Crates.io | crypt_guard_kyber |
lib.rs | crypt_guard_kyber |
version | 0.1.2 |
source | src |
created_at | 2024-01-30 10:28:22.963499 |
updated_at | 2024-02-10 05:28:08.654711 |
description | CryptGuardLib is a comprehensive Rust library designed for strong encryption and decryption, incorporating post-quantum cryptography to safeguard against quantum threats. It's geared towards developers who need to embed advanced cryptographic capabilities in their Rust applications. |
homepage | |
repository | https://github.com/mm9942/CryptGuardLib |
max_upload_size | |
id | 1120101 |
size | 70,440 |
CryptGuard: Kyber is a comprehensive cryptographic library, offering robust encryption and decryption capabilities. It integrates traditional cryptography with post-quantum algorithms, ensuring resilience against quantum computing threats. Designed for developers, CryptGuard: Kyber empowers applications to withstand future digital security challenges. Embrace CryptGuard: Kyber as your trusted ally in safeguarding privacy in the digital realm.
Ensure your system has the latest stable versions of Rust, Cargo, and the Tokio runtime environment.
Encrypt data using encrypt
, encrypt_msg
, or encrypt_file
functions from the Encrypt
struct.
use crypt_guard::{
File,
Encrypt,
Decrypt,
Keychain,
FileRemover,
Signing,
Sign,
ActionType,
};
#[tokio::main]
async fn main() {
let encrypt = Encrypt::new();
let keychain = Keychain::new().unwrap();
let message = "This is a secret message!";
let hmac_key = b"encryption_test_key";
let encrypted_message = encrypt.encrypt_msg(message, keychain.shared_secret.as_ref().unwrap(), hmac_key)
.await
.expect("Failed to encrypt message");
}
#[tokio::main]
async fn main() {
let encrypt = Encrypt::new();
let keychain = Keychain::new().unwrap();
let file_path = PathBuf::from("path/to/your/file.txt");
let hmac_key = b"encryption_test_key";
let _ = encrypt.encrypt_file(file_path, keychain.shared_secret.as_ref().unwrap(), hmac_key)
.await
.expect("Failed to encrypt file");
}
Decrypt data using decrypt
, decrypt_msg
, or decrypt_file
functions from the Decrypt
struct.
#[tokio::main]
async fn main() {
let decrypt = Decrypt::new();
let keychain = Keychain::new().unwrap();
let encrypted_data = ...; // Load your encrypted data here
let hmac_key = b"encryption_test_key";
let decrypted_message = decrypt.decrypt_msg(encrypted_data, keychain.shared_secret.as_ref().unwrap(), hmac_key)
.await
.expect("Failed to decrypt message");
let file_path = PathBuf::from("path/to/your/encrypted_file.txt");
let _ = decrypt.decrypt_file(file_path, keychain.shared_secret.as_ref().unwrap(), hmac_key)
.await
.expect("Failed to decrypt file");
}
The Keychain
struct in CryptGuard: Kyber facilitates key management. It supports loading and saving public keys, secret keys, shared secrets, and ciphertexts.
fn main() {
let keychain = Keychain::new().unwrap();
// Load or generate keys as required
}
The xchacha20
feature in CryptGuard: Kyber introduces the XChaCha20 encryption algorithm, providing an additional layer of security for your cryptographic needs. This feature is optional and can be enabled in your Cargo.toml
.
#[cfg(feature = "xchacha20")]
#[tokio::main]
async fn main() {
#[cfg(feature = "xchacha20")]
{
let encrypt = Encrypt::new();
let keychain = Keychain::new().unwrap();
let message = "This is a secret message!";
let nonce = generate_nonce();
let hmac_key = b"encryption_test_key";
let encrypted_message = encrypt.encrypt_msg_xchacha20(message, keychain.shared_secret.as_ref().unwrap(), &nonce, hmac_key)
.await
.expect("Failed to encrypt message with XChaCha20");
}
}
#[cfg(feature = "xchacha20")]
;
#[tokio::main]
async fn main() {
#[cfg(feature = "xchacha20")]
{
let decrypt = Decrypt::new();
let keychain = Keychain::new().unwrap();
let nonce = ...; // Load your nonce here
let hmac_key = b"encryption_test_key";
let encrypted_data = ...; // Load your encrypted data here
let decrypted_message = decrypt.decrypt_msg_xchacha20(encrypted_data, keychain.shared_secret.as_ref().unwrap(), &nonce, hmac_key, false)
.await
.expect("Failed to decrypt message with XChaCha20");
}
}
CryptGuard depends on several external crates, specified in Cargo.toml
:
aes
: 0.8.3tokio
: 1.35.1 (with full
feature)colored
: 2.1.0env
: 0.0.0hex
: 0.4.3hmac
: 0.12.1indicatif
: 0.17.7pqcrypto-falcon
: 0.3.0pqcrypto-kyber
: 0.8.0pqcrypto-traits
: 0.3.5rand
: 0.8.5sha2
: 0.10.8tempfile
: 3.9.0chacha20
: 0.9.1 (optional, enabled with xchacha20
feature)cipher
: 0.4.4 (optional, enabled with xchacha20
feature)CryptGuard is licensed under the MIT LICENSE. The full license text is available in the LICENSE
file in the repository.
You now have the complete README.md content with the updated examples for CryptGuard.