ko

Kyber Odyssey: Charting a course for secure innovation in a post-Crowdstrike world

https://github.com/qompassai/ko

Science Score: 36.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
    Found .zenodo.json file
  • DOI references
  • Academic publication links
    Links to: arxiv.org, pubmed.ncbi, ncbi.nlm.nih.gov, mdpi.com, ieee.org
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (7.0%) to scientific vocabulary

Scientific Fields

Mathematics Computer Science - 43% confidence
Earth and Environmental Sciences Physical Sciences - 40% confidence
Biochemistry, Genetics and Molecular Biology Life Sciences - 40% confidence
Last synced: 4 months ago · JSON representation

Repository

Kyber Odyssey: Charting a course for secure innovation in a post-Crowdstrike world

Basic Info
  • Host: GitHub
  • Owner: qompassai
  • License: other
  • Language: C
  • Default Branch: main
  • Size: 1.25 GB
Statistics
  • Stars: 0
  • Watchers: 0
  • Forks: 0
  • Open Issues: 0
  • Releases: 12
Created over 1 year ago · Last pushed 4 months ago
Metadata Files
Readme Funding License Citation Zenodo

README.md

Repository Views GitHub all releases OpenSSL
OpenSSL Documentation Post-Quantum SSL Tutorials
NIST
NIST Cybersecurity Framework NIST SP 800-53 Security Controls Technical Guide to Information Security Testing
NIST NICE Cybersecurity Workforce Framework NIST Risk Management Framework NIST Privacy Framework License: AGPL v3 License: Q-CDA

Kyber Odyssey: Charting a course for secure innovation in a post-Crowdstrike world

Authors

Matt A. Porter, B.S1, Marcheta J. Hill, DO2, Dawn L. Laporte, MD3, Amiethab A. Aiyer, MD3

1Qompass, Spokane, WA
2Arnot Ogden Medical Center Emergency Medicine Residency Program, Elmira, NY
3The Johns Hopkins University School of Medicine, Department of Orthopaedic Surgery, Baltimore, MD

