BenchmarksStack Ranking H33-128H33-CKKSH33-256 FHE OverviewZK LookupsBiometricsPQC APIsPricing Performance DocsWhite Paper TokenBlogAbout
Log In Get API Key
MAXIMUM SECURITY • NIST LEVEL 5

256-Bit Post-Quantum Security.
NIST Level 5.

BFV with N=32768 polynomial degree. Exceeds AES-256 equivalent difficulty under quantum attack. For government, defense, SCIF environments, and data that must remain secure for decades.

32,768
Polynomial Degree
256
Users / Ciphertext
256-bit
Security Level
Level 5
NIST Classification

H33-128 vs H33-256

The same API. The same pipeline. Dramatically higher security margin.

ParameterH33-128H33-256
Polynomial degree (N)4,09632,768
Ciphertext modulus (Q)56-bit237-bit
Plaintext modulus (t)65,53765,537
SIMD slots32256
Security level128-bit (NIST L1)256-bit (NIST L5)
Auth latency (single)1.28ms5.98ms
Dilithium variantML-DSA-65ML-DSA-87
Quantum resistanceAES-128 equivAES-256 equiv

Future-Proof by Design

The quantum threat is not hypothetical. It is a matter of when, not if.

2030+
Quantum Threshold Approaches
Large fault-tolerant quantum computers could begin threatening 128-bit lattice security. Shor's algorithm derivatives and quantum lattice-sieving advances put NIST Level 1 parameters on a tighter timeline than originally projected.
2040+
256-Bit Remains Unbreakable
Grover's algorithm on AES-256 still requires 2128 operations — effectively unbreakable even with mature quantum hardware. H33-256's lattice parameters maintain equivalent hardness under the strongest known quantum attacks.
Long-Lived Data
Decades of Protection
Credentials, identity documents, medical records, classified intelligence — anything that must remain secure for 20+ years demands 256-bit encryption today. Harvest-now-decrypt-later attacks make this urgent, not optional.
The cost of upgrading later is orders of magnitude higher than starting with 256-bit today.

Three Tiers — All with ML-DSA-87

H33-256 uses ML-DSA-87 (Dilithium5) for Tier 2 and Tier 3 — matching the 256-bit FHE security level end-to-end.

FHE Endpoints

POST/v1/fhe/h33-256/keygen
POST/v1/fhe/h33-256/encrypt
POST/v1/fhe/h33-256/decrypt
POST/v1/fhe/h33-256/add
POST/v1/fhe/h33-256/multiply
POST/v1/fhe/h33-256/inner-product
POST/v1/fhe/h33-256/biometric-match
GET/v1/fhe/h33-256/health
Example — Generate Keys
curl -X POST https://api.h33.ai/v1/fhe/h33-256/keygen \
  -H "Authorization: Bearer $H33_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{"security_level": 256}'

FHE + ML-DSA-87 Endpoints

POST/v1/fhe/h33-256/dilithium/keygen
POST/v1/fhe/h33-256/dilithium/encrypt
POST/v1/fhe/h33-256/dilithium/decrypt
POST/v1/fhe/h33-256/dilithium/add
POST/v1/fhe/h33-256/dilithium/multiply
POST/v1/fhe/h33-256/dilithium/inner-product
POST/v1/fhe/h33-256/dilithium/biometric-match
POST/v1/fhe/h33-256/dilithium/sign
POST/v1/fhe/h33-256/dilithium/verify
GET/v1/fhe/h33-256/dilithium/health
Example — Encrypt with ML-DSA-87 Attestation
curl -X POST https://api.h33.ai/v1/fhe/h33-256/dilithium/encrypt \
  -H "Authorization: Bearer $H33_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{"plaintext": [1,0,1,...], "public_key": "..."}'

FHE + H33-3-Key (ML-DSA-87 Middle Key) Endpoints

POST/v1/fhe/h33-256/3key/keygen
POST/v1/fhe/h33-256/3key/encrypt
POST/v1/fhe/h33-256/3key/decrypt
POST/v1/fhe/h33-256/3key/add
POST/v1/fhe/h33-256/3key/multiply
POST/v1/fhe/h33-256/3key/inner-product
POST/v1/fhe/h33-256/3key/biometric-match
POST/v1/fhe/h33-256/3key/sign
POST/v1/fhe/h33-256/3key/verify
GET/v1/fhe/h33-256/3key/health
Example — 3-Key Biometric Match
curl -X POST https://api.h33.ai/v1/fhe/h33-256/3key/biometric-match \
  -H "Authorization: Bearer $H33_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{"ciphertext_a": "...", "ciphertext_b": "...", "threshold": 0.85}'
Included with every API call

Maximum Security. Maximum Headroom.

H33-256's N=32,768 ring dimension provides 4× more computational headroom than H33-128. Noise Pilot leverages this margin to deliver deeper circuits and longer-lived ciphertexts.

Extended Noise Margin
N=32,768 with 880-bit modulus chain delivers ~180 bits of noise budget — enough for 16+ multiplicative depth without bootstrapping.
NIST L5 Parameter Optimization
Noise Pilot auto-selects the modulus chain length to hit your target circuit depth while maintaining 256-bit post-quantum security.
Quantum-Safe Noise Floor
Noise margins account for future lattice algorithm improvements. Your encrypted data stays safe for decades, not years.
AI Health at 256-bit
Same 0.52µs AI Crypto Health monitoring, tuned for the deeper parameter space of H33-256. Catches anomalies before they matter.

Built for Regulated Environments

H33-256 meets the highest bar for cryptographic compliance in government and enterprise deployments.

🛡
NIST Level 5
Highest NIST post-quantum security level. 256-bit classical + quantum security. Exceeds AES-256 equivalent under known quantum attacks.
📜
HE Standard v1.1
Full compliance with the Homomorphic Encryption Standard (v1.1). Parameter sets validated against HElib, SEAL, and PALISADE reference implementations.
🔐
FIPS 140-3 Ready
Cryptographic module architecture designed for FIPS 140-3 Level 2+ validation. DRBG, key management, and self-test subsystems aligned to CMVP requirements.
FedRAMP Pathway
Infrastructure and controls mapped to FedRAMP High baseline. Authorization boundary documentation in progress for federal cloud deployment.

Where H33-256 Deploys

Maximum security for the environments where compromise is not an option.

🏛
Government & SCIF
🛡
Defense & Intelligence
🏦
Financial Settlement
💳
Long-Lived Credentials
Critical Infrastructure

Start Building With H33-256

256-bit post-quantum security. One API call. The same interface as H33-128.

Get API Key →
Verify It Yourself