Post-Quantum Encryption
Noxy uses Kyber-based post-quantum encryption to ensure encrypted decision requests remain secure even against future quantum computing threats.
1. Key Generation
Each user's device generates a Kyber public/private key pair resistant to quantum attacks.
2. Encapsulation
Sender uses recipient's public key to create an encrypted shared secret and ciphertext.
3. Decapsulation
Only the recipient can use their private key to extract the shared secret and decrypt the message.
Kyber Encryption
Messages encrypted on sender's device, decrypted only on recipient's device
Network nodes cannot read message contents
Perfect forward secrecy for every message
NIST Standardized
Kyber selected by NIST as primary post-quantum standard
Extensively peer-reviewed by cryptographers
Battle-tested in real-world implementations