2025 American Medical Association (AMA) Challenge Poster & Writeup
## 2025 AMA Research Challenge Poster [Kyber Odyssey](./KO_MAP_AMA_2025_Turnin.pdf) ## Abstract ### Background The catastrophic Crowdstrike patch failure of July 19, 2024, exposed critical vulnerabilities in global healthcare systems, stemming from a memory safety issue in C++ code. This null pointer error, a common pitfall in languages without automatic memory management, led to system-wide failures in Microsoft-based environments while Linux/GNU and Apple systems remained unaffected. This event underscores the urgent need for robust, quantum-resistant cryptographic solutions in healthcare IT infrastructure. ### Methods We developed a protocol for building and benchmarking National Institute of Standards and Technology (NIST)-endorsed classical and post-quantum encryption algorithms on-premesis, using consumer grade Linux computers to prioritize viability for underserved regions & underfunded institutions. We compiled OpenSSL with Open Quantum Safe (OQS) C library to enable post-quantum encryption development that allowed the same level of access as Crowdstrike's faulty driver code while allowing for bindings with numerous memory safe programming languages. Our focus on post-quantum Key Encapsulation Mechanism (KEM) encryption reflects the ubiqutious protection that these protocols provide to secure communication and knowledge-work as well as the relative ease of hybridization with classical encryption protocols like Elliptical Curve Diffie-Hellman (ECDH). Following on-device compilation and installation of the encryption binaries, we built and executed an evaluation script with OpenSSL's native toolkit for twenty-four NIST-endorsed KEM protocols consisting of classical, quantum, and hybrid KEM implementations. We evaluated the KEMs on the number and rate of key generations (keygen), key encapsulation (encap) rate, and key decapsulations (decap) and rated their NIST post-quantum security level according to NIST advanced encryption standard (AES) exaustic key search levels. ### Results We successfully benchmarked all 24 KEM protocols, producing an example public/private key pair following the evaluation. The 24 KEM protocols are evenly split across NIST security levels 1, 3, and 5, with 8 protocols at each.We made all relevant code, regulatory information, and the example cryptographic key pairs available on the Qompass AI Github page. We released them under the GNU Affero General Public License (AGPL) to maintain the free availability of these encryption tools to benefit communities. # Kyber Odyssey Cryptographic Security Benchmark | Algorithm | Type | NIST Security Level | Keygen (ms) | Encaps (ms) | Decaps (ms) | Keygens/s | Encaps/s | Decaps/s | Industry/Healthcare Usage | |:---------:|:----:|:-------------------:|:-----------:|:-----------:|:-----------:|:---------:|:--------:|:--------:|:------------------------:| | [Frodo640AES](https://frodokem.org/) | Quantum | [Level 1](#security-levels) | 0.361 | 0.503 | 0.481 | 2773.0 | 1988.9 | 2081.0 | [Experimental in IoT](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6891283/) | | [Frodo640SHAKE](https://frodokem.org/) | Quantum | [Level 1](#security-levels) | 2.240 | 2.364 | 2.346 | 446.5 | 423.0 | 426.3 | [Research in secure messaging](https://eprint.iacr.org/2019/1356.pdf) | | [Frodo976AES](https://frodokem.org/) | Quantum | [Level 3](#security-levels) | 0.802 | 1.024 | 1.038 | 1247.0 | 976.8 | 963.6 | [Tested in satellite communications](https://ieeexplore.ieee.org/document/9435499) | | [Frodo976SHAKE](https://frodokem.org/) | Quantum | [Level 3](#security-levels) | 4.975 | 5.208 | 5.128 | 201.0 | 192.0 | 195.0 | [Evaluated for financial services](https://eprint.iacr.org/2019/1356.pdf) | | [Frodo1344AES](https://frodokem.org/) | Quantum | [Level 5](#security-levels) | 1.350 | 1.656 | 1.599 | 741.0 | 604.0 | 625.3 | [Considered for long-term data protection](https://csrc.nist.gov/Projects/post-quantum-cryptography/round-3-submissions) | | [Frodo1344SHAKE](https://frodokem.org/) | Quantum | [Level 5](#security-levels) | 8.772 | 9.174 | 9.009 | 114.0 | 109.0 | 111.0 | [Evaluated for government communications](https://csrc.nist.gov/Projects/post-quantum-cryptography/round-3-submissions) | | [Kyber512](https://pq-crystals.org/kyber/) | Quantum | [Level 1](#security-levels) | 0.022 | 0.021 | 0.017 | 44556.1 | 47830.3 | 58718.0 | [Implemented in VPN services](https://www.openvpn.net/cloud-docs/openvpn-3-client-for-linux/) | | [Kyber768](https://pq-crystals.org/kyber/) | Quantum | [Level 3](#security-levels) | 0.033 | 0.032 | 0.028 | 30291.8 | 31060.6 | 36305.1 | [Tested in banking systems](https://www.ibm.com/blogs/research/2020/08/ibm-z15-quantum-safe-cryptography/) | | [Kyber1024](https://pq-crystals.org/kyber/) | Quantum | [Level 5](#security-levels) | 0.045 | 0.045 | 0.040 | 22293.9 | 22075.8 | 24937.0 | [Evaluated for aerospace industry](https://www.esa.int/Enabling_Support/Space_Engineering_Technology/Quantum-safe_cryptography_for_space_missions) | | [MLKEM512](https://csrc.nist.gov/Projects/post-quantum-cryptography/selected-algorithms-2022) | Quantum | [Level 1](#security-levels) | 0.022 | 0.017 | 0.017 | 45416.2 | 59462.2 | 57611.1 | [Research in smart home devices](https://ieeexplore.ieee.org/document/9311932) | | [MLKEM768](https://csrc.nist.gov/Projects/post-quantum-cryptography/selected-algorithms-2022) | Quantum | [Level 3](#security-levels) | 0.036 | 0.027 | 0.027 | 28046.4 | 36703.0 | 37677.8 | [Evaluated for telemedicine platforms](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7779191/) | | [MLKEM1024](https://csrc.nist.gov/Projects/post-quantum-cryptography/selected-algorithms-2022) | Quantum | [Level 5](#security-levels) | 0.045 | 0.040 | 0.042 | 22468.7 | 24869.7 | 23599.0 | [Considered for national defense networks](https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/2696916/nsa-releases-future-quantum-resistant-qr-algorithm-requirements-for-national-se/) | | [BIKE-L1](https://bikesuite.org/) | Quantum | [Level 1](#security-levels) | 0.219 | 0.045 | 0.733 | 4556.0 | 22061.6 | 1364.6 | [Experimental in IoT networks](https://ieeexplore.ieee.org/document/9311932) | | [BIKE-L3](https://bikesuite.org/) | Quantum | [Level 3](#security-levels) | 0.631 | 0.107 | 2.404 | 1586.0 | 9351.5 | 416.0 | [Research in industrial control systems](https://www.mdpi.com/1424-8220/21/15/5247) | | [BIKE-L5](https://bikesuite.org/) | Quantum | [Level 5](#security-levels) | 1.658 | 0.243 | 5.657 | 603.0 | 4123.0 | 176.8 | [Evaluated for long-term data archiving](https://csrc.nist.gov/Projects/post-quantum-cryptography/round-3-submissions) | | [HQC-128](https://pqc-hqc.org/) | Quantum | [Level 1](#security-levels) | 1.828 | 3.613 | 5.882 | 547.0 | 276.8 | 170.0 | [Research in wearable tech security](https://www.mdpi.com/1424-8220/21/15/5247) | | [HQC-192](https://pqc-hqc.org/) | Quantum | [Level 3](#security-levels) | 5.525 | 10.989 | 16.949 | 181.0 | 91.0 | 59.0 | [Evaluated for healthcare data exchange](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7779191/) | | [HQC-256](https://pqc-hqc.org/) | Quantum | [Level 5](#security-levels) | 10.000 | 21.277 | 31.250 | 100.0 | 47.0 | 32.0 | [Considered for military communications](https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/2696916/nsa-releases-future-quantum-resistant-qr-algorithm-requirements-for-national-se/) | | [P-256 + Kyber512](https://www.nccoe.nist.gov/sites/default/files/2023-12/pqc-migration-nist-sp-1800-38c-preliminary-draft.pdf) | Hybrid | [Level 1](#security-levels) | 0.771 | 0.162 | 0.376 | 1296.9 | 6183.8 | 2658.2 | [Tested in e-commerce platforms](https://aws.amazon.com/blogs/security/how-to-tune-tls-for-hybrid-post-quantum-cryptography-with-kyber/) | | [P-384 + Kyber768](https://www.nccoe.nist.gov/sites/default/files/2023-12/pqc-migration-nist-sp-1800-38c-preliminary-draft.pdf) | Hybrid | [Level 3](#security-levels) | 1.070 | 1.071 | 1.119 | 934.3 | 933.3 | 894.0 | [Evaluated for cloud storage services](https://aws.amazon.com/blogs/security/how-to-tune-tls-for-hybrid-post-quantum-cryptography-with-kyber/) | | [P-521 + Kyber1024](https://www.nccoe.nist.gov/sites/default/files/2023-12/pqc-migration-nist-sp-1800-38c-preliminary-draft.pdf) | Hybrid | [Level 5](#security-levels) | 0.959 | 0.991 | 1.061 | 1042.9 | 1009.1 | 942.4 | [Research in quantum-resistant blockchains](https://arxiv.org/abs/2305.02739) | | [X25519 + Kyber512](https://www.nccoe.nist.gov/sites/default/files/2023-12/pqc-migration-nist-sp-1800-38c-preliminary-draft.pdf) | Hybrid | [Level 1](#security-levels) | 0.071 | 0.105 | 0.099 | 14135.7 | 9543.4 | 10106.1 | [Implemented in secure messaging apps](https://signal.org/blog/pqxdh/) | | [X25519 + Kyber768](https://www.nccoe.nist.gov/sites/default/files/2023-12/pqc-migration-nist-sp-1800-38c-preliminary-draft.pdf) | Hybrid | [Level 3](#security-levels) | 0.086 | 0.115 | 0.111 | 11621.4 | 8704.0 | 9040.0 | [Evaluated for VPN services](https://www.openvpn.net/cloud-docs/openvpn-3-client-for-linux/) | | [X448 + Kyber768](https://www.nccoe.nist.gov/sites/default/files/2023-12/pqc-migration-nist-sp-1800-38c-preliminary-draft.pdf) | Hybrid | [Level 3](#security-levels) | 0.274 | 0.487 | 0.491 | 3644.9 | 2055.1 | 2037.4 | [Research in high-security financial systems](https://eprint.iacr.org/2019/1356.pdf) | ## Legend | Term | Explanation | Security Implication | |:----:|:-----------:|:--------------------:| | Algorithm | The name of the encryption method used to secure data | N/A | | NIST Security Level | Indicates the level of security as defined by NIST | Higher is more secure | | Keygen (ms) | Time taken to generate a key pair (in milliseconds) | Lower is generally better, but too low may indicate weakness | | Encaps (ms) | Time taken to encapsulate (encrypt) a shared secret (in milliseconds) | Lower is better for performance, but should balance with security | | Decaps (ms) | Time taken to decapsulate (decrypt) a shared secret (in milliseconds) | Lower is better for performance, but should balance with security | | Keygens/s | Number of key pairs that can be generated per second | Higher is better for performance, but should balance with security | | Encaps/s | Number of encapsulations that can be performed per second | Higher is better for performance, but should balance with security | | Decaps/s | Number of decapsulations that can be performed per second | Higher is better for performance, but should balance with security | | Industry/Healthcare Usage | Examples of current or potential use in industry or healthcare | N/A | ## Security Levels | Level | Description | Healthcare Example | |:-----:|:-----------:|:------------------:| | [Level 1](https://blog.cloudflare.com/pq-2024) | At least as hard to break as AES-128 | [Securing patient portals](https://www.healthit.gov/topic/privacy-security-and-hipaa/security-risk-assessment-tool) | | [Level 3](https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs) | At least as hard to break as AES-192 | [Protecting electronic health records (EHRs)](https://www.hhs.gov/hipaa/for-professionals/security/guidance/cybersecurity/index.html) | | [Level 5](https://csrc.nist.gov/CSRC/media/Presentations/Let-s-Get-Ready-to-Rumble-The-NIST-PQC-Competiti/images-media/PQCrypto-April2018_Moody.pdf) | At least as hard to break as AES-256 | [Safeguarding genomic data](https://www.genome.gov/about-genomics/policy-issues/Privacy) | Note: While higher security levels provide stronger protection, they often come with increased computational costs. The choice of security level should be based on the sensitivity of the data and the specific requirements of the healthcare application. ### Conclusion Out of the evaluated KEMs, we propose hybrid combinations of ECDH and Kyber for most acute adoption of enhanced encryption protocols due to the layered security of nascent post-quantum encryption with established efficient classical protocols. Currently, Google Chrome implements X25519_Kyber768 hybrid encryption as part of its Transport Layer Security (TLS), offering a familiar and accessible platform to perform institutional assessements. ## References 1. [Password authenticated key exchange-based on Kyber for mobile devices](https://pubmed.ncbi.nlm.nih.gov/38660167/) 2. [Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data](https://pubmed.ncbi.nlm.nih.gov/38826742/) 3. [Transitioning organizations to post-quantum cryptography](https://pubmed.ncbi.nlm.nih.gov/35546191/) # Acknowledgment We would like to thank the Ruth Jackson Orthopaedic Society and Zimmer Biomet for their generous support of our work.
