
Security News
npm Adopts OIDC for Trusted Publishing in CI/CD Workflows
npm now supports Trusted Publishing with OIDC, enabling secure package publishing directly from CI/CD workflows without relying on long-lived tokens.
A simple implementation of Salsa20 along with a nonce+password based key and hash determination function. Multiple exposed functions to ease encryption and decryption to a single key based program.
A simple, standalone library-based implementation of Salsa20 stream cipher developed by Daniel J Bernstein to encrypt and decrypt data along with a password determined key function.
Includes a multi-round nonce+password based key and hash function. The program is determined to be fairly cryptographically secure and is sufficiently fast for its implementation needs.
It implements a memory buffer for file encryptions and decryptions to make sure the memory usage does not blow up.
From the speed tests it can be asserted that it requires ~6s to encrypt 1GB of data. Which is fairly fast for most encryption/decryption operations required in Microservices and standalone applications(the main target for this).
A rust based library with equivalent API is soon underway.
Installing from PyPI
python3 -m pip install jihyocrypt
Or install from source
git clone https://gitlab.com/loggerheads-with-binary/jihyocrypt
cd jihyocrypt
python3 -m pip install -r requirements.txt
python3 -m setup.py install
The following functions exposed for different purposes. The following mnemonic has been used for the encryption and decryption.
Syntax for functions::
Ex:
import jihyocrypt as jihyo
jihyo.enc_f2f( 'plaintext.txt' , output_file = 'ciphertext.bin' , password = passphrase)
#Returns None, ciphertext.bin consists of encrypted data
The exposed encryption and decryption functions consist of two flags:
Flag | Default | If True | If False |
---|---|---|---|
progress_bar | False | Prints a progress bar to stderr which can be used to monitor the progress of encryption/decryption | No such bar is produced |
redundant | True | Encodes the hash of the nonce and passphrase inside the output Advisable to use since incorrect decryption will be flagged by the program | The hash is not outputted. During decryption with incorrect passphrase, the program will generate incorrect output flagging no error. |
It also consists of an optional buffer_size
argument in functions involving a file intermediary. The buffer size can be changed and is by default 3MB. A sweet spot for larger files with respect to time is ~100MB. The choice of time vs memory footprint is left to the developer
Passphrase can be a string/bytestring of any length. The phrase is put through a key generation function along with a nonce which generates a 256 bit key for the Salsa20 cipher and a 512 bit hash for the password verification.
If the redundant flag is set to False, the hash is not generated at all while if it is True, the hash is encoded in the output.
Note: The redundant
flag should be the same in both encryption and decryption. Otherwise it can lead to erroneous output/DecryptionError
The program uses two different integers, DEFAULT_OBFUSCATION_ROUNDS
and DEFAULT_JPIC_ROUNDS
(JPIC is the 512 bit hash and is short for Jihyocrypt Password Integrity Check)
Flag | Default | Recommended | Purpose |
---|---|---|---|
DEFAULT_OBFUSCATION_ROUNDS | 6 | >4 | To create a suitable 256 bit key for Salsa20 cipher from provided password and nonce |
DEFAULT_JPIC_ROUNDS | 6 | >2 | To create a suitable 512 bit hash to verify validity of input password during decryption |
The following parameters can be modified for modifying the key generation process. A higher value of the DEFAULT_OBFUSCATION_ROUNDS
will increase security of the key generated from a simple passphrase, but also increase the time needed. Similarly, a higher value of DEFAULT_JPIC_ROUNDS
will reduce the chances of backtracking an encryption password but require more time.
Injection can be done as follows:
import jihyocrypt as jihyo
jihyo.DEFAULT_OBFUSCATION_ROUNDS = N #N>0, N : int
jihyo.DEFAULT_JPIC_ROUNDS = M #M>0, M : int
##Encryption/Decryption values must be same
Note that if injection is used, injection values should be same for both encryption and decryption
Let's assume the plaintext input is a bytestring of N bytes, the following is the output structure
redundant == True
Ciphertext Size = N + 72
-------------------|---------------------------------|---------------------------------
8 (nonce) 64 (JPIC) N (encrypted ciphertext)
redundant == False
Ciphertext Size = N + 8
-------------------|---------------------------------------------------
8 (nonce) N (encrypted ciphertext)
The following speed tests were performed using a Google Colab Script and Google Colab Resources. Your results may vary significantly.
As expected, the behavior is fairly linear with O(N) complexity.
This behavior is fairly linear as well, and is ~(O(N)redundant=True
- O(N)redundant=False
)
Standard linear behavior as expected.
Similar behavior with added overhead of File I/O. Takes about 12.8 secs to encrypt a 1 GB, this can vary with disk I/O speeds.
A weird trend I noticed is the drop and then rise in time needed for encryption alongwith increase in buffer size. In my experience, a buffer of about 100MB can significantly reduce time. While above, it starts becoming slower. I don't have a possible explanation for this.
Then why is the JihyoCrypt buffer defaulting to 3MB one could ask. It's because when I first developed it, memory was a larger concern than Speed. The program is regularly used to encrypt and decrypt large files(20 GB and above), and the time difference is not significant. However, having only ~6 MB of the memory being occupied vs ~100 MB of the memory being occupied for an hour or more is a choice left to the programmer. As mentioned before, one can easily change the buffer size since it is just a parameter of the encryption/decryption.
Credits for the following libraries used: pycryptodome
And credits to Daniel J Bernstein for the Salsa20 stream cipher
The library is provided with MIT License
Any bugs or cryptographic improvements can be suggested to dev@aniruddh.ml
FAQs
A simple implementation of Salsa20 along with a nonce+password based key and hash determination function. Multiple exposed functions to ease encryption and decryption to a single key based program.
We found that jihyocrypt demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
npm now supports Trusted Publishing with OIDC, enabling secure package publishing directly from CI/CD workflows without relying on long-lived tokens.
Research
/Security News
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.