP combines an asymmetric key exchange, and a pre-shared key. Uses Kyber or McEliece asymmetric cipher, Dilithium or SPHINCS+, and SHA3-512 for authentication. True 512-bit per channel post-quantum security makes DKTP the most powerful encrypted tunneling protocol in the world.
Quantum Secure Messaging Protocol
QSMP is a post-quantum framework for low-latency, end-to-end encrypted communication. It has 2 modes, SIMPLEX 256-bit secure server client, and DUPLEX, a 512-bit client to client encrypted tunnel. It uses lattice or hash-based asymmetric signatures in simplex or duplex modes, and McEliece or Kyber encryption, ensuring message integrity, forward secrecy, and resistance to quantum and classical attacks for secure, real-time transmission across distributed systems.
Quantum Secure Tunneling Protocol
QSTP is a post-quantum tunneling protocol providing authenticated, encrypted communication channels. It uses hybrid key exchanges, stream encryption, a lightweight root-anchored certificate scheme, and hash-based authentication to ensure confidentiality, integrity, and forward secrecy for secure data transport across modern network and infrastructure applications.
Symmetric Authenticated Tunneling Protocol
SATP is a symmetric post-quantum tunneling protocol that establishes encrypted, authenticated communication channels using pre-shared symmetric keys and nonce-based initialization. It provides confidentiality, message integrity, and replay protection, enabling high-speed, low-latency secure data exchange across trusted endpoints without requiring asymmetric cryptography or external key infrastructure.
Secure Key Distribution Protocol
SKDP is a post-quantum symmetric protocol for distributing session keys across trusted nodes. It employs authenticated encryption, nonce-based key rotation, and hash-derived key material to ensure confidentiality, integrity, and forward secrecy, enabling secure, lightweight key exchange in constrained or high-performance network environments.
Secure Infrastructure Access Protocol
SIAP is a post-quantum two-factor authentication system for secure infrastructure and device access. It uses a hardware key-tree token with a user passphrase to derive single-use symmetric keys, ensuring offline verification, forward secrecy, and deterministic, auditable authentication in critical embedded and enterprise environments.
Multi-Party Domain Cryptosystem
MPDC is a post-quantum Multi-Party Cryptosystem that establishes authenticated domains across servers, agents, and clients. It combines hybrid asymmetric and symmetric key exchange, deterministic policy enforcement, and hierarchical certification to ensure confidentiality, integrity, and coordinated governance for secure, federated, and large-scale network infrastructures.
Universal Digital Identity Framework
UDIF is a post-quantum identity and authentication architecture that unifies users, devices, and organizations under a cryptographically verifiable model. It employs hash-based identifiers, certificate chains, and secure messaging to ensure authenticity, privacy, and traceability across domains, supporting decentralized identity governance and interoperable trust infrastructures.
Authenticated Encrypted Relay Network
AERN is a post-quantum secure relay architecture enabling private, end-to-end encrypted communication across distributed nodes. It uses authenticated key exchange, encrypted route maps, and session resumption mechanisms to provide anonymity, integrity, and forward secrecy for secure routing, messaging, and data transport across decentralized infrastructures.