Frequently Asked Questions ### Q: How do you mitigate against bias? **TLDR - we do math to make AI ethically useful** ### A: We delineate between mathematical bias (MB) - a fundamental parameter in neural network equations - and algorithmic/social bias (ASB). While MB is optimized during model training through backpropagation, ASB requires careful consideration of data sources, model architecture, and deployment strategies. We implement attention mechanisms for improved input processing and use legal open-source data and secure web-search APIs to help mitigate ASB. [AAMC AI Guidelines | One way to align AI against ASB](https://www.aamc.org/about-us/mission-areas/medical-education/principles-ai-use) ### AI Math at a glance ## Forward Propagation Algorithm $$ y = w_1x_1 + w_2x_2 + ... + w_nx_n + b $$ Where: - $y$ represents the model output - $(x_1, x_2, ..., x_n)$ are input features - $(w_1, w_2, ..., w_n)$ are feature weights - $b$ is the bias term ### Neural Network Activation For neural networks, the bias term is incorporated before activation: $$ z = \\sum\_{i=1}^{n} w_ix_i + b $$ $$ a = \\sigma(z) $$ Where: - $z$ is the weighted sum plus bias - $a$ is the activation output - $\\sigma$ is the activation function ### Attention Mechanism- aka what makes the Transformer (The "T" in ChatGPT) powerful - [Attention High level overview video](https://www.youtube.com/watch?v=fjJOgb-E41w) - [Attention Is All You Need Arxiv Paper](https://arxiv.org/abs/1706.03762) The Attention mechanism equation is: $$ \\text{Attention}(Q, K, V) = \\text{softmax}\\left( \\frac{QK^T}{\\sqrt{d_k}} \\right) V $$ Where: - $Q$ represents the Query matrix - $K$ represents the Key matrix - $V$ represents the Value matrix - $d_k$ is the dimension of the key vectors - $\\text{softmax}(\\cdot)$ normalizes scores to sum to 1 ### Q: Do I have to buy a Linux computer to use this? I don't have time for that! ### A: No. You can run Linux and/or the tools we share alongside your existing operating system: - Windows users can use Windows Subsystem for Linux [WSL](https://learn.microsoft.com/en-us/windows/wsl/install) - Mac users can use [Homebrew](https://brew.sh/) - The code-base instructions were developed with both beginners and advanced users in mind. ### Q: Do you have to get a masters in AI? ### A: Not if you don't want to. To get competent enough to get past ChatGPT dependence at least, you just need a computer and a beginning's mindset. Huggingface is a good place to start. - [Huggingface](https://docs.google.com/presentation/d/1IkzESdOwdmwvPxIELYJi8--K3EZ98_cL6c5ZcLKSyVg/edit#slide=id.p) ### Q: What makes a "small" AI model? ### A: AI models ~=10 billion(10B) parameters and below. For comparison, OpenAI's GPT4o contains approximately 200B parameters.
What a Dual-License Means ### Protection for Vulnerable Populations The dual licensing aims to address the cybersecurity gap that disproportionately affects underserved populations. As highlighted by recent attacks[1], low-income residents, seniors, and foreign language speakers face higher-than-average risks of being victims of cyberattacks. By offering both open-source and commercial licensing options, we encourage the development of cybersecurity solutions that can reach these vulnerable groups while also enabling sustainable development and support. ### Preventing Malicious Use The AGPL-3.0 license ensures that any modifications to the software remain open source, preventing bad actors from creating closed-source variants that could be used for exploitation. This is especially crucial given the rising threats to vulnerable communities, including children in educational settings. The attack on Minneapolis Public Schools, which resulted in the leak of 300,000 files and a $1 million ransom demand, highlights the importance of transparency and security[8]. ### Addressing Cybersecurity in Critical Sectors The commercial license option allows for tailored solutions in critical sectors such as healthcare, which has seen significant impacts from cyberattacks. For example, the recent Change Healthcare attack[4] affected millions of Americans and caused widespread disruption for hospitals and other providers. In January 2025, CISA[2] and FDA[3] jointly warned of critical backdoor vulnerabilities in Contec CMS8000 patient monitors, revealing how medical devices could be compromised for unauthorized remote access and patient data manipulation. ### Supporting Cybersecurity Awareness The dual licensing model supports initiatives like the Cybersecurity and Infrastructure Security Agency (CISA) efforts to improve cybersecurity awareness[7] in "target rich" sectors, including K-12 education[5]. By allowing both open-source and commercial use, we aim to facilitate the development of tools that support these critical awareness and protection efforts. ### Bridging the Digital Divide The unfortunate reality is that too many individuals and organizations have gone into a frenzy in every facet of our daily lives[6]. These unfortunate folks identify themselves with their talk of "10X" returns and building towards Artificial General Intelligence aka "AGI" while offering GPT wrappers. Our dual licensing approach aims to acknowledge this deeply concerning predatory paradigm with clear eyes while still operating to bring the best parts of the open-source community with our services and solutions. ### Recent Cybersecurity Attacks Recent attacks underscore the importance of robust cybersecurity measures: - The Change Healthcare cyberattack in February 2024 affected millions of Americans and caused significant disruption to healthcare providers. - The White House and Congress jointly designated October 2024 as Cybersecurity Awareness Month. This designation comes with over 100 actions that align the Federal government and public/private sector partners are taking to help every man, woman, and child to safely navigate the age of AI. By offering both open source and commercial licensing options, we strive to create a balance that promotes innovation and accessibility. We address the complex cybersecurity challenges faced by vulnerable populations and critical infrastructure sectors as the foundation of our solutions, not an afterthought. ### References

