Post-Quantum Secure
Messaging Infrastructure
Research-grade E2EE protocol with mandated re-encapsulation. Built for long-term confidentiality, not marketing demos.
Currently raising a small pre-seed to continue post-quantum cryptographic R&D.
Explore SDK Documentation →Why Now
The window for post-quantum migration is open — and narrowing
NIST PQ Standards Finalized
ML-KEM and ML-DSA are now official. The cryptographic foundation exists.
Messengers Are Not Re-architecting
Major platforms are patching, not rebuilding. Session-level PQ remains rare.
Harvest-Now-Decrypt-Later
State actors are collecting encrypted traffic today. The threat is not theoretical.
What is Stvor
A research-driven approach to post-quantum secure communications
What it is
Stvor is a research-driven, post-quantum secure messaging stack:
- E2EE Messenger
- Developer SDK
- Security Analysis Engine (Kenesary)
Why it exists
Most messengers secure the handshake.
Stvor secures the entire session lifecycle.
We address the harvest-now-decrypt-later threat by implementing continuous post-quantum protection throughout the communication session.
What makes it different
- Mandated re-encapsulation — periodic key refresh using post-quantum primitives
- Hybrid PQ cryptography — classical + post-quantum for defense in depth
- Honest threat model disclosure — we document risks, not hide them
Core Products
Three integrated components for secure communications infrastructure
Stvor Messenger
Browser-native end-to-end encrypted messaging with post-quantum secure sessions and zero-knowledge relay architecture.
- Browser-native E2EE
- Post-quantum secure sessions
- Zero-knowledge relay
Stvor SDK
Drop-in E2EE for developers. Implements X3DH + Double Ratchet with post-quantum extensions in a type-safe TypeScript API.
- Drop-in E2EE for developers
- X3DH + Double Ratchet + PQ
- Type-safe TypeScript API
Kenesary Security Engine
Multi-perspective security analysis with explicit assumptions and confidence levels. Read-only static analysis for protocol verification.
- Multi-perspective security analysis
- Explicit assumptions & confidence levels
- Read-only static analysis
Security & Research Depth
Academic rigor meets practical implementation
Threat Model
Dolev-Yao Adversary
Full network control, message interception, injection, and replay capabilities
Quantum Adversary
Cryptographically relevant quantum computer with harvest-now-decrypt-later capability
Formal Verification
LaTeX Whitepaper
Formal specification with complete protocol description and security proofs
Game-Based Proof Sketch
Security reduction to standard cryptographic assumptions
ProVerif Analysis
Partial verification — honest status, work in progress
"Residual risks are documented, not hidden."
Cryptography Stack
Hybrid classical + post-quantum primitives for defense in depth
| Component | Classical | Post-Quantum | Standard |
|---|---|---|---|
| Key Exchange | X25519 | ML-KEM-768 | NIST FIPS 203 |
| Signatures | Ed25519 | ML-DSA-65 | NIST FIPS 204 |
| AEAD | ChaCha20-Poly1305 | — | RFC 8439 |
| Ratchet | Double Ratchet | Re-encapsulation cadence | Signal Protocol + PQ ext. |
Performance & Trade-offs
Measured numbers, no excuses
~45ms
Handshake latency
ARM (Apple M1)
+11%
Message overhead
vs. classical-only
24h / 2²⁰
Re-encapsulation
time or message count
Stvor prioritizes long-term confidentiality over minimal bandwidth.
Honest Limitations
We believe transparency is a security feature
Metadata leakage
Timing, message sizes, and communication patterns are visible to the relay. Documented in threat model.
No multi-device sync
Single-device architecture by design. Multi-device introduces key management complexity.
Browser security assumptions
Relies on browser sandbox, WebCrypto, and secure context. Not suitable for high-assurance environments.
Audit pending
No third-party security audit completed. Protocol is research-grade, not production-hardened.
Funding Status
Stvor is currently raising a small pre-seed round ($100k–$250k) to continue cryptographic R&D, formal verification, and independent security auditing.
Actively exploring cyber / deep-tech accelerators and research-aligned investors.
This funding extends the project runway by 6 months and enables:
- 1
Complete ProVerif model for multi-epoch ratcheting
Formal verification of the re-encapsulation protocol
- 2
Increase test coverage to >70%
Comprehensive unit and integration testing across the stack
- 3
External cryptographic audit (scope defined)
Third-party review of cryptographic implementation & protocol invariants
For investors interested in post-quantum security infrastructure
Discuss Pre-Seed / Research FundingFounder
Why this person, why this project
Cryptography-focused engineer
Deep expertise in applied cryptography and secure protocol design
Built full E2EE stack solo (47k+ LOC)
Messenger, SDK, relay, and security analysis engine
Research-first, security-honest philosophy
Prioritizes correctness and transparency over speed-to-market
Get Started
Choose your path into the Stvor ecosystem