Project Status
Full transparency on what we've built, what we're working on, and where we're going.
Completed
In Progress
"Unbreakable" designs don't fail because of brute force — they fail because of human mistakes. V2 addresses every implementation-level vulnerability that matters in real-world cryptography.
If the random number generator isn't truly 256-bit entropy, the entire security model collapses. V2 validates entropy sources, rejects insufficient randomness, and supports hardware RNG.
Reusing a key with different data leaks information. V2 enforces single-use keys, tracks key usage, and warns on reuse attempts.
Timing attacks, power analysis, cache-based attacks can extract keys without breaking the math. V2 implements constant-time comparisons and operations throughout.
IV reuse in CBC mode is catastrophic. V2 guarantees unique IVs per operation, validates IV length, and adds integrity checking.
Keys in memory, swap files, or core dumps are recoverable. V2 implements secure memory erasure, mlock'd buffers, and key derivation-on-demand.
Buffer overflows, integer overflows, off-by-one errors. V2 adds comprehensive input validation, size checks, and fuzzing-ready test harness.
Future Plans