#chacha20 #poly1305 #key-exchange #lazy-evaluation #x25519 #base #xchacha

lazyxchacha

Lazy XChaCha20-Poly1305 in Rust base on RustCrypto: ChaCha20Poly1305

2 releases

0.1.1 Apr 13, 2024
0.1.0 Apr 13, 2024

#1933 in Cryptography

Custom license

9KB
115 lines

lazyxchacha-rs

Lazy XChaCha20-Poly1305 in Rust base on RustCrypto: ChaCha20Poly1305.

"Buy Me A Coffee"

Algorithm details

  • Key exchange: X25519
  • Encryption: XChaCha20
  • Authentication: Poly1305

Benchmark

Gnuplot not found, using plotters backend
encrypt                 time:   [1.4821 µs 1.4897 µs 1.5010 µs]
                        change: [-33.403% -32.895% -32.441%] (p = 0.00 < 0.05)
                        Performance has improved.
Found 4 outliers among 100 measurements (4.00%)
  1 (1.00%) high mild
  3 (3.00%) high severe

Benchmarking decrypt: Warming up for 3.0000 s
decrypt                 time:   [1.3529 µs 1.3560 µs 1.3594 µs]
                        change: [-27.218% -27.057% -26.897%] (p = 0.00 < 0.05)
                        Performance has improved.
Found 8 outliers among 100 measurements (8.00%)
  8 (8.00%) high mild

How to use

  • Generate KeyPair
let keypair = KeyPair::new();
  • Key Exchange & Shared Key
let client_kp = KeyPair::new();
let server_kp = KeyPair::new();
let server_pk = server_kp.pk_string();

let shared_key = SharedKey::new(server_pk, client_kp.sk);
  • Encrypt
let lazyxchacha = LazyXChaCha::new();
let shared_key = SharedKey::new(server_pk, client_kp.sk);
let plaintext = r#"{"message": "hi"}"#;

let ciphertext = lazyxchacha.encrypt(plaintext, shared_key);
  • Decrypt
let lazyxchacha = LazyXChaCha::new();
let shared_key = SharedKey::new(server_pk, client_kp.sk);
let ciphertext = "58b99ca4a7";

let plaintext = lazyxchacha.decrypt(ciphertext, shared_key);

Dependencies

~2.4–4MB
~78K SLoC