Welcome to ANKASecure API
Unlock modern, post-quantum-ready cryptography through a single, developer-friendly platform.
ANKASecure combines post-quantum cryptography (PQC) with proven classical algorithms so your data stays protected today —and tomorrow.
Key Capabilities
Area | Highlights |
---|---|
Key Generation | Classical (AES, RSA, ECC) and PQC algorithms: ML-KEM, ML-DSA, Falcon, SLH-DSA, HQC, FrodoKEM. |
Secure Endpoints | Streaming & non-streaming encryption/decryption, signing/verification, re-encrypt and re-sign for friction-free migration. |
Future-Proof Security | PQC algorithms vetted for NIST levels 1–5. |
Seamless Migration | Re-encrypt RSA → ML-KEM or re-sign RSA → ML-DSA without re-uploading data. |
Supported Algorithms – Full Matrix & Guidance
A complete, always-up-to-date table of every encryption, key-encapsulation and signature algorithm—classical and PQC—is available here:
➡️ Algorithm Matrix & Migration Guide
The guide includes:
- Security levels (1 → 5)
- Recommended lifetimes & industry use-cases
- Performance notes (key sizes, cipher-text sizes, CPU/RAM impact)
- Migration advice and sunset dates for legacy algorithms
Consult the matrix before choosing an algorithm for a new workload or planning a migration roadmap.
API Endpoint Categories
- Authentication – Obtain JWTs for secure API calls.
- Key Management – Generate, import, export, patch, revoke and report on keys.
- Secure Operations – Non-Streaming – Encrypt/decrypt or sign/verify moderate-sized data; supports cross-algorithm re-encrypt/re-sign.
- Secure Operations – Streaming – Chunk-based processing for multi-gigabyte files with the same crypto flexibility.
These four areas cover the entire crypto life-cycle—from key birth to revocation—in a quantum-resistant environment.
Why Post-Quantum Cryptography Matters
Quantum computers will eventually break RSA and ECC.
ANKASecure lets you:
- Adopt PQC incrementally while maintaining classical compatibility.
- Re-encrypt or re-sign existing data in-place—no data round-trips.
- Use streaming endpoints for petabyte-scale archives.
See the Algorithm Matrix for threat timelines and parameter recommendations.
CLI Tools for a Guided Experience
Tool | Purpose | Docs |
---|---|---|
ANKASecure CLI | Scriptable interface for automation or CI/CD pipelines. | Overview |
ANKASecure CLI Demo | Interactive walkthrough of 19 real-world scenarios. | Included with the CLI installers |
Quick Start
- Download the CLI or SDK from the Downloads page.
- Review the Algorithm Matrix and pick algorithms appropriate for your threat model.
- Run any of the 19 integration flows with ANKASecure CLI Demo or copy the code into your own project.
- Integrate the API endpoints into your applications for quantum-resistant security.
Need help? Read Using the SDK in Java or contact us at info@ankatech.co.
© 2025 AnkaTech Co. All rights reserved.