The Apex of Interactive Visual Data Obfuscation
Cryptix is a high-performance, cryptographically hardened suite designed for the absolute sanitization of visual assets. By operating at the pixel-matrix level rather than the file-container level, Cryptix transforms raw image data into mathematically verified noise, rendering it invisible to forensic analysis without the unique polymorphic key bundle.
- Authenticated Encryption (AEAD): Powered by
XChaCha20-Poly1305, providing not just privacy, but mathematical proof that your data has not been tampered with. - Post-IEND Integrity Seal: A custom 16-byte Poly1305 authentication tag is appended to the PNG byte stream, ensuring full tamper-detection while remaining invisible to standard image viewers.
- Zero-Trace Memory: Utilizes the
zeroizetrait to perform secure memory scrubbing, ensuring that encryption keys never persist in RAM after a session ends. - Smart TUI Interface: A refined terminal experience featuring neon aesthetics, real-time progress tracking via
indicatif, and intelligent multi-line key handling. - Mobile-Ready Logic: Native
Termuxclipboard integration and a robust multi-line paste reader for seamless cross-platform security.
| Feature | Standard Stream Ciphers | Cryptix (AEAD) |
|---|---|---|
| Privacy (XOR) | ✅ | ✅ |
| Tamper Resistance | ❌ | ✅ (Poly1305) |
| Nonce Reuse Protection | Limited | ✅ (192-bit X-Nonce) |
| Integrity Checks | Manual/External | ✅ Built-in |
| Memory Security | Manual | ✅ Automated Zeroize |
Cryptix implements a multi-stage deterministic pipeline to ensure data remains lossless and verifiable.
graph TD
A[Raw Image] --> B[RGBA8 Buffer Extraction]
B --> C{XChaCha20-Poly1305}
C -->|Encrypt| D[Encrypted Pixel Matrix]
C -->|Generate| E[16-byte Auth Tag]
D --> F[Lossless PNG Serialization]
E --> G[Post-IEND Attachment]
F --> H[Secure .png Vault]
G --> H
Standard encryption often corrupts file headers. Cryptix avoids this by:
- Encrypting only the raw pixel bytes.
- Saving the file as a valid, viewable (as noise) PNG.
- Appending the Poly1305 Tag at the very end of the file file (after the
IENDchunk). - Validating this tag during decryption; if a single bit is changed, the vault remains sealed.
- Rust Toolchain (Stable)
- Standard Build Tools (
gcc,make, etc.)
# Clone the repository
git clone https://github.com/hakinexus/cryptix.git
cd cryptix
# Build for production
cargo build --releaseThe optimized binary will be available at ./target/release/cryptix.
./target/release/cryptix- Select ◈ Target Image File from the main menu.
- Locate your source image (supports PNG, JPG, WebP).
- Choose 🔒 Encrypt (Lock Data).
- Secure the Key Bundle: The TUI will output a URL-safe Base64 bundle. Save this immediately.
- Select the target
_locked.pngfile. - Choose 🔓 Decrypt (Unlock Data).
- Paste your key bundle. Cryptix will automatically verify the integrity seal before restoring the image.
- Batch Processing: Parallel encryption of entire directory clusters.
- Key File Sharding: Splitting keys across multiple physical files.
- Steganographic Tunneling: Hiding encrypted data inside legitimate images.
- Desktop GUI: A native cross-platform interface built with Tauri.
Distributed under the MIT License. See LICENSE for more information.
Developed by hakinexus with 🦀 Rust for absolute security.
