Quick Start Guide
Get started with AnkaSecure in less than 10 minutes. This guide shows you how to perform your first post-quantum cryptographic operation using the SDK, CLI, or REST API.
Prerequisites
Before you begin, ensure you have:
- API Credentials: Access to AnkaSecure platform (SaaS or provided endpoint)
- API Key: Obtain from your tenant administrator or platform console
- Development Environment: Java 17+ (for SDK) or curl/HTTP client (for REST API)
New to AnkaSecure? See Environment Setup for detailed prerequisites.
Choose Your Path
Select the integration method that best fits your workflow:
=== "Java SDK" Best for: Java/JVM applications, enterprise integrations
**Time:** ~5 minutes
[Jump to SDK Quickstart](#sdk-quickstart)
=== "CLI" Best for: Scripting, automation, CI/CD pipelines
**Time:** ~3 minutes
[Jump to CLI Quickstart](#cli-quickstart)
=== "REST API" Best for: Any language, microservices, direct HTTP integration
Full reference, authentication, and runnable examples are hosted in our interactive API portal.
[Open the API Portal →](https://apidocs.ankatech.co/docs/getting-started)
SDK Quickstart
1. Add SDK Dependency
Add the AnkaSecure SDK to your Maven project:
<dependency>
<groupId>co.ankatech</groupId>
<artifactId>ankasecure-sdk</artifactId>
<version>3.0.0</version>
</dependency>
Or Gradle:
2. Configure Client
import co.ankatech.ankasecure.sdk.AnkaSecureClient;
import co.ankatech.ankasecure.sdk.config.ClientConfig;
// Configure the client
ClientConfig config = ClientConfig.builder()
.baseUrl("https://api.ankasecure.com") // Or your on-premise endpoint
.apiKey("YOUR_API_KEY")
.tenant("your-tenant-id")
.build();
AnkaSecureClient client = new AnkaSecureClient(config);
3. Generate a Quantum-Resistant Key
import co.ankatech.ankasecure.sdk.model.KeyGenerationRequest;
import co.ankatech.ankasecure.sdk.model.KeyResponse;
// Generate ML-KEM-768 key (quantum-resistant encryption)
KeyGenerationRequest keyRequest = KeyGenerationRequest.builder()
.algorithm("ML-KEM-768")
.keyId("my-first-pqc-key")
.build();
KeyResponse key = client.generateKey(keyRequest);
System.out.println("Key generated: " + key.getKeyId());
4. Encrypt Data
import co.ankatech.ankasecure.sdk.model.EncryptRequest;
import co.ankatech.ankasecure.sdk.model.EncryptResponse;
// Encrypt sensitive data
EncryptRequest encryptRequest = EncryptRequest.builder()
.keyId("my-first-pqc-key")
.plaintext("Sensitive data to protect")
.build();
EncryptResponse encrypted = client.encrypt(encryptRequest);
String ciphertext = encrypted.getCiphertext();
System.out.println("Encrypted: " + ciphertext);
5. Decrypt Data
import co.ankatech.ankasecure.sdk.model.DecryptRequest;
import co.ankatech.ankasecure.sdk.model.DecryptResponse;
// Decrypt data
DecryptRequest decryptRequest = DecryptRequest.builder()
.ciphertext(ciphertext)
.build();
DecryptResponse decrypted = client.decrypt(decryptRequest);
String plaintext = decrypted.getPlaintext();
System.out.println("Decrypted: " + plaintext);
✅ Success! You've encrypted and decrypted data using post-quantum cryptography.
Next Steps:
CLI Quickstart
1. Install the CLI
Download the CLI for your platform:
- Windows: Download Windows Installer
- macOS: Download macOS Installer
- Linux: Download Linux Package
Or install via package manager:
# macOS (Homebrew)
brew install ankatech/tap/ankasecure-cli
# Linux (apt)
sudo apt install ankasecure-cli
# Linux (yum)
sudo yum install ankasecure-cli
2. Initialize Configuration
ankasecure-cli config init
# Follow prompts to enter:
# - API Endpoint: https://api.ankasecure.com
# - API Key: YOUR_API_KEY
# - Tenant ID: your-tenant-id
Configuration is saved to ~/.ankasecure/config.properties.
3. Generate a Key
ankasecure-cli key generate \
--algorithm ML-KEM-768 \
--key-id my-cli-key
# Output:
# ✓ Key generated successfully
# Key ID: my-cli-key
# Algorithm: ML-KEM-768
# Status: ACTIVE
4. Encrypt a File
echo "Sensitive data" > secret.txt
ankasecure-cli encrypt \
--key-id my-cli-key \
--input secret.txt \
--output secret.enc
# Output:
# ✓ File encrypted successfully
# Input: secret.txt (15 bytes)
# Output: secret.enc (encrypted)
5. Decrypt the File
ankasecure-cli decrypt \
--input secret.enc \
--output decrypted.txt
# Output:
# ✓ File decrypted successfully
# Output: decrypted.txt (15 bytes)
cat decrypted.txt
# Sensitive data
✅ Success! You've encrypted and decrypted a file using the CLI.
Next Steps:
What You've Learned
In this quickstart, you:
- ✅ Generated a quantum-resistant encryption key (ML-KEM-768)
- ✅ Encrypted sensitive data using post-quantum cryptography
- ✅ Decrypted the data back to plaintext
- ✅ Used the SDK or CLI to complete a full encrypt/decrypt cycle
For REST API integration, continue at the API Portal.
Next Steps
Explore More Algorithms
AnkaSecure supports 78+ cryptographic algorithms:
- Encryption: ML-KEM-512/768/1024, RSA-2048/4096, AES-256
- Signatures: ML-DSA-44/65/87, Falcon-512/1024, RSA-PSS, ECDSA
- Hybrid: Combine classical + quantum-resistant algorithms
See: Algorithm Catalog
Learn Migration Strategies
Migrating from classical cryptography to PQC:
Explore Industry Use Cases
Dive Deeper
- 34 SDK Integration Flows - Real-world code examples
- Performance Benchmarks - Algorithm selection guidance
Need Help?
- Documentation Search: Use the search bar above
- Error Reference: Common Errors
- API Errors: Error Code Catalog
- Support: Contact info@ankatech.co
Documentation Version: 3.0.0
Last Updated: 2025-12-26