BenchmarksStack RankingHICS (Free)
APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key
5-MINUTE QUICKSTART

Post-Quantum Encryption in 5 Minutes

Get your API key. Encrypt data. Sign with Dilithium. Verify a STARK proof. No PhD required.

Get Free API Key → Full API Reference
0

Get Your API Key

30 seconds. Request a key via the API or click "Get API Key" at h33.ai/pricing — free tier, 1,000 credits, no credit card.

Request API Key
bash
curl -X POST https://auth-api.z101.ai/api/auth/request \
  -H "Content-Type: application/json" \
  -d '{"email": "you@company.com"}'
🔑
Your API key starts with h33_live_. Keep it secret. Use environment variables in production — never commit keys to source control.

1

Sign with Dilithium (Post-Quantum Signature)

One call signs your data with 3 independent signature families: Ed25519 (classical), ML-DSA-65 (Dilithium, lattice), and FALCON-512 (lattice-NTRU). If any single family is broken, the other two still hold.

curl -X POST https://auth-api.z101.ai/api/h33-key/sign/3key \
  -H "Authorization: Bearer h33_live_YOUR_KEY" \
  -H "Content-Type: application/json" \
  -d '{"data": "Hello post-quantum world", "encoding": "utf8"}'
import requests

response = requests.post(
    "https://auth-api.z101.ai/api/h33-key/sign/3key",
    headers={"Authorization": "Bearer h33_live_YOUR_KEY"},
    json={"data": "Hello post-quantum world", "encoding": "utf8"}
)
print(response.json()["signature"])  # 3-Key: Ed25519 + Dilithium + FALCON
const res = await fetch("https://auth-api.z101.ai/api/h33-key/sign/3key", {
  method: "POST",
  headers: {
    "Authorization": "Bearer h33_live_YOUR_KEY",
    "Content-Type": "application/json"
  },
  body: JSON.stringify({ data: "Hello post-quantum world", encoding: "utf8" })
});
const { signature } = await res.json();
console.log(signature); // 3-Key: Ed25519 + Dilithium + FALCON
use reqwest::Client;
use serde_json::json;

let client = Client::new();
let res = client.post("https://auth-api.z101.ai/api/h33-key/sign/3key")
    .bearer_auth("h33_live_YOUR_KEY")
    .json(&json!({
        "data": "Hello post-quantum world",
        "encoding": "utf8"
    }))
    .send().await?;
let body: serde_json::Value = res.json().await?;
println!("{}", body["signature"]); // 3-Key: Ed25519 + Dilithium + FALCON
Response JSON
{
  "signature": "3key:ed25519_sig:dilithium_sig:falcon_sig",
  "algorithm": "H33-3-Key",
  "families": ["Ed25519", "ML-DSA-65", "FALCON-512"],
  "data_hash": "a7c2...e1f9",
  "timestamp": "2026-04-02T00:00:00Z"
}

2

Verify the Signature

Free — no credits consumed. Verification is always free and requires no authentication. All three signature layers are validated independently.

Verify 3-Key Signature
bash
curl -X POST https://auth-api.z101.ai/api/h33-key/verify/3key \
  -H "Content-Type: application/json" \
  -d '{"data": "Hello post-quantum world", "signature": "3key:..."}'
Response JSON
{
  "valid": true,
  "algorithm": "H33-3-Key",
  "layers": {
    "ed25519":   { "valid": true, "family": "classical" },
    "dilithium": { "valid": true, "family": "lattice" },
    "falcon":    { "valid": true, "family": "lattice-ntru" }
  }
}

3

Encrypt a Key with Kyber (Post-Quantum Key Wrapping)

Wrap any secret — an API key, a session token, a symmetric key — with Kyber (ML-KEM) post-quantum key encapsulation. The wrapped key can only be unwrapped by the intended recipient.

Kyber Key Wrap
bash
curl -X POST https://auth-api.z101.ai/api/h33-key/wrap \
  -H "Authorization: Bearer h33_live_YOUR_KEY" \
  -H "Content-Type: application/json" \
  -d '{"key_material": "my-secret-api-key-12345", "tier": "key-2"}'
🔒
Kyber (ML-KEM-768) is NIST FIPS 203 certified. Even a quantum computer running Shor's algorithm cannot break the key encapsulation. Combined with AES-256-GCM for the symmetric layer.

4

Score Your Code with HICS

Install the HICS CLI and score your codebase locally. Your code never leaves your machine. Only the STARK proof and signed grade are transmitted to H33 for verification.

HICS CLI
bash
# Install the HICS CLI
pip install h33-hics

# Score your codebase (code never leaves your machine)
h33-hics score --repo . --output grade.json

# View your grade
cat grade.json
grade.json JSON
{
  "score": 82,
  "grade": "B+",
  "dimensions": {
    "code_quality":      88,
    "security_posture":  74,
    "architecture":      91,
    "performance":       79,
    "compliance":        85,
    "maintenance_risk":  67
  },
  "proof":     "stark:...",
  "signature": "3key:..."
}
🛡
Zero-knowledge guarantee: Your source code stays on your machine. Only the STARK proof and the signed grade leave. H33 never sees your code — the proof is mathematically verifiable without it.

5

Get Your Public Verification Keys

No authentication required. Anyone can retrieve H33's public verification keys to independently verify signatures and proofs.

Public Keys
bash
curl https://auth-api.z101.ai/api/h33-key/keys/public

What You Just Did

What's Next

Free tier: 1,000 credits. No credit card. Verification is always free.

Get Free API Key →