7 releases (breaking)
new 0.13.0 | Jan 29, 2025 |
---|---|
0.12.0 | Jan 27, 2025 |
0.11.3 | Nov 24, 2024 |
0.10.2 | Nov 24, 2024 |
0.7.0 | Apr 10, 2024 |
#1425 in Cryptography
85 downloads per month
Used in 5 crates
49KB
825 lines
๐ Platform Support
๐ฐ Citadel Protocol
A post-quantum secure networking protocol that makes developing hyper-secure client-server and P2P applications easy. Built with 100% safe Rust, it provides a robust foundation for creating secure, high-performance network applications with built-in NAT traversal and post-quantum cryptography using a very low memory footprint.
๐ Table of Contents
- ๐ Key Features
- ๐ Quick Start
- ๐ Security Architecture
- ๐ Remote Encrypted Virtual Filesystem
- โก Threading Modes
- ๐พ Backend Storage
- ๐ Documentation
- ๐ Patent and Open Source
- ๐งช Testing
- ๐ก๏ธ Security Considerations
- ๐ค Contributing
- โ๏ธ License
- ๐ Contact
- ๐ฏ Examples
๐ Key Features
- ๐ Advanced Post-Quantum Security - Novel multi-layered ratcheting algorithm
- ๐ก๏ธ Customizable Security Modes - Balance between security and performance
- ๐ Remote Encrypted Virtual Filesystem - Secure remote storage solution
- โก Flexible Threading Modes - Single and multi-threaded operation
- ๐พ Multiple Backend Options - Various storage solutions
- ๐ Built-in NAT Traversal - No port forwarding required
- ๐ฑ Cross-Platform Support - Run anywhere
- ๐ High Performance - Low latency, minimal resource usage
- ๐ Zero Trust Architecture - End-to-end encryption
๐ Advanced Post-Quantum Security
Multiple Key Encapsulation Mechanism (KEM) families:
Novel Multi-layered Security Architecture:
- Patent-pending (allowed) 3D matrix ratcheting algorithm
- Per-message re-keying mechanism
- Multi-layered key exchange protocol
- Multi-layered encryption with customizable algorithms
- Encryption algorithms:
- AES-256-GCM
- ChaCha20-Poly1305
- Ascon-80pq
- Novel Kyber "scramcryption" for enhanced security
- Customizable Security Modes:
- True Perfect Forward Secrecy (PFS) mode with advanced ratcheting
- Best-effort Mode (BEM) for high-throughput scenarios
- Configurable security levels and algorithm combinations
๐ Flexible Network Architecture
- Client-Server and P2P support
- Built-in NAT traversal with STUN/TURN capabilities
- Multiple transport protocols:
- TCP
- TLS (default)
- QUIC
- WebRTC compatibility (optional feature)
โก Advanced Features
- Remote Encrypted Virtual Filesystem (RE-VFS)
- Device-dependent and credential-based authentication
- Automatic peer discovery
๐พ Backend Storage Options
- Local filesystem (default)
- Redis support
- SQL support (MySQL, PostgreSQL, SQLite)
๐ Quick Start
๐ Prerequisites
- Rust toolchain
- OpenSSL
- Clang
๐ฅ Installation
- Add to your
Cargo.toml
:
[dependencies]
citadel_sdk = "latest_version"
- Setup the development environment:
cargo make install
๐ป Basic Usage
๐ฅ๏ธ Server Example
use citadel_sdk::prelude::*;
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
let server = NodeBuilder::default()
.with_node_type(NodeType::server("127.0.0.1:25021")?)
.build(EmptyKernel::default())?;
server.await?;
Ok(())
}
๐ฑ Client Example
use citadel_sdk::prelude::*;
use futures::StreamExt;
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
// Create server connection settings
let server_connection_settings = ServerConnectionSettingsBuilder::credentialed_registration(
"127.0.0.1:12345",
"my_username",
"My Name",
"notsecurepassword",
)
.build()?;
// Create client kernel
let kernel = SingleClientServerConnectionKernel::new(
server_connection_settings,
|connect_success, remote| async move {
let (sink, mut stream) = connect_success.channel.split();
while let Some(message) = stream.next().await {
// Handle incoming messages
}
Ok(())
}
)?;
// Execute the application
NodeBuilder::default().build(client_kernel)?.await?;
Ok(())
}
๐ Security Architecture
The Citadel Protocol implements a novel multi-layered security approach that goes beyond traditional encryption methods:
๐ Multi-layered Ratcheting
- Implements an advanced patent-pending (allowed as of Dec 2024) ratcheting algorithm that operates across multiple security layers
- Each layer maintains its own independent key schedule
- Provides enhanced forward secrecy by frequently rotating keys at different intervals
- Resistant against quantum attacks through post-quantum primitives
๐ก๏ธ Security Modes
- True Perfect Forward Secrecy (PFS):
- Enforces re-keying on a per-message basis
- Guarantees maximum security for messaging applications
- Each message uses a new key derived from the previous state
- Complete forward secrecy at message granularity
- Best-effort Mode (BEM):
- Optimized for high-performance scenarios
- Re-keys as frequently as possible without blocking message transmission
- Maintains security while prioritizing throughput
- Ideal for streaming and high-bandwidth applications
๐ Multi-layered Key Exchange
- Multiple independent key exchanges occur simultaneously
- Combines post-quantum KEMs with traditional algorithms
- Provides defense in depth against both classical and quantum attacks
- Configurable algorithm selection for each layer
โ๏ธ Customizable Security Levels