Owner

  • Name: Qompass
  • Login: qompassai
  • Kind: organization
  • Email: map@qompass.ai
  • Location: United States of America

Cost-Conscious GenAI Microservices

GitHub Events

Total
  • Release event: 8
  • Delete event: 2
  • Push event: 118
  • Create event: 10
Last Year
  • Release event: 8
  • Delete event: 2
  • Push event: 118
  • Create event: 10

Issues and Pull Requests

Last synced: 4 months ago


Dependencies

methods/openssl-3.3.1/external/perl/Text-Template-1.56/META.json cpan
  • Carp 0
  • Dist::Zilla 5
  • Dist::Zilla::PluginBundle::MSCHOUT 0
  • Encode 0
  • Exporter 0
  • ExtUtils::MakeMaker 0
  • File::Temp 0
  • Safe 0
  • Software::License::Perl_5 0
  • Test::More 0
  • Test::More::UTF8 0
  • Test::Pod 1.41
  • Test::Signature 0
  • Test::Warnings 0
  • base 0
  • lib 0
  • perl 5.008
  • strict 0
  • utf8 0
  • vars 0
  • warnings 0
methods/openssl-3.3.1/external/perl/Text-Template-1.56/META.yml cpan
  • Carp 0
  • Encode 0
  • Exporter 0
  • base 0
  • perl 5.008
  • strict 0
  • warnings 0
QompassL-332/external/perl/Text-Template-1.56/META.json cpan
  • Carp 0
  • Dist::Zilla 5
  • Dist::Zilla::PluginBundle::MSCHOUT 0
  • Encode 0
  • Exporter 0
  • ExtUtils::MakeMaker 0
  • File::Temp 0
  • Safe 0
  • Software::License::Perl_5 0
  • Test::More 0
  • Test::More::UTF8 0
  • Test::Pod 1.41
  • Test::Signature 0
  • Test::Warnings 0
  • base 0
  • lib 0
  • perl 5.008
  • strict 0
  • utf8 0
  • vars 0
  • warnings 0
QompassL-332/external/perl/Text-Template-1.56/META.yml cpan
  • Carp 0
  • Encode 0
  • Exporter 0
  • base 0
  • perl 5.008
  • strict 0
  • warnings 0
liboqs-0.11/.github/workflows/requirements.in pypi
  • colorama ==0.4.6
  • execnet ==2.1.1
  • iniconfig ==2.0.0
  • packaging ==24.0
  • pluggy ==1.4.0
  • pytest ==8.1.1
  • pytest-xdist ==3.5.0
  • pyyaml ==6.0.1
liboqs-0.11/.github/workflows/requirements.txt pypi
  • colorama ==0.4.6
  • execnet ==2.1.1
  • iniconfig ==2.0.0
  • packaging ==24.0
  • pluggy ==1.4.0
  • pytest ==8.1.1
  • pytest-xdist ==3.5.0
  • pyyaml ==6.0.1
liboqs-0.11/scripts/copy_from_upstream/requirements.in pypi
  • GitPython ==3.1.41
  • Jinja2 ==3.1.4
  • MarkupSafe ==2.1.3
  • PyYAML ==6.0.1
  • attrs ==20.3.0
  • importlib-metadata ==3.7.0
  • markdown-it-py ==2.2.0
  • mdit-py-plugins ==0.3.4
  • tabulate ==0.8.10
  • typing-extensions ==3.7.4.3
  • wget ==3.2
  • zipp ==3.19.1
liboqs-0.11/scripts/copy_from_upstream/requirements.txt pypi
  • attrs ==20.3.0
  • gitdb ==4.0.11
  • gitpython ==3.1.41
  • importlib-metadata ==3.7.0
  • jinja2 ==3.1.4
  • markdown-it-py ==2.2.0
  • markupsafe ==2.1.3
  • mdit-py-plugins ==0.3.4
  • mdurl ==0.1.2
  • pyyaml ==6.0.1
  • smmap ==5.0.1
  • tabulate ==0.8.10
  • typing-extensions ==3.7.4.3
  • wget ==3.2
  • zipp ==3.19.1
liboqs-0.12/.github/workflows/requirements.in pypi
  • colorama ==0.4.6
  • execnet ==2.1.1
  • iniconfig ==2.0.0
  • packaging ==24.0
  • pluggy ==1.4.0
  • pytest ==8.1.1
  • pytest-xdist ==3.5.0
  • pyyaml ==6.0.1
liboqs-0.12/.github/workflows/requirements.txt pypi
  • colorama ==0.4.6
  • execnet ==2.1.1
  • iniconfig ==2.0.0
  • packaging ==24.0
  • pluggy ==1.4.0
  • pytest ==8.1.1
  • pytest-xdist ==3.5.0
  • pyyaml ==6.0.1
liboqs-0.12/scripts/copy_from_upstream/requirements.in pypi
  • GitPython ==3.1.41
  • Jinja2 ==3.1.4
  • MarkupSafe ==2.1.3
  • PyYAML ==6.0.1
  • attrs ==20.3.0
  • importlib-metadata ==3.7.0
  • markdown-it-py ==2.2.0
  • mdit-py-plugins ==0.3.4
  • tabulate ==0.8.10
  • typing-extensions ==3.7.4.3
  • wget ==3.2
  • zipp ==3.19.1
liboqs-0.12/scripts/copy_from_upstream/requirements.txt pypi
  • attrs ==20.3.0
