Get your API key. Encrypt data. Sign with Dilithium. Verify a STARK proof. No PhD required.
30 seconds. Request a key via the API or click "Get API Key" at h33.ai/pricing — free tier, 1,000 credits, no credit card.
curl -X POST https://auth-api.z101.ai/api/auth/request \ -H "Content-Type: application/json" \ -d '{"email": "you@company.com"}'
h33_live_. Keep it secret. Use environment variables in production — never commit keys to source control.One call signs your data with 3 independent signature families: Ed25519 (classical), ML-DSA-65 (Dilithium, lattice), and FALCON-512 (lattice-NTRU). If any single family is broken, the other two still hold.
curl -X POST https://auth-api.z101.ai/api/h33-key/sign/3key \ -H "Authorization: Bearer h33_live_YOUR_KEY" \ -H "Content-Type: application/json" \ -d '{"data": "Hello post-quantum world", "encoding": "utf8"}'
import requests response = requests.post( "https://auth-api.z101.ai/api/h33-key/sign/3key", headers={"Authorization": "Bearer h33_live_YOUR_KEY"}, json={"data": "Hello post-quantum world", "encoding": "utf8"} ) print(response.json()["signature"]) # 3-Key: Ed25519 + Dilithium + FALCON
const res = await fetch("https://auth-api.z101.ai/api/h33-key/sign/3key", { method: "POST", headers: { "Authorization": "Bearer h33_live_YOUR_KEY", "Content-Type": "application/json" }, body: JSON.stringify({ data: "Hello post-quantum world", encoding: "utf8" }) }); const { signature } = await res.json(); console.log(signature); // 3-Key: Ed25519 + Dilithium + FALCON
use reqwest::Client; use serde_json::json; let client = Client::new(); let res = client.post("https://auth-api.z101.ai/api/h33-key/sign/3key") .bearer_auth("h33_live_YOUR_KEY") .json(&json!({ "data": "Hello post-quantum world", "encoding": "utf8" })) .send().await?; let body: serde_json::Value = res.json().await?; println!("{}", body["signature"]); // 3-Key: Ed25519 + Dilithium + FALCON
{
"signature": "3key:ed25519_sig:dilithium_sig:falcon_sig",
"algorithm": "H33-3-Key",
"families": ["Ed25519", "ML-DSA-65", "FALCON-512"],
"data_hash": "a7c2...e1f9",
"timestamp": "2026-04-02T00:00:00Z"
}
Free — no credits consumed. Verification is always free and requires no authentication. All three signature layers are validated independently.
curl -X POST https://auth-api.z101.ai/api/h33-key/verify/3key \ -H "Content-Type: application/json" \ -d '{"data": "Hello post-quantum world", "signature": "3key:..."}'
{
"valid": true,
"algorithm": "H33-3-Key",
"layers": {
"ed25519": { "valid": true, "family": "classical" },
"dilithium": { "valid": true, "family": "lattice" },
"falcon": { "valid": true, "family": "lattice-ntru" }
}
}
Wrap any secret — an API key, a session token, a symmetric key — with Kyber (ML-KEM) post-quantum key encapsulation. The wrapped key can only be unwrapped by the intended recipient.
curl -X POST https://auth-api.z101.ai/api/h33-key/wrap \ -H "Authorization: Bearer h33_live_YOUR_KEY" \ -H "Content-Type: application/json" \ -d '{"key_material": "my-secret-api-key-12345", "tier": "key-2"}'
Install the HICS CLI and score your codebase locally. Your code never leaves your machine. Only the STARK proof and signed grade are transmitted to H33 for verification.
# Install the HICS CLI pip install h33-hics # Score your codebase (code never leaves your machine) h33-hics score --repo . --output grade.json # View your grade cat grade.json
{
"score": 82,
"grade": "B+",
"dimensions": {
"code_quality": 88,
"security_posture": 74,
"architecture": 91,
"performance": 79,
"compliance": 85,
"maintenance_risk": 67
},
"proof": "stark:...",
"signature": "3key:..."
}
No authentication required. Anyone can retrieve H33's public verification keys to independently verify signatures and proofs.
curl https://auth-api.z101.ai/api/h33-key/keys/public
Free tier: 1,000 credits. No credit card. Verification is always free.
Get Free API Key →