symbolicsoft

Faster, Smaller, Harder HPKE for Rust

10
0
100% credibility
Found May 09, 2026 at 10 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Rust
AI Summary

A Rust library for secure public-key encryption that protects messages using hybrid keys, with options for quantum resistance and built-in safety checks.

How It Works

1
🔍 Discover hpke-ng

You learn about a smart tool that keeps messages private and safe from prying eyes, even against future supercomputers.

2
📦 Bring it into your app

You simply add this protection to the message app you're making, and it fits right in.

3
🔐 Pick your security strength

Choose the level of lock that matches your needs, from strong everyday shields to unbreakable future-proof ones.

4
🗝️ Make matching secret keys

Create a pair of keys for you and your friend, so only they can unlock what you send.

5
✉️ Lock your message tight

Wrap your private note with their key, and send it off feeling completely secure.

6
🔓 Unlock perfectly

Your friend uses their key to reveal the exact original message, every time.

Messages stay secret forever

Now your conversations are protected no matter who tries to peek, bringing peace of mind.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 10 to 10 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is hpke-ng?

hpke-ng delivers a Rust implementation of HPKE (RFC 9180), the standard for hybrid public-key encryption using KEMs, KDFs, and AEADs. It lets developers encrypt messages with explicit modes like base, PSK, auth, or auth-PSK, supporting classic curves (X25519, P-256) and post-quantum options (ML-KEM, X-Wing) behind a `no_std` facade. Users get single-shot seal/open APIs plus reusable contexts for streaming, all with caller-provided RNGs to avoid state pitfalls.

Why is it gaining traction?

It trims overhead from alternatives like hpke-rs: zero-sized configs, 80-byte contexts (vs 400), and 30% smaller binaries for faster, smaller builds. Benchmarks show 20-55% speedups on PQ decaps and encap, with compile-time checks catching mode mismatches or wrong keys—instead of runtime panics. Rust's type system enforces ciphersuites, making it harder to misuse while enabling export-only modes without seal/open footguns.

Who should use this?

Rust crypto engineers integrating HPKE into protocols like Messaging Layer Security or WireGuard hybrids. Teams migrating from hpke-rs for perf in embedded/no_std apps, or adding PQ resistance without auth modes (PQ KEMs block them at compile time). Ideal for library authors needing type-safe, audited primitives with fuzzing and KATs.

Verdict

Swap in hpke-ng if you're on hpke-rs and chasing faster, smaller HPKE—migration takes under an hour via type aliases and explicit modes. At 10 stars and 1.0% credibility, it's pre-1.0 (rc.2) but battle-tested with Criterion benches, cargo-fuzz, and differential tests; solid docs and announcement post ease evaluation.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.