  • gitdb ==4.0.11
  • gitpython ==3.1.41
  • importlib-metadata ==3.7.0
  • jinja2 ==3.1.4
  • markdown-it-py ==2.2.0
  • markupsafe ==2.1.3
  • mdit-py-plugins ==0.3.4
  • mdurl ==0.1.2
  • pyyaml ==6.0.1
  • smmap ==5.0.1
  • tabulate ==0.8.10
  • typing-extensions ==3.7.4.3
  • wget ==3.2
  • zipp ==3.19.1
methods/openssl-3.3.1/oqs-provider-0.6.1/oqs-template/requirements.txt pypi
  • Jinja2 ==3.1.4
  • MarkupSafe ==2.1.3
  • PyYAML ==6.0
  • tabulate ==0.9.0
ossl-340/cloudflare-quiche/Cargo.toml cargo
ossl-340/cloudflare-quiche/apps/Cargo.toml cargo
ossl-340/cloudflare-quiche/fuzz/Cargo.toml cargo
ossl-340/cloudflare-quiche/octets/Cargo.toml cargo
ossl-340/cloudflare-quiche/qlog/Cargo.toml cargo
ossl-340/cloudflare-quiche/quiche/Cargo.toml cargo
  • mio 0.8 development
  • url 1 development
  • boring 3
  • either 1.8
  • foreign-types-shared 0.3.0
  • intrusive-collections 0.9.5
  • libc 0.2
  • libm 0.2
  • log 0.4
  • octets 0.2
  • once_cell 1
  • qlog 0.9
  • ring 0.16
  • sfv 0.9
  • slab 0.4
  • smallvec 1.10
ossl-340/cloudflare-quiche/tools/http3_test/Cargo.toml cargo
qompassl-340/quiche/Cargo.toml cargo
qompassl-340/quiche/apps/Cargo.toml cargo
qompassl-340/quiche/fuzz/Cargo.toml cargo
qompassl-340/quiche/h3i/Cargo.toml cargo
qompassl-340/quiche/octets/Cargo.toml cargo
qompassl-340/quiche/qlog/Cargo.toml cargo
qompassl-340/quiche/quiche/Cargo.toml cargo
  • mio 0.8 development
  • url 2.5 development
  • boring 4
  • either 1.8
  • foreign-types-shared 0.3.0
  • intrusive-collections 0.9.5
  • libc 0.2
  • libm 0.2
  • log 0.4
  • octets 0.3
  • once_cell 1
  • qlog 0.13
  • ring 0.17
  • sfv 0.9
  • slab 0.4
  • smallvec 1.10
qompassl-340/quiche/tools/http3_test/Cargo.toml cargo
ossl-340/external/perl/Text-Template-1.56/META.json cpan
  • Carp 0
  • Dist::Zilla 5
  • Dist::Zilla::PluginBundle::MSCHOUT 0
  • Encode 0
  • Exporter 0
  • ExtUtils::MakeMaker 0
  • File::Temp 0
  • Safe 0
  • Software::License::Perl_5 0
  • Test::More 0
  • Test::More::UTF8 0
  • Test::Pod 1.41
  • Test::Signature 0
  • Test::Warnings 0
  • base 0
  • lib 0
  • perl 5.008
  • strict 0
  • utf8 0
  • vars 0
  • warnings 0
ossl-340/external/perl/Text-Template-1.56/META.yml cpan
  • Carp 0
  • Encode 0
  • Exporter 0
  • base 0
  • perl 5.008
  • strict 0
  • warnings 0
qompassl-340/external/perl/Text-Template-1.56/META.json cpan
  • Carp 0
  • Dist::Zilla 5
  • Dist::Zilla::PluginBundle::MSCHOUT 0
  • Encode 0
  • Exporter 0
  • ExtUtils::MakeMaker 0
  • File::Temp 0
  • Safe 0
  • Software::License::Perl_5 0
  • Test::More 0
  • Test::More::UTF8 0
  • Test::Pod 1.41
  • Test::Signature 0
  • Test::Warnings 0
  • base 0
  • lib 0
  • perl 5.008
  • strict 0
  • utf8 0
  • vars 0
  • warnings 0
qompassl-340/external/perl/Text-Template-1.56/META.yml cpan
  • Carp 0
  • Encode 0
  • Exporter 0
  • base 0
  • perl 5.008
  • strict 0
  • warnings 0
ossl-340/cloudflare-quiche/Dockerfile docker
  • debian latest build
  • martenseemann/quic-network-simulator-endpoint latest build
  • rust 1.66 build
ossl-340/cloudflare-quiche/fuzz/Dockerfile docker
  • debian bullseye build
ossl-340/test/quic-openssl-docker/Dockerfile docker
  • martenseemann/quic-network-simulator-endpoint latest build
qompassl-340/quiche/Dockerfile docker
  • debian latest build
  • martenseemann/quic-network-simulator-endpoint latest build
  • rust 1.67 build
qompassl-340/quiche/fuzz/Dockerfile docker
  • debian latest build
  • rustlang/rust nightly build
qompassl-340/test/quic-openssl-docker/Dockerfile docker
  • martenseemann/quic-network-simulator-endpoint latest build
oqs-provider-0.72/oqs-template/requirements.txt pypi
