Skip to content
/ PCA Public

Petoron Crypto Archiver (PCA) is a binary encryption archiver with no compression, no fingerprints, and no key recovery. Built with Argon2id key derivation, AES-256-CFB encryption, and HMAC-SHA512 authentication. Every archive is uniquely encrypted, verifiable, and irreversible without the password :))

License

Notifications You must be signed in to change notification settings

01alekseev/PCA

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🧠 Made for people - PCA by Ivan Alekseev 2025 - Petoron core (ADC)

Petoron Crypto Archiver (PCA) A minimal, binary archiver with Argon2id encryption, no traces, and zero tolerance for forgery.

How to encrypt any data? (must have Petoron Crypto Archiver already installed)

  1. Prepare any file or folder
  2. Run: python3 CLI/pca_cli.py encrypt test_file test_archiver.pca
  3. Enter your PASSWORD (if you lose this password, the archive is lost forever)
  • How to decrypt anywhere? (must have PCA installed)
  1. Run: python3 CLI/pca_cli.py decrypt test_archiver.pca test_name
  2. Enter the same PASSWORD
  3. If correct, the data will be restored to the target location

You can use PCA to:

  • Archive and encrypt sensitive folders
  • Protect personal data from any exposure
  • Create secure backups for any type of content
  • Store confidential messages, wallets, keys, identities

In short, anything you never want to be exposed :))


Can someone decrypt a .pca archive without the password? No. And here’s why: The key is derived from the password using Argon2id - the world’s best brute-force-resistant algorithm.

Parameters used:

  • memory_cost = 2^18 (256MB)
  • parallelism = 4
  • time_cost = 3

Even GPUs, ASICs, or quantum attacks are ineffective if password ≥ 12 characters.

No key files. No cookies. No fingerprints. Key is created once in RAM via hash_secret_raw() Password is wiped from memory after execution via .destroy()

Nothing is stored. Nothing is left. Nothing to extract.


Encryption uses AES-256-CFB with a unique IV

  • Each archive gets its own IV = Every file encrypts differently
  • Even using the same password twice creates totally different outputs
  • Streaming mode = Strong against pattern attacks
  • HMAC-SHA512 protects against spoofing or tampering

If even 1 byte is altered → decryption fails.

HMAC is derived from the same Argon2id input as encryption key, using a secret split.

It’s impossible to forge a valid .pca archive.


Format:

  • Binary-only, .pca extension
  • Starts with signature: PCA0
  • No headers, no compression, no fingerprints
  • HMAC is appended and verified strictly

Only the password can bring the archive back.


Welcome! chmod +x setup_pca.sh ./setup_pca.sh


Licensed under the PCA Fair Use License by Ivan Alekseev | Petoron

About

Petoron Crypto Archiver (PCA) is a binary encryption archiver with no compression, no fingerprints, and no key recovery. Built with Argon2id key derivation, AES-256-CFB encryption, and HMAC-SHA512 authentication. Every archive is uniquely encrypted, verifiable, and irreversible without the password :))

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published