1 unstable release

0.0.1 Sep 22, 2024

#23 in #depth

Download history 186/week @ 2024-09-16 43/week @ 2024-09-23 13/week @ 2024-09-30

242 downloads per month

MIT license

14KB
193 lines

LAQ-Fort

Encryption for the mighty.

LAQ-Fort (Lattice Authenticated Quantumn Fortress) is a ultra secure encryption algorithm that is quantum resistant. It is based on the Kyber lattice-based algorithm along with AES-256 encryption with a custom multiplier for amount of AES layers. LAQ-Fort also utilizes a fractal encryption method to further secure the data with a custom depth level. The algorithm is designed to be quantum resistant and secure against all known attacks.

Installation

Add the following to your Cargo.toml file:

[dependencies]
laqfort = <laqfort-version>

Example Usage

use laqfort::*;
use zeroize::Zeroize;
use std::str;
use clap::Parser;
use pqc_kyber::{keypair, Keypair};

#[derive(Parser, Debug)]
#[clap(author, version, about, long_about = None)]
pub struct Args {
    #[clap(short, long, default_value_t = 3)]
    pub depth: usize,

    #[clap(short, long, default_value_t = 8)]
    pub mult: usize,

    // Data to be encrypted
    #[clap(long)]
    pub data: Option<String>,
}

fn main() {
    let args = Args::parse();
    let mut rng = rand::thread_rng();
    let Keypair { public, mut secret } = keypair(&mut rng).unwrap();
    let (ciphertexts, mut shared_key) = triple_encapsulation(&public, &mut rng).unwrap();
    triple_decapsulation(&secret, &ciphertexts).unwrap();
    let key = &shared_key;
    let depth = args.depth;
    let mult = args.mult;
    let mle_key = "mle_key";
    let data = args.data;
    let encrypted_data = laqf_encrypt(depth, mult, data, mle_key, key).unwrap();
    let decrypted_data = laqf_decrypt(depth, mult, Some(encrypted_data.clone()), mle_key, key).unwrap();
    println!("Encrypted data: {}", encrypted_data);
    println!("Decrypted data: {}", str::from_utf8(&decrypted_data).unwrap());

    // MLE wrong key decrypt
    let wrong_mle_key = "wrong_mle_key";
    let decrypted_data = laqf_decrypt(depth, mult, Some(encrypted_data.clone()), wrong_mle_key, key).unwrap();
    println!("Wrong MLE key decrypted data: {}", str::from_utf8(&decrypted_data).unwrap());

    // Zeroize the shared key after use
    shared_key.zeroize();

    // Zeroize the secret key after use
    secret.zeroize();
}

Dependencies

~3.5MB
~67K SLoC