Security News
Weekly Downloads Now Available in npm Package Search Results
Socket's package search now displays weekly downloads for npm packages, helping developers quickly assess popularity and make more informed decisions.
@keeex/crypto
Advanced tools
This library provides some cryptographic functions. There is a pure JavaScript implementation available, but it is recommended to import environment-specific implementations for better performances.
If randomness is required, it is mandatory to use a specific implementation, as the pure JavaScript one can't guarantee secure randomness.
The following implementations are available, each in its own package to avoid conflicts :
@keeex/crypto-provider-browser
: based on Subtle Crypto available in most web browsers@keeex/crypto-provider-node
: based on Node's crypto module@keeex/crypto-provider-reactnative
: based on native crypto module for both Android and iOSThere is also a pure JavaScript implementation available by calling usePureJSProvider()
instead of
importing one of these packages.
This implementation does not provide a safe random number generation.
Aside from the purejs
one, all implementations provides at least a secure source of randomness.
Some feature/algorithms might not be supported natively everywhere; providers usually fallback to
the JavaScript implementation for these parts.
Older versions of the library provided automatic fallback to the JavaScript implementation, but this was removed in favor of handling them in each provider to reduce bundle size.
The following algorithms are supported for each classes of cryptographic algorithms:
The library provide a source of random bytes.
The random source when using the pure JavaScript library is not safe for cryptographic uses; it is merely provided as a way to start developping. In production environment a proper cryptographic provider with a safe random source is mandatory.
The library is provided in the @keeex/crypto/lib
directory, and the rest of this document is based
on that.
This version is built with recent JavaScript implementation in mind.
To improve compatibility with web browsers, a transpiled version is available in
@keeex/crypto/web
.
It's interface is entirely identical, to the lib
one but it can be used more safely with older
JavaScript engines.
To use a specific provider, import them. Providers automatically register themselves when loaded.
Wether you use a specific provider or the default one, you can directly call functions from the appropriate modules:
@keeex/crypto/lib/cipher
for symmetric encryption@keeex/crypto/lib/digest
for hash functions@keeex/crypto/lib/hmac
for hmac@keeex/crypto/lib/keys
for key handling@keeex/crypto/lib/random
for random sourceA stream API is available for some algorithms. For now it is only available for Node and cipher functions.
It is possible to create an encryption stream by creating an instance of the Encrypt
class
available as @keeex/crypto/lib/stream/cipher/encrypt
default export.
The encryption key must be provided as the encryptionKey
field of the constructor's option
parameter.
The stream can then be used as a Transform
stream, accepting plaintext input and outputting
encrypted data.
A small header containing the IV is automatically added so the user does not have to take care of
it.
To decrypt, a similar procedure is available using Decrypt
instead of Encrypt
.
The data format used by stream encryption is compatible with the one used in encryptImmediate()
.
encryptRawImmediate()
encrypt a single buffer and return the encrypted buffer and the IVencryptImmediate()
encrypt a single buffer and return a block containing both the encrypted
buffer and the IV as one bufferdecryptRawImmediate()
decrypt an ecrypted buffer with the provided IVdecryptImmediate()
decrypt an encrypted buffer previously produced by a call to
encryptImmediate()
createEncryptionContext()
create a context which can be updated multiple time with more input
for encryptioncreateDecryptionContext()
is the decryption equivalent of createEncryptionContext()
digestImmediate()
compute the hash of a bufferdigestString()
compute the hash of a stringdigest()
return a hasher to process input by chunk.The hasher provides two method: update()
that accept an Uint8Array
and digest()
.
Both return promises, and digest()
return a promise that resolve with an Uint8Array
.
hmacImmediate()
compute the HMAC of a single bufferhmac()
is similar to digest()
but with a key provided for HMAC computationsKey objects returned by these functions are opaque objects intended for use only with the appropriate crypto call from this library.
generateCryptoKey()
generate a random keyimportCryptoKey()
create a key object from user-provided materialderiveKey()
uses a PBKDF2 function to derivate a key from a passwordderiveKeyRaw()
uses a PBKDF2 function to derivate an Uint8Array
from a passwordrandomBytes()
provides the requested number of random bytesA crypto provider is basically an object matching the CryptoProvider
interface.
It is responsible for implementing all the required functions and fallbacks, as applicable.
The majorVersion
property of the provider must match the major version of this package.
For digest implementations, at least one of digestImmediate()
or digest()
must be implemented.
If only one is provided, the other will be used as a fallback.
The randomBytes()
implementation is mandatory.
Similar to digest, cipher can be provided either with an "immediate" method that take the full input at once, or with a "chunk" based approach which takes sequential blocks of input to produce output.
For the following three groups of functions, if one is missing the other is used as a fallback.
For generating IV, either getIVSize()
or generateIV()
are required.
For encryption, one of encryptRawImmediate()
or createEncryptionContext()
is required.
For decryption, one of decryptRawImmediate()
or createDecryptionContext()
is required.
Note that encryption is based on CryptoKey
instances, so there's a tight coupling between these
and the various key generation functions.
The importCryptoKey()
and deriveKeyRaw()
functions are mandatory.
Other functions (generateCryptoKey()
and deriveKey()
) can be provided, but can also be
implemented by fallbacks using the other two.
The hmacImmediate()
function is optional, as it can be bridged using regular digest code.
Same for hmac()
.
The core crypto library (shared implementations and general data handling) can be tested locally
using npm test
.
It runs against the built-in pure JavaScript implementation.
To test other cryptographic providers, import them in the regular fashion and call runTest()
.
Depending on the environment provided, stream features might be skipped for testing.
FAQs
Crypto provider selection
The npm package @keeex/crypto receives a total of 0 weekly downloads. As such, @keeex/crypto popularity was classified as not popular.
We found that @keeex/crypto demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Socket's package search now displays weekly downloads for npm packages, helping developers quickly assess popularity and make more informed decisions.
Security News
A Stanford study reveals 9.5% of engineers contribute almost nothing, costing tech $90B annually, with remote work fueling the rise of "ghost engineers."
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.