
Product
Announcing Socket Fix 2.0
Socket Fix 2.0 brings targeted CVE remediation, smarter upgrade planning, and broader ecosystem support to help developers get to zero alerts.
@toruslabs/eccrypto
Advanced tools
JavaScript Elliptic curve cryptography library, includes fix to browser.js so that encrypt/decrypt works
@toruslabs/eccrypto is a JavaScript library that provides elliptic curve cryptography functionalities. It allows developers to perform cryptographic operations such as key generation, encryption, decryption, signing, and verification using elliptic curve algorithms.
Key Generation
This feature allows you to generate a private key and derive the corresponding public key using elliptic curve cryptography.
const eccrypto = require('@toruslabs/eccrypto');
const privateKey = eccrypto.generatePrivate();
const publicKey = eccrypto.getPublic(privateKey);
Encryption
This feature allows you to encrypt a message using a public key. The encrypted message can only be decrypted by the corresponding private key.
const eccrypto = require('@toruslabs/eccrypto');
const publicKey = Buffer.from('...'); // Replace with actual public key
const message = Buffer.from('Hello, world!');
eccrypto.encrypt(publicKey, message).then(function(encrypted) {
console.log(encrypted);
});
Decryption
This feature allows you to decrypt a message using a private key. The message must have been encrypted with the corresponding public key.
const eccrypto = require('@toruslabs/eccrypto');
const privateKey = Buffer.from('...'); // Replace with actual private key
eccrypto.decrypt(privateKey, encrypted).then(function(plaintext) {
console.log(plaintext.toString());
});
Signing
This feature allows you to sign a message using a private key. The signature can be verified by anyone with the corresponding public key.
const eccrypto = require('@toruslabs/eccrypto');
const privateKey = Buffer.from('...'); // Replace with actual private key
const message = Buffer.from('Hello, world!');
eccrypto.sign(privateKey, message).then(function(sig) {
console.log(sig);
});
Verification
This feature allows you to verify a signature using a public key. It checks if the signature is valid for the given message and public key.
const eccrypto = require('@toruslabs/eccrypto');
const publicKey = Buffer.from('...'); // Replace with actual public key
const message = Buffer.from('Hello, world!');
const signature = Buffer.from('...'); // Replace with actual signature
eccrypto.verify(publicKey, message, signature).then(function() {
console.log('Signature is valid');
}).catch(function() {
console.log('Signature is invalid');
});
Elliptic is a widely used library for elliptic curve cryptography in JavaScript. It provides a comprehensive set of features for working with elliptic curves, including key generation, signing, and verification. Compared to @toruslabs/eccrypto, elliptic offers more flexibility and supports a wider range of elliptic curves.
Secp256k1 is a high-performance library specifically for the secp256k1 elliptic curve, which is used in Bitcoin and other cryptocurrencies. It is optimized for speed and security. While @toruslabs/eccrypto provides a broader set of cryptographic functionalities, secp256k1 is focused on providing efficient operations for the secp256k1 curve.
The built-in Node.js 'crypto' module provides cryptographic functionalities, including support for elliptic curve operations. While it is not as specialized as @toruslabs/eccrypto, it offers a wide range of cryptographic tools and is suitable for general-purpose cryptographic needs.
JavaScript Elliptic curve cryptography library for both browserify and node.
There is currently no any isomorphic ECC library which provides ECDSA, ECDH and ECIES for both Node.js and Browser and uses the fastest implementation available (e.g. secp256k1-node is much faster than other libraries but can be used only on Node.js). So eccrypto
is an attempt to create one.
With the help of browserify eccrypto
provides different implementations for Browser and Node.js with the same API. Because WebCryptoAPI defines asynchronous promise-driven API, implementation for Node needs to use promises too.
ECDH only works in Node 0.11+ (see https://github.com/joyent/node/pull/5854), ECDSA only supports keys in PEM format (see https://github.com/joyent/node/issues/6904) and ECIES is not supported at all.
