Security News
PyPI’s New Archival Feature Closes a Major Security Gap
PyPI now allows maintainers to archive projects, improving security and helping users make informed decisions about their dependencies.
crypto; from kruptein
to hide or conceal.
To test the module feel free to use the sandbox
To install npm install kruptein
.set(secret, plaintext, [aad], callback)
.get(secret, ciphertext, [{at: auth_tag, aad: aad}], callback)
Industry standards are used for the algorithm, hashing algorithm, key & IV sizes. The default key derivation is pbkdf2, however use of the scrypt derivation function can be enabled.
algorithm
: (Optional) Cipher algorithm from crypto.getCiphers()
. Default: aes-256-gcm
.hashing
: (Optional) Hash algorithm from crypto.getHashes()
. Default: sha384
.encodeas
: (Optional) Output encoding. Currently supports binary
, hex
, & base64
. Default: base64
.key_size
: (Optional) Key size bytes (should match block size of algorithm). Default: 32
iv_size
: (Optional) IV size bytes. Default: 16
.at_size
: (Optional) Authentication tag size. Applicable to gcm
& ocb
cipher modes. Default: 128
.use_scrypt
: (Optional) Use .scrypt()
to derive a key. Requires node > v10. Default/Fallback: .pbkdf2()
.use_asn1
: (Optional) Disable the default ASN.1 encoding. Default: trueWhen selecting an algorithm from crypto.getCiphers()
the
iv
and key_size
values are calculated auto-magically to make implementation
easy.
You can always define your own if the defaults per algorithm and mode
aren't what you would like; see the options
section above.
To create a new ciphertext object. Run example to encrypt plaintext.
const kruptein = require("kruptein")(opts);
let secret = "squirrel";
kruptein.set(secret, "Operation mincemeat was an example of deception", (err, ct) => {
if (err)
throw err;
console.log(ct);
});
To retrieve plaintext from a ciphertext object. Run example to decrypt ciphertext.
const kruptein = require("kruptein")(opts);
let ciphertext, secret = "squirrel";
kruptein.get(secret, ciphertext, (err, pt) => {
if (err)
throw err;
console.log(pt);
});
The .set()
method output depends on three factors; the encodeas
,
algorithm
and use_asn1
.
For any algorithm that supports authentication (AEAD), the object
structure includes the Authentication Tag
and the Additional Authentication Data
attribute and value.
When the use_asn1
option is enabled (default is true), the result is an ASN.1
value using the encodeas
value. While this is a more complex
encoding option, it helps standardize & minimize the resulting
ciphertext output.
The included test harness, invoked with npm test
, makes every
attempt to trap and handle errors. Some of which come from side
channel or possible malability of the resultant ciphertext.
This can be seen within the test/index.js
CI test harness under
the HMAC, AT & AAD validation test cases.
An online playgound for experimenting with the module can also be found here
This module conforms to industry recommendations regarding algorithm type, mode, key size, iv size & implementation, digests, key derivation & management etc. References used provided here:
RFC:
NIST:
FIPS:
Contributions are welcome & appreciated!
Refer to the contributing document to help facilitate pull requests.
This software is licensed under the MIT License.
Copyright Jason Gerfen, 2019 to 2024.
FAQs
crypto; from kruptein to hide or conceal
We found that kruptein demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
PyPI now allows maintainers to archive projects, improving security and helping users make informed decisions about their dependencies.
Research
Security News
Malicious npm package postcss-optimizer delivers BeaverTail malware, targeting developer systems; similarities to past campaigns suggest a North Korean connection.
Security News
CISA's KEV data is now on GitHub, offering easier access, API integration, commit history tracking, and automated updates for security teams and researchers.