Initial commit
This commit is contained in:
63
README.md
Normal file
63
README.md
Normal file
@@ -0,0 +1,63 @@
|
||||
# ZeroEcho
|
||||
|
||||
<img src=ZeroEcho-logo.png width=20% align="right" />
|
||||
|
||||
*A Modular Toolkit for Covert, Resilient, and Future-Proof Communication*
|
||||
|
||||
**ZeroEcho** is a modular cryptographic toolkit designed to support secure, scriptable, and resilient data workflows — even in low-connectivity, offline, or constrained environments. Built with flexibility in mind, it enables developers, researchers, and advanced users to construct encryption pipelines using modern cryptographic algorithms and robust deployment models.
|
||||
|
||||
Whether you're working on secure file storage, encrypted communication, or privacy-focused data exchange, ZeroEcho offers a toolkit to build reliable, modern cryptographic workflows — with a focus on portability, future-proofing, and offline survivability.
|
||||
|
||||
**Key Features**
|
||||
|
||||
- Post-Quantum Cryptography (PQC)
|
||||
- Supports NIST-standardized algorithms like **ML-KEM (Kyber)**
|
||||
- Modular structure allows easy integration of additional post-quantum providers
|
||||
- Designed to protect against future quantum-based attacks
|
||||
|
||||
- Multi-Recipient Encryption (KEM)
|
||||
- Encrypt a single payload for multiple recipients, each with their own key
|
||||
- No shared secrets or central authority required
|
||||
- Optional decoy data streams to enhance confidentiality and recipient privacy
|
||||
|
||||
- AES Encryption Pipeline
|
||||
- Configurable AES modes: **GCM**, **CBC**, or **CTR**
|
||||
- Key sizes: **AES-128**, **AES-192**, **AES-256**
|
||||
- Fluent Java builder API for fine-grained parameter control
|
||||
|
||||
- Offline / Air-Gapped Operation ("Cave Model")
|
||||
- Generate encrypted payloads entirely offline
|
||||
- Transfer via physical media (USB, SD card, etc.)
|
||||
- Final upload or delivery can occur on separate, unconnected systems
|
||||
|
||||
- Deployment Script Generator
|
||||
- Automatically builds upload scripts for encrypted payloads
|
||||
- Supports staging to public endpoints (e.g., cloud drives, pastebins, file hosts)
|
||||
- Useful for creating asynchronous or indirect delivery workflows
|
||||
|
||||
- Steganographic Embedding
|
||||
- Optionally embed ciphertext into common media formats: images, audio, video
|
||||
- Enables discreet transport of encrypted data over everyday channels
|
||||
|
||||
- Additional Authenticated Data (AAD)
|
||||
- Supports AAD in AES-GCM for binding unencrypted metadata
|
||||
- Ensures integrity of file context without exposing its contents
|
||||
|
||||
- CLI Tools & Keystore Management
|
||||
|
||||
**ZeroEcho is ideal for:**
|
||||
|
||||
- Building secure backup and archive workflows
|
||||
- Sending encrypted messages across public platforms
|
||||
- Creating educational or research-grade cryptographic tools
|
||||
- Learning applied cryptography and encryption systems design
|
||||
- Exploring secure data transport in offline or limited-access environments
|
||||
|
||||
No deep programming experience is required to get started. Most features are available through intuitive CLI utilities and well-documented examples.
|
||||
|
||||
---
|
||||
|
||||
**🧭 Responsible Use Notice:** ZeroEcho is intended for lawful and ethical use only.
|
||||
It is designed to support privacy, secure communication, academic research, and freedom of expression. The author does **not condone or support** the use of this software for any illegal or malicious activities, including but not limited to data theft, unauthorized surveillance evasion, or digital espionage.
|
||||
|
||||
Users are responsible for complying with all applicable laws and regulations in their jurisdiction. This is a tool for empowerment, not exploitation.
|
||||
Reference in New Issue
Block a user