Introducing Socket Firewall: Free, Proactive Protection for Your Software Supply Chain.Learn More
Socket
Book a DemoInstallSign in
Socket

hsynchronous-fs

Package Overview
Dependencies
Maintainers
1
Versions
2
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

hsynchronous-fs

Post-Quantum filesystem encryption using a hybrid encryption protocol "hsynchronous"

latest
npmnpm
Version
1.0.1
Version published
Maintainers
1
Created
Source

Post-quantum filesystem encryption

Post-Quantum filesystem encryption using a hybrid encryption protocol "hsynchronous"


❯ hsynchronous-fs --help
  Usage: src [options] [command]

  Commands:
    help     Display help
    version  Display version

  Options:
    -d, --drive [value]  The Drive letter to mount to (defaults to "A")
    -f, --file [value]   The input and output file that holds your encrypted data (defaults to "./encrypted")
    -h, --help           Output usage information
    -k, --key            The key file path
    -v, --version        Output the version number

Official Rating: NIST Level 4 (Highest commercial/government grade with post-quantum resistance)

ComponentAlgorithm/StrengthSecurity LevelNotes
Key Encapsulation (KEM)ML-KEM-1024 (Kyber)NIST Level 3 (PQC Standard)Post-quantum secure, IND-CCA2
Digital SignatureFalcon-1024NIST Level 3 (PQC Standard)Post-quantum secure, EUF-CMA
Symmetric EncryptionAES-256-GCM256-bit (NIST-approved)Quantum-resistant key size, provides confidentiality + integrity
Key DerivationHKDF-SHA256256-bit (NIST SP 800-56C)Proper key separation with context binding
Random Number Generationcrypto.randomBytes()Cryptographically secure (CSPRNG)Uses OS entropy source

Resistance Against Attacks

Attack TypeProtection MechanismAdditional Notes
Quantum computingML-KEM-1024 (IND-CCA2) + Falcon-1024 (EUF-CMA)Full PQC resistance
MITM attacksFalcon-1024 signatures + protocol bindingNon-repudiation
Key compromiseEphemeral KEM keys (per message) + HKDF with unique saltsNo long-term key reuse
Replay attacks64-byte random salts + 12-byte IVs (2¹²⁸ uniqueness)Statistically negligible collision risk
CRIME/BREACHNo compression (removed in v2) + encryption before any encodingMitigates compression oracles
Key derivation attacksHKDF-SHA256 with protocol-specific info bindingPrevents cross-context reuse
Timing attackstimingSafeEqual + constant-time HMAC (padded inputs)Resists timing leaks
Memory scrapingExplicit secureZero for sensitive buffersPrevents cold-boot attacks
Error oraclesUnified error paths (generic "decryption failed" messages)Hides cryptographic faults
Side-channel leaksMinimum processing time (MIN_PROCESSING_TIME)Obscures operation timing
Metadata leakageFixed block padding (1024-byte chunks)Hides true message size

Benchmarking

clk: ~2.51 GHz
cpu: 13th Gen Intel(R) Core(TM) i5-13420H
runtime: node 22.13.1 (x64-win32)

benchmark                   avg (min … max) p75 / p99
------------------------------------------- ---------
GenKeys                       47.33 ms/iter  53.51 ms 
                      (35.52 ms … 64.85 ms)  58.01 ms 
                    (  2.71 kb …  20.49 kb)   4.53 kb 

Encrypt                       13.08 ms/iter  14.28 ms 
                       (9.73 ms … 25.82 ms)  24.94 ms
                    ( 23.41 kb …  39.29 kb)  24.86 kb

Decrypt                      622.42 µs/iter 878.20 µs
                      (259.30 µs … 2.62 ms)   1.87 ms
                    (472.00  b … 493.76 kb)  16.20 kb
  • Protocol/version mismatch
  • Unsupported algorithms detected
  • Malformed key data

Keywords

aes-encryption

FAQs

Package last updated on 02 Jul 2025

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts