Quantum-safe
cryptography.
API-native.
Truly agile.
Sovereignly yours.

CipherForge delivers formally verified post-quantum cryptography through a clean API, so your team can migrate to ML-KEM, ML-DSA, and HQC without rebuilding your infrastructure or trusting a black box.

No algorithm lock-in. No key escrow. No foreign dependencies.

Request CipherForge Demo
ISO 27001 certified • Formally Verified • Zero Key Storage • Air-Gap Ready
cipherforge · encrypt request
Request
Response
cURL
POST /v2/encrypt
Authorization: Bearer {api_key}
Content-Type: application/json
 
{
  "algorithm": "ML-KEM-768",
  "plaintext": "base64_encoded_data",
  "deployment": "hybrid-tls",
  "sovereign": true,
  "key_ownership": "client-byok"
}
200 OK — Encrypted
"ciphertext": "ML-KEM-768::enc::..."
"algorithm": "ML-KEM-768"
"verified": true
"key_held_by": "client"

Built different at every layer.

CipherForge is not a wrapper around NIST reference code. It is a ground-up implementation designed for the realities of enterprise deployment - agility, sovereignty, and verified correctness from the start.

True Cryptographic Agility


Algorithms evolve. Standards shift. CipherForge's orchestration layer lets you swap cryptographic primitives as configuration changes, not infrastructure replacements. When the next standard lands, your system updates without a migration project.

Algorithm-agnostic by design
Transparent Hybrid Architecture

Formally Verified

Secret-handling routines are written in Jasmin, a language that enforces constant-time execution and enables formal proof at the assembly level. The vulnerabilities that affected Signal, AWS, and Cloudflare's PQC libraries cannot occur in CipherForge by construction.

Sovereign by Architecture

CipherForge never stores your encryption keys. Not in transit, not at rest, not ever. Full BYOK across all deployment models. Air-gapped deployment with source code handover available for environments where no external dependency is acceptable.

Zero-storage · BYOK · Air-gap ready

Every algorithm.
One API surface.
No lock-in.

Most organisations don't know which algorithm they'll need in 2027. CipherForge doesn't ask you to decide. Deploy today with ML-KEM and ML-DSA. Add HQC for cryptographic diversity. Switch seamlessly as NIST and ENISA guidance evolves, and the API contract stays the same.

When Clang introduced a timing vulnerability into correctly-written ML-KEM reference code in June 2024, organisations using CipherForge updated via configuration. No patching. No regression testing. No emergency change requests.
CIPHERFORGE - ACTIVE ALGORITHMS Live orchestration
ML-KEM-768
Key Encapsulation · NIST FIPS 203
Active
ML-DSA-65
Digital Signature · NIST FIPS 204
Active
HQC-192
Key Encapsulation · NIST Alternate
Diversity Layer
SLH-DSA
Hash-Based Signature · NIST FIPS 205
Hash-Based
X25519MLKEM768
Hybrid TLS · IETF Draft
Hybrid

The implementation gap
is where PQC breaks.

83% of cryptographic vulnerabilities are implementation failures, not algorithm flaws. CipherForge is architected to close that gap permanently.

Jasmin/C Hybrid Implementation

Every routine that touches secret values is written in Jasmin, a language that proves constant-time execution at the assembly level by construction. Standard C compilers can silently reintroduce timing side-channels even into correctly-written code. Jasmin eliminates that class of vulnerability entirely, not by convention but by proof.

Outperforms C reference on throughput
CipherForge's ML-DSA signing is faster than the unverified C reference implementation, disproving the assumption that formal verification requires a performance trade-off.

Deployment Options for Every Risk Profile

All deployment models include:

  • NIST-standardized ML-DSA, ML-KEM

  • Zero-trust integration

  • Cutting edge algorithms such as
    HQC and SLH-DSA

  • Regulatory compliance support

  • 24/7 technical assistance

  • Self-proving and performant

  • Sovereign data control

  • Ongoing algorithm updates

Read the white paper

Every framework. Out of the box.

CipherForge is built to satisfy the compliance requirements that are already active, and the ones that will be.

ISO 27001

NIST FIPS 203 / 204 / 205

CNSA 2.0

APRA CPS 230

ASD ISM 2030

HIPAA

PCI DSS

SOC 2

GDPR

ENISA PQC Guidelines

AUKUS Tech Cooperation

CISO

Cryptographic risk, solved.

Full cryptographic inventory across various attack surfaces. Migration roadmaps aligned to NIST, ENISA, and ASD mandates. Audit-ready evidence at every stage. Pass the board question before it gets asked.

Government & Procurement

Sovereign. Verified.

ISO 27001 certified. Listed in Austrade's national quantum capability report. Air-gapped and sovereign deployments ensure full control over infrastrcture.

C-Suite

Compliance before the deadline.

2030 PQC mandates across the US, EU, ME, SEA and Oceania are not aspirational. Harvest-now, decrypt-later attacks are happening today. CipherForge provides the board-level evidence that quantum risk is being actively managed

Developer

PQC without the PhD.

Clean API abstraction, available on all frameworks, languages, and layers. No need to understand cryptography to integrate it correctly. Documentation available on request. Integration in hours, not weeks.

Quantum-safe security, ready to deploy

Quantum-safe security, ready when you are

API integration for instant quantum protection

Deployed in real infrastructure

On-premise tools for sovereign control