![Logo](https://hackmd.io/_uploads/BJ0jgjkiee.jpg) ![version](https://img.shields.io/badge/version-1.0-blue) ![License](https://img.shields.io/badge/license-Apache2.0-green) [TOC] # HylexCrypt-TU2050 HylexCrypt is an advanced hybrid steganography + cryptography toolkit (CLI + library) designed for robust, future-ready secret messaging inside image and audio carriers. It combines modern KDFs, AEAD ciphers, optional error-correction, and adaptive embedding strategies to maximize stealth, integrity and recoverability. Tagline: Quantum-resistant steganography and encryption - practicality and plausibility for the next generation of secure content hiding. Quick facts ----------- - Languages: Python 3.9+ - Primary features: Argon2id KDF, ChaCha20-Poly1305 / AES-GCM AEAD, Reed–Solomon FEC (optional), adaptive LSB embedding with deterministic position selection, WAV/PNG/JPEG support, device-lock binding, logical expiry (self-destruct), in-place embedded-message wipe (keeps carrier), scheduled wipe (background process). - Author(s): Deepak P S, Nithin S - Project / Maintainers: TwinCiphers - Recommended installation: see Usage for local install and dev setup. - Documentation: this set - Home, Usage Guide, API Reference, Research. Table of contents ----------------- - Quick start - Primary design goals - Security & design notes - Authors, TwinCiphers formation & acknowledgements, Assistance - Research & future insight (roadmap) - Where to go next Quick start ----------- 1. Ensure Python 3.9+ and core dependencies are installed: pip install -r requirements.txt **or minimal** pip install pillow numpy cryptography argon2-cffi 2. Run a self-test: hylexcrypt selftest 3. Encode: hylexcrypt encode carrier.png -o out -m "Top Secret" -p "StrongPass!2025" 4. Decode: hylexcrypt decode out/carrier_stego.png -p "StrongPass!2025" Primary design goals -------------------- 1. Cryptographic robustness — Argon2id KDF, ChaCha20-Poly1305 preferred AEAD with AES-GCM fallback. 2. Stealth & anti-detection — adaptive position selection. 3. Recoverability — optional Reed–Solomon FEC. 4. Operational safety — logical expiry and wipe functions. 5. Usability — single-file CLI/demo module. Security & design notes ----------------------- - Key derivation: profile-driven Argon2id. - AEAD: authenticated encryption. - Device-lock: non-portable payloads. - Self-destruct / expiry: logical expiry encoded. - Autowipe: scheduled background wipe. - Wipe vs delete: carrier preserved vs full file removal. - Decoys: alternate plausible payloads. Authors, TwinCiphers formation & acknowledgements ---------------------------------------------------- Authors: Deepak P S (cryptography, algorithms, systems integration) & Nithin S (System integration,Cryptography, tooling) TwinCiphers (maintainers): security research & tooling collective focusing on steganography and privacy-preserving workflows. Formation story: HylexCrypt grew from collaboration exploring practical steganography + crypto fusions. Acknowledgements: Pillow, NumPy, cryptography, argon2-cffi, reedsolo, SciPy, soundfile, colorama, psutil. Research & future insight (roadmap) ----------------------------------- Short-term: robust metadata headers, DCT embedding, adaptive FEC. Mid-term: post-quantum KEM integration, ML-aided embedding adaptors. Long-term: formal steganalysis testing, GUI, enterprise features. Where to go next ---------------- - [Usage Guide](https://hackmd.io/@hylexcrypt-tu2050/B1DLVq1jge) - [API Reference](https://hackmd.io/@hylexcrypt-tu2050/BJffEc1jge) - [Research](https://hackmd.io/@hylexcrypt-tu2050/B13DE5kjeg)