scottdhughes/quantum-seal
Quantum Seal — Quantum-resistant encrypted messaging for AI agents. Sealed envelopes with hybrid X25519 + ML-KEM-768 confidentiality and ML-DSA-65 sender authentication. Secret keys never enter the conversation.
Platform-specific configuration:
{
"mcpServers": {
"quantum-seal": {
"command": "npx",
"args": [
"-y",
"quantum-seal"
]
}
}
}Add the config above to .claude/settings.json under the mcpServers key.
[](https://opensource.org/licenses/MIT) []() []()
> Research and Prototyping Only. Powered by post-quantum-mcp and liboqs. Not recommended for production use or protecting sensitive data.
---
Quantum Seal gives AI agents the ability to send and receive quantum-resistant encrypted, sender-authenticated messages. Generate cryptographic identities, exchange keys, seal messages that only the intended recipient can open, and verify who sent them — all with algorithms designed to withstand both classical and quantum attacks.
Secret keys never enter the conversation. Ever.
Current encryption will be broken by quantum computers running Shor's algorithm. Harvest-now-decrypt-later attacks are already a concern — adversaries recording encrypted traffic today to decrypt when quantum hardware matures.
Quantum Seal uses NIST-standardized post-quantum algorithms so that messages sealed today remain confidential even against future quantum adversaries. The hybrid construction means both classical *and* quantum cryptography must be broken simultaneously.
Alice Bob
| |
| 1. Generate identity (store_as) | 1. Generate identity (store_as)
| Secret keys: opaque handles | Secret keys: opaque handles
| Public keys: shareable | Public keys: shareable
| |
| 2. Exchange identity cards |
| <─────── public keys ───────> |
| |
| 3. Seal message toLoading reviews...