Stateless Passwords
Phantom Vault
Derive any password from a master passphrase using HMAC-DRBG. Nothing stored, nothing synced, nothing left behind to breach.
PBKDF2-SHA-256 HMAC-DRBG Rejection Sampling
Backdoored RNG
Corrupted Oracle
A live Dual_EC_DRBG backdoor demo showing state recovery and future-output prediction while standard statistical tests still appear clean.
Dual_EC_DRBG HMAC-DRBG ChaCha20-DRBG P-256
Asymmetric Encryption
Iron Letter
ECIES P-256 and RSA-OAEP compared side by side with live timing, key-size tradeoffs, and a simple sealed-letter mental model.
ECIES P-256 RSA-OAEP AES-256-GCM
Post-Quantum
Quantum Vault KpqC
Threshold file encryption using secret sharing and Korean post-quantum cryptography, compiled to WASM for direct browser use.
AES-256-GCM Shamir SSS SMAUG-T HAETAE
Homomorphic Encryption
Blind Oracle
A server computes on encrypted values without seeing the plaintext. A concise, live introduction to FHE using TFHE-rs.
TypeScript Rust TFHE-rs
Stream Cipher
Snow 2
A modern Rust reimplementation of SNOW with AEAD support, Argon2id-derived keys, and steganographic output options.
XChaCha20-Poly1305 Argon2id HKDF-SHA-256 Steganography
Encrypted Morse
Dad Mode Morse
AES-GCM encrypted messaging delivered as Morse code with audio playback and browser decoding. Intentionally playful, still grounded in real primitives.
AES-256-GCM Argon2id HKDF-SHA-256 Ed25519
Library Privacy
Patron Shield
Information-theoretic private information retrieval applied to catalog privacy. A direct bridge from library ethics to concrete mathematical guarantees.
IT-PIR XOR Secret Sharing Chor et al. 1995
Secure MPC
Silent Tally
Five hospitals compute a combined enrollment total without revealing any individual counts, demonstrating additive-homomorphic MPC in the browser.
Shamir SSS GF(2^61-1) Lagrange Interpolation Additive Homomorphism
Threshold Signatures
FROST Threshold
A browser-based FROST (RFC 9591) walkthrough where any qualified signer subset can produce one standard Ed25519 signature without key reassembly.
FROST (RFC 9591) Ed25519 Nonce Commitments VSS Commitments
Post-Quantum Signatures
Dilithium Seal
CRYSTALS-Dilithium (ML-DSA) digital signatures in the browser. Generate lattice-based key pairs, sign documents, and verify — all post-quantum safe.
ML-DSA CRYSTALS-Dilithium Lattice
Forward-Secret Messaging
Ratchet Wire
A live walkthrough of the Double Ratchet protocol powering Signal-style messaging, with per-message key derivation and forward secrecy guarantees.
Double Ratchet X25519 HKDF AES-256-GCM
Post-Quantum KEM
Kyber Vault
CRYSTALS-Kyber (ML-KEM) key encapsulation in the browser. Encapsulate, decapsulate, and compare lattice-based key exchange against classical ECDH.
ML-KEM CRYSTALS-Kyber Lattice AES-256-GCM
Block Cipher
Iron Serpent
The Serpent block cipher — AES finalist with a deeper security margin. Live encryption rounds, S-box visualization, and side-by-side AES comparison.
Serpent AES-256 SPN
Secret Sharing
Shamir Gate
Split a secret into shares using Shamir's Secret Sharing and reconstruct with any qualified threshold subset. Polynomial interpolation made tangible.
Shamir SSS Lagrange Interpolation GF(p)
Historical Cipher
Dead Sea Cipher
Ancient substitution and transposition ciphers rooted in historical cryptographic traditions. Encode, decode, and explore classical cryptanalysis techniques.
Substitution Transposition Atbash
Hash-Based Signatures
SPHINCS+ Ledger
Stateless hash-based signatures (SLH-DSA) in the browser. A post-quantum signing scheme that relies only on the security of hash functions.
SLH-DSA SPHINCS+ SHA-256 FORS