API tokens in .env files. SSH keys on disk. Database passwords in config. TLS certs in mounted volumes. Crypto wallet private keys in hot storage. Every key in your infrastructure sits one credential dump from catastrophic compromise.
H33-Key — Kyber-1024 encryption wherever keys live. No vault migration. No workflow change. Sub-millisecond overhead.
Start EncryptingVaults centralize secrets behind a new abstraction layer. H33-Key does the opposite — it encrypts keys exactly where they already live. Database columns, environment variables, config files, SSH keys, TLS certificates, crypto wallet private keys. The encryption travels with the key. No migration. No new workflow. No single point of failure.
Not another secrets vault. Encryption that follows your keys.
Kyber-1024 KEM + AES-256-GCM wrap + HMAC-SHA3 integrity + Dilithium signature — all under half a millisecond.
No infrastructure to deploy. No agents to install. No migration project to plan.
Every secrets manager on the market decrypts the key before handing it to you. H33-Key doesn’t.
TEE proxy — your infrastructure never touches plaintext. Your app sends an encrypted key + request. Gateway decrypts inside a Trusted Execution Environment, forwards the API call to the third-party service, zeroes the plaintext, and returns the response. At no point does your infrastructure — or ours — see the key in the clear.
Both sides integrate the H33 SDK. BFV fully homomorphic encryption compares the key without decrypting it — not even inside a TEE. The plaintext key never exists anywhere during verification. This is the endgame: zero-exposure at the mathematical level.
Key-FHE requires both parties to integrate the H33 SDK. We position it honestly as the future — the highest-security option for organizations willing to coordinate with their partners.
Every encrypted key has an ID. Revoke instantly. Rotate without downtime. Analogous to certificate revocation (CRL/OCSP) — but for every key in your infrastructure.
Every layer of H33-Key is designed to protect key material against both classical and quantum threats.
Post-quantum key encryption for every infrastructure pattern.
| Monthly Volume | $/Unit | Key-0 (3u) | Key-1 (8u) | Key-2 (15u) | Key-3 (25u) | Key-Gateway (35u) | Key-FHE (50u) |
|---|---|---|---|---|---|---|---|
| 10K | $0.060 | $0.18 | $0.48 | $0.90 | $1.50 | $2.10 | $3.00 |
| 50K | $0.040 | $0.12 | $0.32 | $0.60 | $1.00 | $1.40 | $2.00 |
| 250K | $0.025 | $0.075 | $0.20 | $0.375 | $0.625 | $0.875 | $1.25 |
| 1M | $0.012 | $0.036 | $0.096 | $0.18 | $0.30 | $0.42 | $0.60 |
| 5M+ | $0.006 | $0.018 | $0.048 | $0.09 | $0.15 | $0.21 | $0.30 |
| H33-Key | AWS KMS | HashiCorp Vault Transit | Azure Key Vault | |
|---|---|---|---|---|
| Post-quantum encryption | Kyber-1024 (NIST) | — | — | — |
| Latency | < 0.5ms | 5–15ms | 2–8ms | 10–25ms |
| Per-operation cost | From $0.018 | $1/10K requests | Self-managed infra | Per-op + per-key |
| Migration required | None — transparent layer | Full integration | Complex setup | SDK integration |
| Vendor lock-in | None | AWS-only | — | Azure-only |
| Threshold decryption (k-of-n) | Key-3 | — | — | — |
| Dilithium-signed provenance | Key-3 | — | — | — |
| Zero-exposure infrastructure | Key-Gateway (TEE proxy) | — | — | — |
| FHE key verification | Key-FHE | — | — | — |
All units fungible — same balance as H33-Auth, H33-Vault, H33-Share, H33-Shield, and H33-Health.
0.5ms.ssh-agent via a local proxy that decrypts keys on demand using Kyber-1024 decapsulation. You can also configure automatic SSH key rotation on a schedule, with the new public key pushed to your servers via webhook or Ansible callback.0.5ms. Decrypt-unwrap is slightly faster at approximately 0.4ms. Batch endpoints process up to 200 keys per request with amortized overhead, bringing per-key latency below 0.1ms at scale.client.key.encrypt(key_material, policy), and receive the encrypted payload. The SDK handles Kyber encapsulation, HMAC computation, and retry logic internally. All SDKs are open-source.POST /v1/key/batch endpoint accepts up to 200 key operations (encrypt, decrypt, rotate, or revoke) in a single request. Batch operations share a single Dilithium signing context and HMAC computation pass, reducing per-key overhead significantly. A 200-key batch typically completes in under 20ms total.