- Flexible security modes to balance performance and security
- Perfect Forward Secrecy (PFS) mode with advanced ratcheting
- Best-effort Mode (BEM) for high-performance requirements
- Configurable algorithm combinations per security layer
โก Threading Modes
The Citadel Protocol provides flexible threading configurations to accommodate different performance requirements and use cases:
Single-Threaded Mode (Default)
- ๐ Optimized for low-latency and minimal resource usage
- ๐ Extremely low memory footprint
- โก Rapid message processing with zero thread context switching
- ๐ฏ Ideal for:
- Edge devices and IoT applications
- Real-time communication systems
- Memory-constrained environments
- Applications prioritizing consistent low latency
Multi-Threaded Mode
- ๐ Parallel processing for high-throughput scenarios
- ๐ Enhanced scalability for concurrent connections
- ๐ช Optimal CPU utilization across multiple cores
- ๐ฏ Perfect for:
- Server applications handling numerous concurrent clients
- High-traffic network services
- CPU-intensive processing tasks
- Systems requiring maximum throughput
Enable multi-threaded mode by setting the appropriate feature flag:
[dependencies]
citadel_sdk = { version = "latest_version", features = ["multi-threaded"] }
๐ Remote Encrypted Virtual Filesystem
The Remote Encrypted Virtual Filesystem (RE-VFS) is a unique feature that enables secure remote data storage with unprecedented security guarantees:
๐ Key Features
- Store encrypted data on any remote node (peer or server)
- Physical separation of data and decryption keys
- Requires compromising both storage location and client for data access
- Perfect for distributed secure storage solutions
๐ Security Architecture
- Data is encrypted locally using Kyber public key encryption
- Decryption key is never stored with the data
- Uses Kyber scramcryption for minimal ciphertext size
- Optional multiple encryption layers for enhanced security
๐ฏ Use Cases
- Secure cloud storage alternatives
- Distributed backup systems
- P2P file sharing with enhanced security
- Secure document management systems
๐ป Example Usage
use citadel_sdk::fs;
async fn store_file(remote: &mut NodeRemote) -> Result<(), Error> {
// Write file with reinforced security
fs::write_with_security_level(
remote,
"local_file.pdf",
SecurityLevel::Reinforced,
"/virtual/path/output.pdf"
).await?;
// Read file back
let local_path = fs::read(remote, "/virtual/path/output.pdf").await?;
Ok(())
}
๐พ Backend Storage
The Citadel Protocol offers flexible data persistence options to suit various deployment scenarios:
๐ Available Backends
-
๐ In-Memory Storage:
- Fastest performance
- Perfect for temporary sessions
- Ideal for testing and development
-
๐ป Filesystem Backend (default):
- Persistent storage using local filesystem
- Automatic file management
- Suitable for single-node deployments
-
๐ SQL Databases:
- MySQL: Enterprise-grade reliability
- PostgreSQL: Advanced features and scalability
- SQLite: Embedded database option
-
๐ Redis Backend:
- High-performance caching
- Distributed deployment support
- Perfect for session management
๐ Features
- Seamless switching between backends
- Automatic data serialization/deserialization
- Concurrent access support
- Transaction support (where applicable)
- Built-in connection pooling
๐ Documentation
๐ Patent and Open Source Commitment
Status: Allowed as of December 2024
The Citadel Protocol's core technology is a patent-pending innovative security architecture that combines multiple novel features into a unique, highly secure communication system. Despite the patent protection, we remain committed to keeping this technology free and open source for the benefit of the entire community. This approach ensures that:
- The protocol remains freely available for everyone to use
- The patent serves to protect the technology from being closed-source or restricted
- Innovation and security improvements can continue to be community-driven
- The core technology stays accessible while being legally protected from potential abuse
๐งช Testing
The project includes comprehensive test suites. Use cargo-make
for running tests:
# Install cargo-make
cargo install --force cargo-make
# Run local tests
cargo make test-local
# Run comprehensive tests (requires SQL/Redis setup)
cargo make test
๐ก๏ธ Security Considerations
While the Citadel Protocol implements cutting-edge security features:
- The project is pending third-party security audits
- Core cryptographic primitives come from verified Open Quantum Safe (OQS) and PQClean projects
- For maximum security, consider using hybrid cryptography with TLS/QUIC as underlying protocols
๐ค Contributing
Contributions are welcome! Here's how you can help:
- Fork the repository
- Create a feature branch
- Make your changes
- Submit a pull request
Please ensure your code:
- Follows Rust best practices
- Includes appropriate tests
- Is properly documented
- Passes all CI checks
โ๏ธ License
This project is dual-licensed for maximum permissibility under:
๐ Contact
๐ฅ Maintainers
- ๐จโ๐ป Thomas Braun - Inventor and Core Developer
- ๐จโ๐ป Donovan Tjemmes - Developer
Dependencies
~2โ2.8MB
~62K SLoC