0.99.0 Feb 3, 2021
0.2.3 Oct 22, 2019
0.2.1 Aug 19, 2019
0.1.0 Jun 24, 2019
0.0.0 Jun 23, 2019

#7 in #ciphertext

Download history 317/week @ 2024-03-14 467/week @ 2024-03-21 440/week @ 2024-03-28 374/week @ 2024-04-04 445/week @ 2024-04-11 438/week @ 2024-04-18 448/week @ 2024-04-25 378/week @ 2024-05-02 370/week @ 2024-05-09 400/week @ 2024-05-16 456/week @ 2024-05-23 448/week @ 2024-05-30 377/week @ 2024-06-06 337/week @ 2024-06-13 350/week @ 2024-06-20 295/week @ 2024-06-27

1,411 downloads per month

MIT/Apache

2KB

RustCrypto: stream ciphers

Project Chat dependency status Apache2/MIT licensed HAZMAT

Collection of stream ciphers written in pure Rust.

⚠️ Security Warning: Hazmat!

Crates in this repository do not ensure ciphertexts are authentic (i.e. by using a MAC to verify ciphertext integrity), which can lead to serious vulnerabilities if used incorrectly!

Aside from the chacha20 crate, no crates in this repository have yet received any formal cryptographic and security reviews/audits.

USE AT YOUR OWN RISK!

Crates

Name Crate name Crates.io Docs MSRV Security
ChaCha chacha20 crates.io Documentation MSRV 1.65 💚
HC-256 hc-256 crates.io Documentation MSRV 1.65 💛
Rabbit rabbit crates.io Documentation MSRV 1.65 💛
RC4 rc4 crates.io Documentation MSRV 1.65 💔
Salsa20 salsa20 crates.io Documentation MSRV 1.65 💚

Security Level Legend

The following describes the security level ratings associated with each hash function (i.e. algorithms, not the specific implementation):

Heart Description
💚 No known successful attacks
💛 Theoretical break: security lower than claimed
💔 Attack demonstrated in practice: avoid if at all possible

Minimum Supported Rust Version (MSRV) Policy

MSRV bump is considered a breaking change and will be performed only with a minor version bump.

Example

Crates functionality is expressed in terms of traits defined in the cipher crate.

Let's use ChaCha20 to demonstrate usage of synchronous stream cipher:

use chacha20::ChaCha20;
// Import relevant traits
use chacha20::cipher::{KeyIvInit, StreamCipher, StreamCipherSeek};
use hex_literal::hex;

let key = [0x42; 32];
let nonce = [0x24; 12];
let plaintext = hex!("00010203 04050607 08090a0b 0c0d0e0f");
let ciphertext = hex!("e405626e 4f1236b3 670ee428 332ea20e");

// Key and IV must be references to the `GenericArray` type.
// Here we use the `Into` trait to convert arrays into it.
let mut cipher = ChaCha20::new(&key.into(), &nonce.into());

let mut buffer = plaintext.clone();

// apply keystream (encrypt)
cipher.apply_keystream(&mut buffer);
assert_eq!(buffer, ciphertext);

let ciphertext = buffer.clone();

// ChaCha ciphers support seeking
cipher.seek(0u32);

// decrypt ciphertext by applying keystream again
cipher.apply_keystream(&mut buffer);
assert_eq!(buffer, plaintext);

// stream ciphers can be used with streaming messages
cipher.seek(0u32);
for chunk in buffer.chunks_mut(3) {
    cipher.apply_keystream(chunk);
}
assert_eq!(buffer, ciphertext);

License

All crates licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

No runtime deps