Skip to content

Welcome to ANKASecure API

Unlock modern, post-quantum-ready cryptography through a single, developer-friendly platform.

🚀 Test the API Now!

ANKASecure combines post-quantum cryptography (PQC) with proven classical algorithms so your data stays protected today —and tomorrow.


Key Capabilities

Area Highlights
Key Generation Classical (AES, RSA, ECC) and PQC algorithms: ML-KEM, ML-DSA, Falcon, SLH-DSA, HQC, FrodoKEM.
Secure Endpoints Streaming & non-streaming encryption/decryption, signing/verification, re-encrypt and re-sign for friction-free migration.
Future-Proof Security PQC algorithms vetted for NIST levels 1–5.
Seamless Migration Re-encrypt RSA → ML-KEM or re-sign RSA → ML-DSA without re-uploading data.

Supported Algorithms – Full Matrix & Guidance

A complete, always-up-to-date table of every encryption, key-encapsulation and signature algorithm—classical and PQC—is available here:

➡️ Algorithm Matrix & Migration Guide

The guide includes:

  • Security levels (1 → 5)
  • Recommended lifetimes & industry use-cases
  • Performance notes (key sizes, cipher-text sizes, CPU/RAM impact)
  • Migration advice and sunset dates for legacy algorithms

Consult the matrix before choosing an algorithm for a new workload or planning a migration roadmap.


API Endpoint Categories

  1. Authentication – Obtain JWTs for secure API calls.
  2. Key Management – Generate, import, export, patch, revoke and report on keys.
  3. Secure Operations – Non-Streaming – Encrypt/decrypt or sign/verify moderate-sized data; supports cross-algorithm re-encrypt/re-sign.
  4. Secure Operations – Streaming – Chunk-based processing for multi-gigabyte files with the same crypto flexibility.

These four areas cover the entire crypto life-cycle—from key birth to revocation—in a quantum-resistant environment.


Why Post-Quantum Cryptography Matters

Quantum computers will eventually break RSA and ECC.
ANKASecure lets you:

  • Adopt PQC incrementally while maintaining classical compatibility.
  • Re-encrypt or re-sign existing data in-place—no data round-trips.
  • Use streaming endpoints for petabyte-scale archives.

See the Algorithm Matrix for threat timelines and parameter recommendations.


CLI Tools for a Guided Experience

Tool Purpose Docs
ANKASecure CLI Scriptable interface for automation or CI/CD pipelines. Overview
ANKASecure CLI Demo Interactive walkthrough of 19 real-world scenarios. Included with the CLI installers

Quick Start

  1. Download the CLI or SDK from the Downloads page.
  2. Review the Algorithm Matrix and pick algorithms appropriate for your threat model.
  3. Run any of the 19 integration flows with ANKASecure CLI Demo or copy the code into your own project.
  4. Integrate the API endpoints into your applications for quantum-resistant security.

Need help? Read Using the SDK in Java or contact us at info@ankatech.co.

© 2025 AnkaTech Co. All rights reserved.