10 releases
0.1.0-alpha.9 | Jun 23, 2023 |
---|---|
0.1.0-alpha.8 | Jun 20, 2023 |
0.1.0-alpha.7 | May 16, 2023 |
0.1.0-alpha.3 | Feb 28, 2023 |
#1424 in Cryptography
112 downloads per month
1MB
20K
SLoC
Advanced Crypto Library for Rust
This library is a partial porting of DEDIS kyber library to pure Rust.
This library provides a toolbox of advanced cryptographic primitives for Rust, that need more than straightforward signing and encryption. Please see the Rust crate documentation for this package for details on the library's purpose and API functionality.
The following table shows the already implemented features in compared with the DEDIS' library.
Feature | Mostly done | Done |
---|---|---|
Blake3 XOF | ✔️ | |
Util package | 🔶 | |
DH | ✔️ | |
KYBER point | ✔️ | |
KYBER scalar | ✔️ | |
KYBER group | 🔶 | |
VSS | ✔️ | |
DKG | ✔️ | |
Encryption | ✔️ | |
EdDsa | ✔️ | |
Schnorr signature | ✔️ | |
DSS | ✔️ | |
Shuffle package | ||
PVSS | ||
More signature schemes | ||
Pairing package | ||
Proof package | ||
Keccak XOF | ||
Blake2 XOF |
This first release's task is to provide DKG APIs intended to be used with Ed25519 Signature Scheme in a pure Rust implementation. Tests and benchmarks are also fully implemented.
Using the module
You can include this library by adding it to the Cargo.toml
file in your project.
[dependencies]
kyber_rs = "0.1.0-alpha"
In order to understand how to use this library, examples are provided under src/examples
Contributing
If want to add additional features or propose fixes to this library you are welcome to do so! To contribute directly to the repository, simply fork the project, push your changes to your fork and create a pull request.
Contacts
If you want to get in touch with us feel free to contact us at g.pescetelli@teleconsys.it
A note on deriving shared secrets
Traditionally, ECDH (Elliptic curve Diffie-Hellman) derives the shared secret from the x point only. In this framework, you can either manually retrieve the value or use the MarshalBinary method to take the combined (x, y) value as the shared secret. We recommend the latter process for new softare/protocols using this framework as it is cleaner and generalizes across different types of groups (e.g., both integer and elliptic curves), although it will likely be incompatible with other implementations of ECDH. See the Wikipedia page on ECDH.
Reporting security problems
This library is offered as-is, and without a guarantee. It will need an independent security review before it should be considered ready for use in security-critical applications. If you integrate Kyber into your application it is YOUR RESPONSIBILITY to arrange for that audit.
Dependencies
~13–24MB
~373K SLoC