Skip to content
@rayketcham-lab

Ketcham Lab

PKI infrastructure, post-quantum cryptography tooling, and security engineering. Home of Quantum Nexum.

rayketcham-lab

Infrastructure-focused research lab building at the intersection of enterprise PKI, post-quantum cryptography, and security engineering.

Apache 2.0  Repos  Commit Signing  2FA


What We Do

Certificate authority infrastructure, cryptographic tooling, and security engineering — focused on real-world deployment at scale. Background spans enterprise CA management and Federal PKI operations, including Federal Bridge cross-certification.

On the consumer side we're building HomePKI — a private CA for the home network, delivered as a single static Linux binary with post-quantum algorithms available today.

We're also exploring AI-driven project ideation with Project Forge, an autonomous think-tank engine that generates, scores, and scaffolds security-focused project ideas.


Quantum Nexum

quantumnexum.com — the flagship of this lab.

Post-quantum cryptography is no longer theoretical — NIST finalized ML-DSA, ML-KEM, and SLH-DSA in 2024. Most organizations aren't ready. Quantum Nexum is a post-quantum PKI platform, software stack, and educational resource built to close that gap.

PKI Coming Soon  Alpha  ML-DSA  ACME Coming Soon

Status today

  • PKI — coming soon, being refactored. The previous post-quantum CA hierarchy is on hold; a clean rebuild around ML-DSA-87 (root) and ML-DSA-65 (policy + issuing) is in flight. AIA, CRL, and OCSP endpoints at pki.quantumnexum.com will return once the new hierarchy lands.
  • ACME — coming soon, gated on the PKI refactor. Will be an RFC 8555 endpoint at acme.quantumnexum.com issuing post-quantum certs against the QN trust anchor.
  • Forge — in development. Hands-on PQ tooling: keygen, signatures, hybrid TLS, algorithm compare, OpenSSL 3.5 walkthroughs, cert inspector, migration decision tree, signature size calculator. At /forge/.
  • Vault — in development. Reference library covering FIPS 203/204/205, the IETF LAMPS PQ RFCs, OpenSSL 3.5 LTS, liboqs 0.11.0+, and the CNSA 2.0 / NSM-10 timelines. At /vault/.

Software (alpha)

  • Spork — pure-Rust post-quantum certificate authority. ML-DSA + SLH-DSA signing, ACME/EST/SCEP enrollment, OCSP, CRLs. Will power the QN PKI once the refactor lands; self-hostable today against your own private trust anchor. Single static binary, BSL 1.1. Public site: /spork/.
  • Parcl — S/MIME certificate manager and encryption add-in for Microsoft Outlook. Native S/MIME, LDAP directory lookup, RFC 5751/7508 compliant. Repo: parcl.
  • spork-acme-installer — self-extracting installer for the standalone Spork ACME server.

Visit quantumnexum.com →


Spotlight

HomePKI

Your own Certificate Authority for your home network. One static Linux binary (musl, x86_64 + aarch64), post-quantum ready today, no cloud, no account. Issue real TLS certificates for routers, NAS, cameras, Home Assistant, and any device on your LAN — signed by a CA that belongs to you alone.

Pre-release  Rust  Post-quantum  License

View Repository →  |  FAQ →


PKI-Signing-Service

Pure Rust code signing engine supporting Authenticode (PE/CAB/MSI), PKCS#7/CMS, RFC 3161 timestamping, and PowerShell script signing. Default algorithms: RSA (2048-4096), ECDSA (P-256/P-384/P-521), Ed25519. Post-quantum ML-DSA (44/65/87) is experimental — opt-in via --features pq-experimental, depends on the pre-1.0 ml-dsa = 0.0.4 crate; not suitable for production yet. REST API for CI/CD integration, built-in RFC 3161 TSA server, PFX/PKCS#12 import.

CI  Alpha  Rust  License

View Repository →  |  API Docs →


PKI-Client

Modern PKI CLI for certificate inspection, key management, TLS probing, compliance validation (FIPS 140-3, NIST SP 800-57, Federal Bridge), DANE/TLSA, and declarative CA hierarchy building. Pure Rust, no OpenSSL dependency, single static musl binary. Five output formats (text / json / compact / forensic / openssl). Post-quantum ML-DSA is opt-in via --features pqc (uses Spork's vendored PQ machinery). Enrollment protocols removed in v0.9.0 — ACME / EST / SCEP are out of scope; pin v0.8.1 or wait for the separate pki-enroll tool.

CI  Alpha  Rust  License

View Repository →  |  Docs →


qn-claude-web

Self-hosted web frontend for Claude Code CLI — access Claude Code from any browser, any device, anywhere on your network. Zero external dependencies beyond Python and a running Claude Code instance.

CI  Alpha  Python  License

View Repository →


Projects

Repo What It Does Status
parcl S/MIME Certificate Manager & Encryption Add-in for Microsoft Outlook — encryption, signing, LDAP lookup, RFC 5751/7508 compliant CI C#
project-forge Autonomous IT project think-tank engine — generates, scores, synthesizes, and scaffolds project ideas into GitHub repos with CI/CD CI Python
issue-reporter Drop a feedback button on any web page. Reports become GitHub issues. No backend required. No dependencies. One file. Alpha JavaScript
gh-tracker Self-hosted GitHub analytics dashboard — archives traffic, referrers, issues, and workflows before the 14-day API expiry Alpha Python TypeScript
shadowtrap Multi-protocol network honeypot for threat intelligence and attack pattern analysis Alpha Python

Security

We take security seriously across all projects:

  • Signed commits required — all commits must have verified signatures
  • 2FA enforced — all org members
  • Dependency scanning — Dependabot enabled across all repositories
  • Code scanning — CodeQL and custom security workflows
  • Responsible disclosure — see our Security Policy

Found a vulnerability? Email root@quantumnexum.com or use GitHub's private vulnerability reporting.


Stack

Rust  Python  C#  JavaScript  TypeScript  Godot


Contributing

We build in the open where we can. Contributions, issues, and discussions are welcome on any of our public repositories.


Get In Touch

Webquantumnexum.com  |  Emailroot@quantumnexum.com


Building in the open.

Pinned Loading

  1. issue-reporter issue-reporter Public

    Drop a feedback button on any web page. Reports become GitHub issues. No backend required. No dependencies. One file.

    JavaScript

  2. PKI-Signing-Service PKI-Signing-Service Public

    Pure Rust code signing engine — Authenticode (PE/CAB/MSI), PKCS#7/CMS, RFC 3161 timestamping, PowerShell SIP, detached CMS. PFX import, multi-algorithm (RSA/ECDSA/Ed25519/ML-DSA), REST API.

    Rust

  3. PKI-Client PKI-Client Public

    Modern PKI operations tool — certificate inspection, key management, TLS probing, and enrollment protocols

    Rust 1

Repositories

Showing 10 of 10 repositories

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…