  • Jinja2 ==3.1.4
  • MarkupSafe ==2.1.3
  • PyYAML ==6.0
  • tabulate ==0.9.0
oqs-provider-0.80/oqs-template/requirements.txt pypi
  • Jinja2 ==3.1.4
  • MarkupSafe ==2.1.3
  • PyYAML ==6.0
  • tabulate ==0.9.0
ossl-340/oqs-provider/oqs-template/requirements.txt pypi
  • Jinja2 ==3.1.4
  • MarkupSafe ==2.1.3
  • PyYAML ==6.0
  • tabulate ==0.9.0
ossl-340/python-ecdsa/build-requirements-2.6.txt pypi
  • cffi <1.14
  • coverage *
  • coveralls add-py26
  • hypothesis <3
  • idna <2.8
  • inflect <0.3.1
  • mock ==2.0.0
  • pyopenssl <18
  • tox *
  • unittest2 *
ossl-340/python-ecdsa/build-requirements-2.7.txt pypi
  • coverage *
  • coveralls add-py26
  • hypothesis *
  • pytest >=4.6.0
  • tox *
ossl-340/python-ecdsa/build-requirements-3.3.txt pypi
  • coverage <5.0
  • coveralls add-py26
  • enum34 *
  • hypothesis <3.44
  • pluggy <0.6
  • tox <3
  • urllib3 <=1.25.8
  • virtualenv ==15.2.0
  • wheel <0.30
ossl-340/python-ecdsa/build-requirements-3.4.txt pypi
  • PyYAML <5.3
  • attrs <21
  • coverage *
  • coveralls add-py26
  • hypothesis *
  • pytest >=4.6.0
  • tox *
ossl-340/python-ecdsa/build-requirements.txt pypi
  • coverage *
  • coveralls *
  • hypothesis *
  • pytest >=4.6.0
  • tox *
ossl-340/python-ecdsa/setup.py pypi
  • six >=1.9.0
ossl-340/tlsfuzzer/build-requirements-2.6.txt pypi
  • cffi <1.14
  • coverage *
  • coveralls add-py26
  • diff_cover *
  • idna <2.8
  • inflect <0.3.1
  • isort <4.3
  • mock ==2.0.0
  • pycparser <2.19
  • pylint *
  • pyopenssl <18
  • unittest2 *
ossl-340/tlsfuzzer/build-requirements-2.7.txt pypi
  • coverage *
  • coveralls add-py26
  • diff_cover <4.0.0
  • mock >2.0.0
  • pylint *
ossl-340/tlsfuzzer/build-requirements-3.3.txt pypi
  • coverage *
  • coveralls add-py26
  • diff_cover <2.5.0
  • inflect <4.0.0
  • isort ==4.2.5
  • pylint *
  • typed_ast <1.3.0
  • typing <3.7.4
ossl-340/tlsfuzzer/build-requirements-3.4.txt pypi
  • coverage *
  • coveralls add-py26
  • diff_cover *
  • mock >2.0.0
  • pylint *
ossl-340/tlsfuzzer/build-requirements-analysis.txt pypi
  • matplotlib >=3.3.2
  • numpy >=1.15.0
  • pandas *
  • scipy >=1.5.0
ossl-340/tlsfuzzer/build-requirements.txt pypi
  • coverage *
  • coveralls *
  • diff_cover *
  • mock >2.0.0
  • pylint *
ossl-340/tlsfuzzer/requirements-timing.txt pypi
  • dpkt >=1.9.2
  • matplotlib >=3.3.2
  • numpy >=1.15.0
  • pandas *
  • scipy >=1.5.0
ossl-340/tlsfuzzer/requirements.txt pypi
  • tlslite-ng ==0.8.0
ossl-340/tlsfuzzer/setup.py pypi
ossl-340/tlslite-ng/build-requirements-2.6.txt pypi
  • cffi <1.14
  • coverage *
  • coveralls add-py26
  • diff_cover *
  • hypothesis <3
  • idna <2.8
  • inflect <0.3.1
  • isort <4.3
  • mock ==2.0.0
  • pycparser <2.19
  • pylint *
  • pyopenssl <18
  • unittest2 *
ossl-340/tlslite-ng/build-requirements-2.7.txt pypi
  • coverage *
  • coveralls add-py26
  • diff_cover <2.5.0
  • hypothesis *
  • mock *
  • pylint *
  • pytest >=4.6.5
  • unittest2 *
ossl-340/tlslite-ng/build-requirements-3.3.txt pypi
  • coverage <5.0
  • coveralls add-py26
  • diff_cover <2.5.0
  • enum34 *
  • hypothesis <3.44
  • inflect <4.0.0
  • isort ==4.2.5
  • pylint *
  • six >=1.10.0
  • typed-ast <1.3.0
  • typing <3.7.4
ossl-340/tlslite-ng/build-requirements-3.4.txt pypi
  • coverage *
  • coveralls add-py26
  • diff_cover *
  • hypothesis *
  • pluggy >=0.7
  • pylint *
  • pytest >=4.6.5
ossl-340/tlslite-ng/build-requirements.txt pypi
  • coverage *
  • coveralls *
  • diff_cover *
  • hypothesis *
  • pluggy >=0.7
  • pylint *
  • pytest >=4.6.5
ossl-340/tlslite-ng/requirements.txt pypi
  • ecdsa >=0.18.0b1
ossl-340/tlslite-ng/setup.py pypi
