#encryption #aead #aes #aes-gcm #siv

no-std aes-gcm-siv

Pure Rust implementation of the AES-GCM-SIV Misuse-Resistant Authenticated Encryption Cipher (RFC 8452) with optional architecture-specific hardware acceleration

17 unstable releases

0.11.1 Aug 1, 2022
0.11.0-pre.2 Jul 20, 2022
0.10.3 Aug 28, 2021
0.10.2 Jul 20, 2021
0.3.0 Nov 27, 2019

#1783 in Cryptography

Download history 36027/week @ 2023-11-21 45219/week @ 2023-11-28 40499/week @ 2023-12-05 42972/week @ 2023-12-12 38718/week @ 2023-12-19 16420/week @ 2023-12-26 36878/week @ 2024-01-02 37789/week @ 2024-01-09 37817/week @ 2024-01-16 41949/week @ 2024-01-23 40048/week @ 2024-01-30 42347/week @ 2024-02-06 44977/week @ 2024-02-13 44890/week @ 2024-02-20 50941/week @ 2024-02-27 42687/week @ 2024-03-05

190,494 downloads per month
Used in 706 crates (43 directly)

MIT/Apache

27KB
196 lines

RustCrypto: AES-GCM-SIV (Misuse-Resistant Authenticated Encryption Cipher)

crate Docs Apache2/MIT licensed Rust Version Project Chat Build Status

AES-GCM-SIV (RFC 8452) is a state-of-the-art high-performance Authenticated Encryption with Associated Data (AEAD) cipher which also provides nonce reuse misuse resistance.

Suitable as a general purpose symmetric encryption cipher, AES-GCM-SIV also removes many of the "sharp edges" of AES-GCM, providing significantly better security bounds while simultaneously eliminating the most catastrophic risks of nonce reuse that exist in AES-GCM.

Decryption performance is equivalent to AES-GCM. Encryption is marginally slower.

See also:

Documentation

Security Warning

No security audits of this crate have ever been performed.

Some of this crate's dependencies were audited by by NCC Group as part of an audit of the aes-gcm crate, including the AES implementations (both AES-NI and a portable software implementation), as well as the polyval crate which is used as an authenticator. There were no significant findings.

All implementations contained in the crate are designed to execute in constant time, either by relying on hardware intrinsics (i.e. AES-NI and CLMUL on x86/x86_64), or using a portable implementation which is only constant time on processors which implement constant-time multiplication.

It is not suitable for use on processors with a variable-time multiplication operation (e.g. short circuit on multiply-by-zero / multiply-by-one, such as certain 32-bit PowerPC CPUs and some non-ARM microcontrollers).

USE AT YOUR OWN RISK!

License

Licensed under either of:

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

Dependencies

~0.7–1MB
~21K SLoC