Vault โ Safety Deposit Boxes
Research Origin
This project demonstrates Korean post-quantum cryptographic algorithms compiled to WebAssembly for educational and experimental use.
Algorithms included:
- SMAUG-T (์ค๋ง์ฐ๊ทธ-T) โ lattice-based Key Encapsulation Mechanism (KEM)
- HAETAE (ํดํ) โ post-quantum digital signature algorithm
The implementations are derived from reference code produced by Korean cryptography researchers as part of the KpqC competition.
โก Quick Decision Rules
When unsure โ AES-256-GCM + Argon2id + ML-KEM. These are safe defaults.
๐ฅ What Breaks If You Choose Wrong
Nonce reuse (AES-GCM)
Attacker recovers XOR of plaintexts + the authentication key. Total break.
Too few Shamir shares
Reconstruction produces random garbage. No partial leak โ information-theoretically secure.
Skip signature verification
Attacker substitutes containers or shares. Chosen-ciphertext attacks become possible.
Classical-only key exchange
Harvest now, decrypt later. Quantum computer breaks RSA/ECDH retroactively.
โ ๏ธ Disclaimers
- Educational only โ do not use for production data protection.
- Not audited โ C reference implementations have not undergone formal security audit.
- Browser WASM timing is not constant-time. Side-channel resistance is not guaranteed.