Post-Quantum Cryptography

Start Your Journey Towards Quantum-Resistant Security

Terra Quantum's open-source PQC library featuring NIST-aligned algorithms, TQ42 Cryptography, empowers developers, businesses, and government entities to seamlessly integrate quantum-resistant security measures.

Introducing TQ42 Cryptography

The Most Comprehensive NIST-Aligned Open-Source PQC Library

A Growing Suite of Post-Quantum Algorithms and Key Management Functions

An open-source post-quantum cryptography library developed by Terra Quantum, TQ42 Cryptography is a cutting-edge suite of post-quantum algorithms and key management functions, providing an accessible entry point for organizations to integrate quantum-resistant security measures into their applications.

The C++ library will expand to include support for additional languages (e.g., Python, iOS, Android), additional post-quantum algorithms, and upgrade options, like the ability to purchase quantum keys.

TQ42 Cryptography Key Features

Open Source Library for Secure Data Transmission, Storage and Authentication

A wide range of post-quantum cryptographic algorithms, helping you fortify your digital defences:

Hash
Functions
SHA-3

(224, 256, 384, 512, SHAKE-128, SHAKE-256)

Symmetric Encryption
AES-256

(ECB, CBC, OFB, CTR)

Digital Signature
Falcon

Post-Quantum Algorithm

Digital Signature
ML-DSA

FIPS 204-Aligned Post-Quantum Algorithm

Hash-Based Digital Signature
SLH-DSA

FIPS 205-aligned Stateless Hash-Based Signature Post-Quantum Algorithm

Key Encapsulation Mechanism
ML-KEM

FIPS 203-Aligned Key Encapsulation Mechanism Post-Quantum Algorithm

Key Encapsulation Mechanism
Classic McEliece

Code-Based Encryption Scheme

Comprehensive Key Management
TQ Key Containers

Proprietary Key Containers With Encryption

Example Use Cases

Encompassing a Wide Range of Applications

TQ42 Cryptography is designed for versatility, enabling implementation across diverse platforms such as web and mobile applications, IoT devices, cloud systems, blockchains, and Raspberry Pi.

  • Cryptographic Protocols
  • Cloud Security
  • Electronic Signature
  • Authentication
  • Blockchain Security
  • IoT Security
  • Wi-Fi Security
  • Perfect Forward Secrecy (PFS)
Enhancing Cryptographic Protocols
• FIPS-aligned post-quantum algorithms for enhanced security
• Robust key encapsulation mechanisms for secure key exchange
• Advanced digital signature schemes for data integrity and non-repudiation
Advanced Cloud Security
Encrypt data in cloud storage and computing services. TQ42 Cryptography helps you maintain control over your data's security, even when it resides in the cloud.
Electronic Signature Security
Validate electronic documents, contracts, and agreements with quantum-resistant digital signatures. TQ42 Cryptography enables secure document signing, software distribution, and code signing.
Secure Authentication
Secure authentication systems and user credentials with password hashing, symmetric key authentication, and electronic signature authentication. TQ42 Cryptography helps you protect user identities and prevent unauthorized access.
Enhancing Blockchain Security
Integrate quantum-resistant cryptography into your blockchain applications. TQ42 Cryptography provides digital signature and hashing capabilities to ensure the integrity and security of your blockchain transactions.
Quantum-resistant IoT Security
Safeguard your IoT devices and the data they collect with quantum-resistant encryption and authentication. TQ42 Cryptography helps you protect your IoT ecosystem from quantum computing threats.
Strengthen Your Wi-Fi Security
Enhance your Wi-Fi network's security by generating strong, quantum-resistant passwords and encryption keys. TQ42 Cryptography can be used to create unique passwords for each new device connecting to your network and encrypt password files using keys derived from the administrator password.
Achieving Perfect Forward Secrecy (PFS)
Integrate TQ42 Cryptography into your PFS scheme to ensure that each node contributes its share of entropy to the overall symmetric session key. With TQ42 Cryptography, you can prevent outside parties from learning the session key by breaking long-term keys, as the final encryption key is not forwarded in its entirety.
User Guide

Getting Started with TQ42 Cryptography

To start using TQ42 Cryptography, follow these simple steps:

Explore and Clone our GitHub Repository

Visit our GitHub repository to discover our extensive codebase, documentation, and resources. Clone the library to your local development environment, enabling you to start using its features and tailor them to your specific security needs.

Choose Your Preferred Build Environment

Select the build method that best suits your development workflow: Visual Studio - Ideal for Windows-based development with comprehensive IDE support. Linux - Perfect for cross-platform development and integration with open-source ecosystems. Each option provides robust tools to compile and integrate TQ42 Cryptography.

Integrate TQ42 Cryptography into Your Project

Link the TQ42 Cryptography headers and compiled library to your project. This crucial step allows you to access the full range of post-quantum cryptographic functions within your application.

Leverage the API for Quantum-Resistant Security

Dive into our comprehensive API reference and examples to implement cutting-edge, quantum-resistant cryptography in your applications. From key encapsulation to digital signatures, our API empowers you to fortify your software against both classical and quantum threats.

Go Further

Explore our Other Quantum Security Resources

For more information about TQ42 Cryptography and Terra Quantum's quantum security solutions, explore our resources or reach out to our team.