Secure Handover Protocol
QuantumPy facilitates the safe encryption and transmission of sensitive data between parties. By leveraging end-to-end pass-key logic, you can securely give data to another person, ensuring that even if the assets are intercepted by third parties, they remain completely impenetrable. Both sender and receiver leverage the QuantumPy engine to maintain high-integrity localized encryption and decryption.
Security Boundaries
Defining the perimeter in a post-compromise environment.
Defensive Capabilities
Out of Scope
Cryptographic Primitives
QuantumPy shifts from legacy PBKDF2 to memory-hard foundations, ensuring long-term data durability against evolving compute capabilities.
AES-256-GCM
Authenticated encryption providing IND-CCA2 security levels.
AAD Binding
Cryptographic metadata binding to prevent splicing attacks.
KDF Efficiency Scaling
Relative computational cost for automated GPU clusters.
Configuration Lab
Simulate how the engine optimizes performance based on host hardware availability.
Protocol Settings Guide
Comprehensive reference for engine configuration and operational security.
Secure Shredder
Defense Against Forensics Overwrite original files with cryptographically random data before deletion. Prevents recovery tools (Recuva, EnCase) from salvaging unencrypted remnants from the disk platter or flash cells.
Container Strategy
ZIP vs RAW ZIP: Standard compatibility. RAW: A custom stream format that supports pause/resume operations for large datasets. RAW strips standard headers, offering slightly better obfuscation.
Block Optimization
Performance Tuning Controls the chunk size (1MB - 64MB) for the GCM pipeline. Larger blocks increase throughput on modern CPUs but require higher RAM. 'Auto' mode scales based on available system memory.
Keyfile Auth (2FA)
Physical Token Requires both a password AND a specific file (image, document, or random keyfile) to decrypt. If the keyfile is missing, the password alone is mathematically useless.
Steganography
Plausible Deniability Embeds the encrypted payload inside a carrier file (like a standard JPEG or WAV). The output remains a valid, viewable image, hiding the existence of the secret data.
Camouflage Mode
Evasion Masks the output file as a system log (`.log`) or binary data file (`.dat`), allowing it to blend into system folders and avoid casual visual inspection.
Stream Format: .qenc
Stateless binary layout designed for resumable, high-integrity I/O.
Enterprise Archetypes
Specialized configurations for critical operations.