privatebox

Crates.ioprivatebox
lib.rsprivatebox
version0.1.1
sourcesrc
created_at2021-05-26 00:59:54.534795
updated_at2021-05-26 01:18:07.187211
descriptionA small and easy to use API to encrypt your data.
homepagehttps://github.com/jordanisaacs/privatebox
repositoryhttps://github.com/jordanisaacs/privatebox
max_upload_size
id402103
size36,992
Jordan (jordanisaacs)

documentation

README

PrivateBox crates.io docs.rs license

PrivateBox

PrivateBox provides a small and easy to use API to encrypt your data. It is meant to do one thing, be a simple wrapper and validator around the RustCrypto XChaCha20Poly1305 AEAD encryption algorithm.

PrivateBox is inspired/based off of Cocoon. PrivateBox is meant to be a smaller API, more flexible with associated data, and uses XChaCha for random nonces.

Generating a key

The examples just use array generation for the key to keep the code duplication down. However, keys should be random or pseudo-random (aka derived from something like a password).

Example:

use rand_core::{OsRng, RngCore};

let mut key = [0u8; 32];
OsRng.fill_bytes(&mut key);

Detached Encryption/Decryption

Detached encryption/decryption methods compute in place to avoid re-allocations. It returns a prefix (the nonce and tag) that is used for decryption. This is suitable for a no_std build, when you want to avoid re-allocations of data, and if you want to manage serialization yourself.

Example:

let mut privatebox = PrivateBox::new(&[1;32], OsRng);

let mut message = *b"secret data";
let assoc_data = *b"plain text";

let detached_prefix = privatebox.encrypt_detached(&mut message, &assoc_data)?;
assert_ne!(&message, b"secret data");

privatebox.decrypt_detached(&mut message, &assoc_data, &detached_prefix)?;
assert_eq!(&message, b"secret data");

See the docs for examples and more information.

PrivateBox Container

The encrypt/decrypt methods handle serialization for you and returns a container. It enables the easy use of stored associated data and separate associated data. It is much simpler to use than detached encryption/decryption. It uses alloc (enabled by default).

Example:

let mut privatebox = PrivateBox::new(&[1; 32], OsRng);
t header = &[5, 4, 3, 2];
let metadata = &[3, 3, 3];

let wrapped = privatebox.encrypt(b"secret data", header, metadata).expect("encrypt");
let (message, authenticated_header) = privatebox.decrypt(&wrapped, metadata).expect("decrypt");

assert_eq!(message, b"secret data");
assert_eq!(&authenticated_header, header);

See the docs for examples and more information.

Commit count: 16

cargo fmt