QSC library core components
QSC bundles symmetric algorithms such as CSX, RCS, SCB, and QMAC with hash functions, KDFs, DRBGs,
and post quantum KEM and signature support. The goal is a self contained toolkit that can serve
as the cryptographic base for entire products, whether they are embedded devices, appliances,
or cloud services.
The same library underpins higher level systems such as SKDP and SATP for symmetric channels,
QSTP and DKTP for tunnel profiles, SIAP and PQS for access and shell, QSMP for secure messaging,
and HKDS for hierarchical keys. This keeps designs consistent and simplifies review, testing, and certification.
Symmetric cryptography including AES, RCS, CSX, and ChaCha20-Poly1305 with integrated authentication and deterministic operation
Hash and XOF functions including SHA-2, SHA-3, SHAKE, and cSHAKE with support for domain separation and extensible output
Message authentication and integrity primitives including KMAC, QMAC, HMAC, and Poly1305 for protocol and data protection
Key derivation and memory hard functions including cSHAKE-based expansion and SCB for password hardening and cost-based derivation
Post-quantum and classical asymmetric support including ML-KEM, McEliece, HQC, ML-DSA, SLH-DSA, Falcon, ECDH, and EdDSA
Integrated X.509 PKI infrastructure with certificate generation, parsing, validation, CRL and OCSP support, and post-quantum signature profiles
Complete TLS 1.3 protocol stack including key schedule, transcript hashing, handshake state machine, and session resumption
Deterministic DRBGs and entropy providers for secure key generation and protocol initialization
Constant-time implementations and MISRA-aligned coding practices for high assurance and side-channel resistance
Portable C23 codebase with optional AVX, AVX2, and AVX-512 optimizations for performance-critical environments
Comprehensive validation including known-answer tests, NIST vectors, fuzzing, and round-trip verification across all modules
Utility modules for secure memory handling, encoding, parsing, and explicit zeroization of sensitive data
Profiles
For varied deployments
Learn about integration