Research-Grade Cryptography

Post-Quantum Secure
Messaging Infrastructure

Research-grade E2EE protocol with mandated re-encapsulation. Built for long-term confidentiality, not marketing demos.

Currently raising a small pre-seed to continue post-quantum cryptographic R&D.

Explore SDK Documentation →

Why Now

The window for post-quantum migration is open — and narrowing

2024

NIST PQ Standards Finalized

ML-KEM and ML-DSA are now official. The cryptographic foundation exists.

Now

Messengers Are Not Re-architecting

Major platforms are patching, not rebuilding. Session-level PQ remains rare.

Active

Harvest-Now-Decrypt-Later

State actors are collecting encrypted traffic today. The threat is not theoretical.

What is Stvor

A research-driven approach to post-quantum secure communications

What it is

Stvor is a research-driven, post-quantum secure messaging stack:

  • E2EE Messenger
  • Developer SDK
  • Security Analysis Engine (Kenesary)

Why it exists

Most messengers secure the handshake.

Stvor secures the entire session lifecycle.

We address the harvest-now-decrypt-later threat by implementing continuous post-quantum protection throughout the communication session.

What makes it different

  • Mandated re-encapsulation — periodic key refresh using post-quantum primitives
  • Hybrid PQ cryptography — classical + post-quantum for defense in depth
  • Honest threat model disclosure — we document risks, not hide them

Core Products

Three integrated components for secure communications infrastructure

Stvor Messenger

Browser-native end-to-end encrypted messaging with post-quantum secure sessions and zero-knowledge relay architecture.

  • Browser-native E2EE
  • Post-quantum secure sessions
  • Zero-knowledge relay
Open Messenger

Stvor SDK

Drop-in E2EE for developers. Implements X3DH + Double Ratchet with post-quantum extensions in a type-safe TypeScript API.

  • Drop-in E2EE for developers
  • X3DH + Double Ratchet + PQ
  • Type-safe TypeScript API
View Documentation

Kenesary Security Engine

Multi-perspective security analysis with explicit assumptions and confidence levels. Read-only static analysis for protocol verification.

  • Multi-perspective security analysis
  • Explicit assumptions & confidence levels
  • Read-only static analysis
Explore Engine

Security & Research Depth

Academic rigor meets practical implementation

Threat Model

DY

Dolev-Yao Adversary

Full network control, message interception, injection, and replay capabilities

Q

Quantum Adversary

Cryptographically relevant quantum computer with harvest-now-decrypt-later capability

Formal Verification

LaTeX Whitepaper

Formal specification with complete protocol description and security proofs

Game-Based Proof Sketch

Security reduction to standard cryptographic assumptions

ProVerif Analysis

Partial verification — honest status, work in progress

"Residual risks are documented, not hidden."

Cryptography Stack

Hybrid classical + post-quantum primitives for defense in depth

ComponentClassicalPost-QuantumStandard
Key ExchangeX25519ML-KEM-768NIST FIPS 203
SignaturesEd25519ML-DSA-65NIST FIPS 204
AEADChaCha20-Poly1305RFC 8439
RatchetDouble RatchetRe-encapsulation cadenceSignal Protocol + PQ ext.

Performance & Trade-offs

Measured numbers, no excuses

~45ms

Handshake latency

ARM (Apple M1)

+11%

Message overhead

vs. classical-only

24h / 2²⁰

Re-encapsulation

time or message count

Stvor prioritizes long-term confidentiality over minimal bandwidth.

Honest Limitations

We believe transparency is a security feature

Metadata leakage

Timing, message sizes, and communication patterns are visible to the relay. Documented in threat model.

No multi-device sync

Single-device architecture by design. Multi-device introduces key management complexity.

Browser security assumptions

Relies on browser sandbox, WebCrypto, and secure context. Not suitable for high-assurance environments.

Audit pending

No third-party security audit completed. Protocol is research-grade, not production-hardened.

Pre-Seed

Funding Status

Stvor is currently raising a small pre-seed round ($100k–$250k) to continue cryptographic R&D, formal verification, and independent security auditing.

Actively exploring cyber / deep-tech accelerators and research-aligned investors.

This funding extends the project runway by 6 months and enables:

  • 1

    Complete ProVerif model for multi-epoch ratcheting

    Formal verification of the re-encapsulation protocol

  • 2

    Increase test coverage to >70%

    Comprehensive unit and integration testing across the stack

  • 3

    External cryptographic audit (scope defined)

    Third-party review of cryptographic implementation & protocol invariants

For investors interested in post-quantum security infrastructure

Discuss Pre-Seed / Research Funding

Founder

Why this person, why this project

Cryptography-focused engineer

Deep expertise in applied cryptography and secure protocol design

Built full E2EE stack solo (47k+ LOC)

Messenger, SDK, relay, and security analysis engine

Research-first, security-honest philosophy

Prioritizes correctness and transparency over speed-to-market