Cryptographic Algorithms

MetaMUI Crypto Primitives implements 49 cryptographic algorithms across 10 platforms, all as pure implementations without external dependencies.

Algorithm Categories

🔐 Post-Quantum Cryptography

Quantum-resistant algorithms for future-proof security:

✍ïļ Digital Signatures

Classical and modern signature algorithms:

🔒 Symmetric Encryption

Block and stream ciphers with authenticated modes:

#ïļâƒĢ Hash Functions

Cryptographic hash functions for various use cases:

🔑 Key Derivation

Functions for deriving keys from passwords or other sources:

🔄 Key Exchange

Secure key agreement protocols:

🔏 Message Authentication

Message authentication codes and PRFs:

ðŸŽē Random Number Generation

Cryptographically secure random number generators:

ðŸŠķ Lightweight Cryptography

Optimized algorithms for resource-constrained environments:

🛠ïļ Utility Functions

Supporting cryptographic utilities:

Algorithm Selection Guide

For New Applications

For Compatibility

For Post-Quantum Security

Security Levels

Algorithm Security Level Quantum-Resistant
ML-KEM-768 192 bits ✅ Yes
Dilithium 128-256 bits ✅ Yes
Falcon-512 128 bits ✅ Yes
NTRU Prime 128-256 bits ✅ Yes
Ascon 128 bits ✅ Yes
Ed25519 128 bits ❌ No
X25519 128 bits ❌ No
AES-256 256 bits ⚠ïļ Partial (128-bit)
ChaCha20 256 bits ⚠ïļ Partial (128-bit)
SHA-256 128 bits collision ⚠ïļ Partial
Blake3 128 bits minimum ⚠ïļ Partial
Argon2 Configurable ⚠ïļ Partial
HMAC Hash-dependent ⚠ïļ Partial
Poly1305 128 bits ⚠ïļ Partial
SipHash 64 bits ⚠ïļ Partial

Performance Characteristics

Speed Rankings (Operations/Second)

  1. Blake3 - Fastest hashing
  2. ChaCha20 - Fastest encryption
  3. Ed25519 - Fast signatures
  4. AES-256 - Fast with hardware support
  5. ML-KEM-768 - Fast post-quantum KEM

Memory Usage

Key/Signature Sizes

| Algorithm | Public Key | Private Key | Signature | |———–|————|————-|———–| | Ed25519 | 32 bytes | 32 bytes | 64 bytes | | Sr25519 | 32 bytes | 32 bytes | 64 bytes | | Dilithium | 1312 bytes | 2528 bytes | 2420 bytes | | Falcon-512 | 897 bytes | 1281 bytes | 690 bytes | | ML-KEM-768 | 1184 bytes | 2400 bytes | N/A |

Implementation Details

All algorithms are:

Standards Compliance

Our implementations follow these standards:


For detailed information about specific algorithms, explore the category pages above or consult the API documentation.