Menu

Tree [ae3eb8] main /
 History

HTTPS access


File Date Author Commit
 CLI 2025-07-23 Ivan Alekseev Ivan Alekseev [f96e66] PCA :))
 .DS_Store 2025-07-23 Ivan Alekseev Ivan Alekseev [f96e66] PCA :))
 .gitignore 2025-07-16 Ivan Alekseev Ivan Alekseev [c32a46] Initial commit
 LICENSE 2025-07-23 Ivan Alekseev Ivan Alekseev [f96e66] PCA :))
 README.md 2025-07-23 Ivan Alekseev Ivan Alekseev [ae3eb8] README.md
 commands.md 2025-07-23 Ivan Alekseev Ivan Alekseev [f96e66] PCA :))
 core_archiver.py 2025-07-23 Ivan Alekseev Ivan Alekseev [f96e66] PCA :))
 requirements.txt 2025-07-16 user user [28a671] Initial PTBC release
 setup_pca.sh 2025-07-23 Ivan Alekseev Ivan Alekseev [f96e66] PCA :))

Read Me

🧠 Made for people - PCA by Ivan Alekseev 2025 - Petoron core (ADC)

Petoron Crypto Archiver (PCA)
A minimal, binary archiver with Argon2id encryption, no traces, and zero tolerance for forgery.

How to encrypt any data? (must have Petoron Crypto Archiver already installed)

1) Prepare any file or folder
2) Run: python3 CLI/pca_cli.py encrypt test_file test_archiver.pca
3) Enter your PASSWORD (if you lose this password, the archive is lost forever)

  • How to decrypt anywhere? (must have PCA installed)

1) Run: python3 CLI/pca_cli.py decrypt test_archiver.pca test_name
2) Enter the same PASSWORD
3) If correct, the data will be restored to the target location


You can use PCA to:

  • Archive and encrypt sensitive folders
  • Protect personal data from any exposure
  • Create secure backups for any type of content
  • Store confidential messages, wallets, keys, identities

In short, anything you never want to be exposed :))


Can someone decrypt a .pca archive without the password?
No. And here’s why:
The key is derived from the password using Argon2id - the world’s best brute-force-resistant algorithm.

Parameters used:

  • memory_cost = 2^18 (256MB)
  • parallelism = 4
  • time_cost = 3

Even GPUs, ASICs, or quantum attacks are ineffective if password ≥ 12 characters.

No key files. No cookies. No fingerprints.
Key is created once in RAM via hash_secret_raw()
Password is wiped from memory after execution via .destroy()

Nothing is stored. Nothing is left. Nothing to extract.


Encryption uses AES-256-CFB with a unique IV

  • Each archive gets its own IV = Every file encrypts differently
  • Even using the same password twice creates totally different outputs
  • Streaming mode = Strong against pattern attacks
  • HMAC-SHA512 protects against spoofing or tampering

If even 1 byte is altered → decryption fails.

HMAC is derived from the same Argon2id input as encryption key, using a secret split.

It’s impossible to forge a valid .pca archive.


Format:

  • Binary-only, .pca extension
  • Starts with signature: PCA0
  • No headers, no compression, no fingerprints
  • HMAC is appended and verified strictly

Only the password can bring the archive back.


Welcome!
chmod +x setup_pca.sh
./setup_pca.sh


Licensed under the PCA Fair Use License by Ivan Alekseev | Petoron

MongoDB Logo MongoDB