NIST-Certified · Quantum-Proof Since 2024

Lock Your Files. Future-Proof. NIST FIPS 203 · FIPS 204 · AES-256-GCM

QSafe Vault runs entirely in your browser, encrypting files with NIST-certified post-quantum algorithms. Your keys are derived locally, your files never leave your device, and your password is never stored or transmitted.

100% In Your Browser No Account Needed Zero Data Uploaded
QSAFE VAULT — ENCRYPTING…
$Creating your vault…
Deriving key from password (Argon2id)…
✓ Vault key ready — stored only in memory
$Generating quantum-safe key pair…
ML-KEM-768: Public key (1184 bytes)…
ML-DSA-65: Signing key (1952 bytes)…
✓ Keys generated — secret key encrypted at rest
$Encrypting: passport_scan.pdf
KEM encapsulation → shared secret…
AES-256-GCM encryption + auth tag…
ML-DSA-65 signature appended…
✓ Stored in vault. Only you can open it.
$

What QSafe Vault does

Six things that happen every time you use the vault.

01
🔑

Vault Creation

A vault name and password derive a 256-bit AES key via Argon2id. The key exists only in browser memory — it is never written to disk or transmitted.

02
📁

File Encryption

Files are encrypted using a hybrid scheme: ML-KEM-768 encapsulates a per-file key, AES-256-GCM encrypts the file content, and ML-DSA-65 signs the resulting container.

03
🛡️

Local-Only Storage

Encrypted containers are stored in IndexedDB — entirely local to your browser. No data is transmitted anywhere. Locking the vault or closing the tab clears all key material from memory.

04
⚛️

Post-Quantum Protection

RSA and ECDH — the basis of most current encryption — are vulnerable to Shor's Algorithm on a quantum computer. QSafe uses NIST FIPS 203 (ML-KEM) and FIPS 204 (ML-DSA), standardised specifically to resist quantum attacks.

05
✍️

Integrity Verification

Every container is signed with ML-DSA-65. The signature covers the full container including all policy fields. Verification runs before decryption — any modification to the container causes immediate rejection.

06

Time-Lock Policies

Attach a policy to any file specifying a minimum unlock timestamp. The timestamp is embedded inside the signed container and cannot be modified without breaking the signature.

⚠️

The "Harvest Now, Decrypt Later" Threat

Adversaries are actively collecting encrypted data today with the intent to decrypt it once fault-tolerant quantum hardware is available. Data encrypted with RSA or ECDH key exchange has a finite shelf life. ML-KEM-768 is built on lattice problems with no known quantum speedup — encrypted data remains secure regardless of future hardware advances. Learn about the math →

0-bit
Quantum-Safe Security
0%
Runs In Your Browser
0 uploads
Files Sent to Any Server
0
NIST Certification Year

From open to encrypted in 4 steps

01

CREATE VAULT

Choose a name and strong password. Your vault is created instantly — no sign-up, no email.

02

DROP YOUR FILE

Drag any file — documents, photos, contracts — directly into your open vault.

03

ENCRYPTED INSTANTLY

Your file is scrambled using hybrid quantum-safe encryption in under a second.

04

STORED SAFELY

The encrypted file lives in your browser's local storage. Unlock anytime with your password.

Everything you need to stay secure

🔐

HYBRID ENCRYPTION

Two layers of encryption work together: a quantum-safe key exchange (ML-KEM) plus AES-256-GCM — the same cipher used by governments and militaries worldwide.

✍️

TAMPER PROOF SIGNATURES

Every file gets a unique ML-DSA digital signature. If anyone modifies your encrypted file by even a single character, you'll know instantly when you try to open it.

TIME-LOCK POLICIES

Set a date before which a file cannot be decrypted — even if someone has your password. Perfect for wills, legal documents, or planned disclosures.

📊

AUDIT LOG

Every action — every encrypt, decrypt, and access attempt — is logged with a timestamp. Full transparency into what happened and when.

💾

EXPORT & BACKUP

Export your entire encrypted vault as a single file to back up or move between devices. Import it back with the same password to regain access.

🌐

ZERO SERVER CONTACT

After the page loads, QSafe Vault makes zero network requests. Open your browser's developer tools and watch — no uploads, no beacons, no telemetry. Ever.

Built on standards you can verify

🏛️
US GOVT CERTIFIED
NIST FIPS 203 & 204
🔓
OPEN ALGORITHMS
Publicly auditable math
🌐
CLIENT-SIDE ONLY
Zero server contact
NATIVE WEB CRYPTO
Hardware-accelerated AES

Used by security professionals

QSafe gives non-technical users access to genuine post-quantum security without requiring them to understand the underlying cryptography. The UX handles the complexity cleanly.

AK
Arjun Kapoor
SECURITY RESEARCHER

We use the time-lock policy for client contracts that must remain sealed until a specified date. The policy is cryptographically bound to the container — it's not a UI-level restriction.

PW
Priya Walia
CISO, FINTECH STARTUP

The architecture is genuinely impressive — Argon2id key derivation, ML-KEM encapsulation, real QSAFE containers. Not a simulation. This is production-grade crypto in a browser.

RS
Rahul Sharma
CRYPTOGRAPHY ENGINEER
No sign-up · No cloud · No risk

Your files deserve
real protection

No sign-up, no server-side processing. Create a vault, encrypt your files, and export a backup — all without leaving your browser.