CL
GITHUB

Demo boxes are pre-loaded. Use any 2 of 3 passwords to open:

Box Password 1 Password 2 Password 3
01 ๋ฌด๊ถํ™” ํƒœ๊ทน๊ธฐ ํ•œ๋ผ์‚ฐ
03 ruby emerald diamond
04 ๊ฑฐ๋ถ์„  ์ฒจ์„ฑ๋Œ€ ์„๊ตด์•”
06 fortress bastion citadel
07 ๋ด„๋ฐ”๋žŒ ์—ฌ๋ฆ„๋น„ ๊ฐ€์„๋‹ฌ
09 monday tuesday wednesday
Initializing KpqC modules (SMAUG-T + HAETAE)โ€ฆ

Vault โ€” Safety Deposit Boxes

AES-256-GCM Shamir SSS / GF(2โธ) SMAUG-T (์Šค๋งˆ์šฐ๊ทธ-T) โ€” KEM HAETAE (ํ•ดํƒœ) โ€” signature

Research Origin

This project demonstrates Korean post-quantum cryptographic algorithms compiled to WebAssembly for educational and experimental use.

Algorithms included:

The implementations are derived from reference code produced by Korean cryptography researchers as part of the KpqC competition.

โšก Quick Decision Rules

Encrypt data at rest โ†’ AES-256-GCM Not AES-CBC, not ECB
Split a key among parties โ†’ Shamir SSS / GF(2โธ) Not XOR splitting
Quantum-safe key exchange โ†’ SMAUG-T KEM / ML-KEM Not raw RSA, not static DH
Sign & verify data โ†’ HAETAE / ML-DSA Not RSA-PKCS1v1.5

When unsure โ†’ AES-256-GCM + Argon2id + ML-KEM. These are safe defaults.

๐Ÿ’ฅ What Breaks If You Choose Wrong

Nonce reuse (AES-GCM)

Attacker recovers XOR of plaintexts + the authentication key. Total break.

Too few Shamir shares

Reconstruction produces random garbage. No partial leak โ€” information-theoretically secure.

Skip signature verification

Attacker substitutes containers or shares. Chosen-ciphertext attacks become possible.

Classical-only key exchange

Harvest now, decrypt later. Quantum computer breaks RSA/ECDH retroactively.

โš ๏ธ Disclaimers