Design-level security
for the AI era.
An applied cryptography practice. We audit at the layer above implementation — protocol architecture, primitive selection, threat modeling, formal verification — where AI bug-finders cannot help and humans still must.
Our practice areas
Audits
Protocol architecture, cryptographic review, threat modeling, formal verification.
Tools
Verifpal, Crucible, hpke-ng, Kyber-K2SO, PQ Migration Playbook.
Teaching
Applied Cryptography. Free for 50 Lebanese students this summer.
Lab
Post-Quantum Migration Playbook, advisories, papers, the audit floor.
From the audit floor
Bug classes we keep finding. Anonymized; representative; the kind of thing AI bug-finders catch after we have already shipped a fix.
Constant-time leak in ECC point doubling
AEAD nonce reuse under concurrent state
Incorrect rounding in lattice solver
Public key not validated to correct subgroup
Unchecked length field in TLV parser
Crucible.
Bug classes,
encoded as tests.
129 tests across 12 categories, each tagged with the bug class, the FIPS spec section, and the audit it came from. Wire any ML-KEM or ML-DSA implementation up over stdin/stdout. Pass or fail in seconds.
From the lab
hpke-ng: Faster, Smaller, Harder HPKE for Rust
Across 44 head-to-head benchmarks against hpke-rs, hpke-ng wins on 16 and ties the rest, ships a 30% smaller binary, 36% less project code, and a type system that catches four classes of bug at compile time.
Read →Announcing the Post-Quantum Migration Playbook
A 52-page practitioner guide for engineers and architects working on post-quantum migration, alongside an interactive scorecard and TLS scanner at pq-migration.symbolic.software.
Read →Verifpal 0.51.0: Sharper Semantics for Passwords, Assertions, and AEAD
Verifpal 0.51.0 tightens the analysis engine's treatment of password-qualified values, checked ASSERT? assertions, and AEAD associated data, all on the back of excellent bug reports from the community.
Read →Summer school for applied cryptographers.
UNTIL JULY 13
The conference