ECDSA and ECDH are supported in Chrome only on Windows (see also bug 338883), aren't supported by Firefox (fixed only in 36.0+, see bug 1034854; see also feature matrix) and ECIES is not defined at all in WebCryptoAPI draft. Also WebCryptoAPI currently defines only curves recommended by NIST meaning that secp256k1 (K-256) curve is not supported (see also: [1], [2]).
So we use seck256k1 library in Node for ECDSA, elliptic in Browser for ECDSA and ECDH and implement ECIES manually with the help of native crypto API.
var crypto = require("crypto");
var eccrypto = require("eccrypto");
// A new random 32-byte private key.
var privateKey = eccrypto.generatePrivate();
// Corresponding uncompressed (65-byte) public key.
var publicKey = eccrypto.getPublic(privateKey);
var str = "message to sign";
// Always hash you message to sign!
var msg = crypto.createHash("sha256").update(str).digest();
eccrypto.sign(privateKey, msg).then(function (sig) {
console.log("Signature in DER format:", sig);
eccrypto
.verify(publicKey, msg, sig)
.then(function () {
console.log("Signature is OK");
})
.catch(function () {
console.log("Signature is BAD");
});
});
var eccrypto = require("eccrypto");
var privateKeyA = eccrypto.generatePrivate();
var publicKeyA = eccrypto.getPublic(privateKeyA);
var privateKeyB = eccrypto.generatePrivate();
var publicKeyB = eccrypto.getPublic(privateKeyB);
eccrypto.derive(privateKeyA, publicKeyB).then(function (sharedKey1) {
eccrypto.derive(privateKeyB, publicKeyA).then(function (sharedKey2) {
console.log("Both shared keys are equal:", sharedKey1, sharedKey2);
});
});
var eccrypto = require("eccrypto");
var privateKeyA = eccrypto.generatePrivate();
var publicKeyA = eccrypto.getPublic(privateKeyA);
var privateKeyB = eccrypto.generatePrivate();
var publicKeyB = eccrypto.getPublic(privateKeyB);
// Encrypting the message for B.
eccrypto.encrypt(publicKeyB, Buffer.from("msg to b")).then(function (encrypted) {
// B decrypting the message.
eccrypto.decrypt(privateKeyB, encrypted).then(function (plaintext) {
console.log("Message to part B:", plaintext.toString());
});
});
// Encrypting the message for A.
eccrypto.encrypt(publicKeyA, Buffer.from("msg to a")).then(function (encrypted) {
// A decrypting the message.
eccrypto.decrypt(privateKeyA, encrypted).then(function (plaintext) {
console.log("Message to part A:", plaintext.toString());
});
});
eccrypto - JavaScript Elliptic curve cryptography library
Written in 2014-2015 by Kagami Hiiragi kagami@genshiken.org
To the extent possible under law, the author(s) have dedicated all copyright and related and neighboring rights to this software to the public domain worldwide. This software is distributed without any warranty.
You should have received a copy of the CC0 Public Domain Dedication along with this software. If not, see http://creativecommons.org/publicdomain/zero/1.0/.
FAQs
JavaScript Elliptic curve cryptography library, includes fix to browser.js so that encrypt/decrypt works
The npm package @toruslabs/eccrypto receives a total of 164,309 weekly downloads. As such, @toruslabs/eccrypto popularity was classified as popular.
We found that @toruslabs/eccrypto demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket Fix 2.0 brings targeted CVE remediation, smarter upgrade planning, and broader ecosystem support to help developers get to zero alerts.
Security News
Socket CEO Feross Aboukhadijeh joins Risky Business Weekly to unpack recent npm phishing attacks, their limited impact, and the risks if attackers get smarter.
Product
Socket’s new Tier 1 Reachability filters out up to 80% of irrelevant CVEs, so security teams can focus on the vulnerabilities that matter.