  • ecdsa >=0.18.0b1
qompassl-340/oqs-provider/oqs-template/requirements.txt pypi
  • Jinja2 ==3.1.3
  • MarkupSafe ==2.1.3
  • PyYAML ==6.0
  • tabulate ==0.9.0
qompassl-340/python-ecdsa/build-requirements-2.6.txt pypi
  • cffi <1.14
  • coverage *
  • coveralls add-py26
  • hypothesis <3
  • idna <2.8
  • inflect <0.3.1
  • mock ==2.0.0
  • pyopenssl <18
  • tox *
  • unittest2 *
qompassl-340/python-ecdsa/build-requirements-2.7.txt pypi
  • coverage *
  • coveralls add-py26
  • hypothesis *
  • pytest >=4.6.0
  • tox *
qompassl-340/python-ecdsa/build-requirements-3.3.txt pypi
  • coverage <5.0
  • coveralls add-py26
  • enum34 *
  • hypothesis <3.44
  • pluggy <0.6
  • tox <3
  • urllib3 <=1.25.8
  • virtualenv ==15.2.0
  • wheel <0.30
qompassl-340/python-ecdsa/build-requirements-3.4.txt pypi
  • PyYAML <5.3
  • attrs <21
  • coverage *
  • coveralls add-py26
  • hypothesis *
  • pytest >=4.6.0
  • tox *
qompassl-340/python-ecdsa/build-requirements.txt pypi
  • coverage *
  • coveralls *
  • hypothesis *
  • pytest >=4.6.0
  • tox *
qompassl-340/python-ecdsa/setup.py pypi
  • six >=1.9.0
qompassl-340/tlsfuzzer/build-requirements-2.6.txt pypi
  • cffi <1.14
  • coverage *
  • coveralls add-py26
  • diff_cover *
  • idna <2.8
  • inflect <0.3.1
  • isort <4.3
  • mock ==2.0.0
  • pycparser <2.19
  • pylint *
  • pyopenssl <18
  • unittest2 *
qompassl-340/tlsfuzzer/build-requirements-2.7.txt pypi
  • coverage *
  • coveralls add-py26
  • diff_cover <4.0.0
  • mock >2.0.0
  • pylint *
qompassl-340/tlsfuzzer/build-requirements-3.3.txt pypi
  • coverage *
  • coveralls add-py26
  • diff_cover <2.5.0
  • inflect <4.0.0
  • isort ==4.2.5
  • pylint *
  • typed_ast <1.3.0
  • typing <3.7.4
qompassl-340/tlsfuzzer/build-requirements-3.4.txt pypi
  • coverage *
  • coveralls add-py26
  • diff_cover *
  • mock >2.0.0
  • pylint *
qompassl-340/tlsfuzzer/build-requirements-analysis.txt pypi
  • matplotlib >=3.3.2
  • numpy >=1.15.0
  • pandas *
  • scipy >=1.5.0
qompassl-340/tlsfuzzer/build-requirements.txt pypi
  • coverage *
  • coveralls *
  • diff_cover *
  • mock >2.0.0
  • pylint *
qompassl-340/tlsfuzzer/requirements-timing.txt pypi
  • dpkt >=1.9.2
  • matplotlib >=3.3.2
  • numpy >=1.15.0
  • pandas *
  • scipy >=1.5.0
qompassl-340/tlsfuzzer/requirements.txt pypi
  • tlslite-ng ==0.8.0
qompassl-340/tlsfuzzer/setup.py pypi
qompassl-340/tlslite-ng/build-requirements-2.6.txt pypi
  • cffi <1.14
  • coverage *
  • coveralls add-py26
  • diff_cover *
  • hypothesis <3
  • idna <2.8
  • inflect <0.3.1
  • isort <4.3
  • mock ==2.0.0
  • pycparser <2.19
  • pylint *
  • pyopenssl <18
  • unittest2 *
qompassl-340/tlslite-ng/build-requirements-2.7.txt pypi
  • coverage *
  • coveralls add-py26
  • diff_cover <2.5.0
  • hypothesis *
  • mock *
  • pylint *
  • pytest >=4.6.5
  • unittest2 *
qompassl-340/tlslite-ng/build-requirements-3.3.txt pypi
  • coverage <5.0
  • coveralls add-py26
  • diff_cover <2.5.0
  • enum34 *
  • hypothesis <3.44
  • inflect <4.0.0
  • isort ==4.2.5
  • pylint *
  • six >=1.10.0
  • typed-ast <1.3.0
  • typing <3.7.4
qompassl-340/tlslite-ng/build-requirements-3.4.txt pypi
  • coverage *
  • coveralls add-py26
  • diff_cover *
  • hypothesis *
  • pluggy >=0.7
  • pylint *
  • pytest >=4.6.5
qompassl-340/tlslite-ng/build-requirements.txt pypi
  • coverage *
  • coveralls *
  • diff_cover *
  • hypothesis *
  • pluggy >=0.7
  • pylint *
  • pytest >=4.6.5
qompassl-340/tlslite-ng/requirements.txt pypi
  • ecdsa >=0.18.0b1
qompassl-340/tlslite-ng/setup.py pypi
  • ecdsa >=0.18.0b1
oqs-provider-0.80/sbom.cdx.json swiftpm
ossl-340/oqs-provider/sbom.cdx.json swiftpm