Fastest Encryption. Zero-Latency Decryption. Reliable Post-Quantum Security.
View SourceAbhedyam splits cryptography into two necessary halves.
The Shield: NIST LWE (Kyber-768)
Mathematically provable hardness. High-bit entropy. Use this for Cold Storage and protecting assets at rest. It is the unbreakable wall.
The Spear: Chhandas (Poetry)
Steganographic encoding. Ciphertext matches the Anushtubh meter. Use this for Transit through hostile networks. It pierces censorship and evades firewalls.
Decryption in ~5 µs via direct topological mapping to the Sanskrit alphabet.
Based on the Learning With Errors (LWE) problem, resistant to Shor's Algorithm.
Symmetry acts as a biological integrity check. Broken meter = Broken packet. Rejects errors in O(1).
Optimized for Raw Hardness & Speed
Optimized for Stealth & Survival
| Algorithm | Type | Enc (µs) | Dec (µs) | Key Size |
|---|---|---|---|---|
| Abhedya (Standard) | Lattice (Sanskrit) | 352.13* | 0.75 | 1.5 KB |
| Abhedya (Metered) | Lattice (Sanskrit) | ~360.00 | ~5.00 | 1.5 KB |
| Kyber-768 (Ref) | Lattice (Module) | 84.74 | 101.11 | 1.1 KB |
| Classic McEliece | Code-Based | 20.59 | 41.09 | 261 KB |
| FrodoKEM-976 | Lattice | 2500.00 | 2400.00 | 15.6 KB |
| NTRU-HPS-2048 | Lattice | 35.00 | 60.00 | 0.9 KB |
| Saber | Lattice | 58.00 | 64.00 | 1.0 KB |
| BIKE-L1 | Code-Based | 160.00 | 5200.00 | 1.5 KB |
| HQC-128 | Code-Based | 140.00 | 280.00 | 2.2 KB |
| Dilithium-3 | Lattice (Sig) | 130.00 | 55.00 | 1.9 KB |
| Falcon-512 | Lattice (Sig) | 290.00 | 45.00 | 0.9 KB |
| SPHINCS+-SHA256 | Hash-Based | 350,000 | 15,000 | 0.03 KB |
| SIKE-p434 (Broken) | Isogeny | 6,000 | 6,500 | 0.3 KB |
| Rainbow-I | Multivariate | 52.00 | 60.00 | 157 KB |
* Uncached encryption
Verified Compliance Standards:
NIST SP 800-22 (Randomness) FIPS 202 (SHA-3) FIPS 203 (ML-KEM Draft)Refined by adversarial audit. Hardened against expert critiques.
Critique: "Rejection sampling leaks constraints via timing."
The Fix: Implemented Constant-Time Encoding with AVX2 fixed-window search. Encryption time is now mathematically independent of the message.
Critique: "Naive mapping creates statistical fingerprint."
The Fix: Enforced strict Modulus Truncation (q < 3168). Ensures perfectly uniform distribution over the Sanskrit alphabet, removing all bias.
Native performance. Universal compatibility. Ready for production.
Native Core. Zero-cost abstractions and maximum safety.
High-level bindings for AI/ML pipelines and scripting.
WASM-ready integration for edge computing and web apps.
Concurrency-first bindings for backend microservices.
Enterprise-grade integration for C# and F# ecosystems.
Direct FFI access for embedded systems and legacy code.