package cryptokit
Install
Dune Dependency
Authors
Maintainers
Sources
sha256=b933c32b4e03e7236add969c2f583df241aeff8eabd2cabb1f345a78250fcea6
sha512=7b1e2ba8b99b11a04522ffe4b6b92278bc772d9888967757ab013151211fc85d29847af566677f2b9c3200e45b857600a70356ca6ed80ca299508808057358b1
Description
Cryptokit includes authenticated encryption (AES-GCM, Chacha20-Poly1305), block ciphers (AES, DES, 3DES), stream ciphers (Chacha20, ARCfour), public-key cryptography (RSA, DH), hashes (SHA-256, SHA-512, SHA-3, Blake2, Blake3), MACs, compression, random number generation -- all presented with a compositional, extensible interface.
Published: 09 Jul 2024
README
The Cryptokit library
Overview
The Cryptokit library for OCaml provides a variety of cryptographic primitives that can be used to implement cryptographic protocols in security-sensitive applications. The primitives provided include:
Symmetric-key ciphers: AES, Chacha20, DES, Triple-DES, Blowfish, ARCfour, in ECB, CBC, CFB, OFB and counter modes.
Authenticated encryption: AES-GCM, Chacha20-Poly1305.
Public-key cryptography: RSA encryption and signature, Diffie-Hellman key agreement.
Hash functions and MACs: SHA-3, SHA-2, BLAKE2, BLAKE3, RIPEMD-160; MACs based on AES and DES; SipHash. (SHA-1 and MD5, despite being broken, are also provided for historical value.)
Random number generation.
Encodings and compression: base 64, hexadecimal, Zlib compression.
Additional ciphers and hashes can easily be used in conjunction with the library. In particular, basic mechanisms such as chaining modes, output buffering, and padding are provided by generic classes that can easily be composed with user-provided ciphers. More generally, the library promotes a "Lego"-like style of constructing and composing transformations over character streams.
This library is distributed under the conditions of the GNU Library General Public license version 2 or any later version, with the special OCaml exception on linking described in file LICENSE.
Requirements
OCaml 4.08 or more recent.
The Dune build system, version 2.0 or more recent.
The Zarith library, version 1.4 or more recent.
The Zlib C library, version 1.1.3 or up is recommended. If it is not installed on your system (look for libz.a or libz.so), get it from http://www.gzip.org/, or indicate in the Makefile that you do not have it. If you are running Linux or BSD or MacOS, your distribution provides precompiled binaries for this library.
Build, test and install
To configure, run
./configure
. There are options to disable or enable some features (run./configure --help
for a list), but the default configuration is fine most of the time.To build, run
dune build
.To execute a test, run
dune exec test/<name>.exe
where<name>
can betest
,prngtest
orspeedtest
, supplying additional command line arguments if needed. The main test filetest/test.ml
is also included into theruntest
alias, so it can be executed simply bydune test
.To install, run
dune install
.
Using the library
The package name is cryptokit
. With Dune, use (library cryptokit)
. With ocamlfind, do
ocamlfind ocamlopt -package cryptokit ... # for compilation
ocamlfind ocamlopt -package cryptokit -linkpkg ... # for linking
Documentation
See the extensive documentation comments in file src/cryptokit.mli
.
To build HTML documentation, run dune build @doc
. The resulting index file is located at _build/default/_doc/_html/cryptokit/Cryptokit/index.html
.
Warnings and disclaimers
Disclaimer 1: the author is not an expert in cryptography. While reasonable care has been taken to select good, widely-used implementations of the ciphers and hashes, and follow recommended practices found in reputable applied cryptography textbooks, you are advised to review thoroughly the implementation of this module before using it in a security-critical application.
Disclaimer 2: some knowledge of cryptography is needed to use effectively this library. A good introduction is the book Serious Cryptography by J.-P. Aumasson (2018). Building secure applications out of cryptographic primitives also requires a general background in computer security.
Disclaimer 3: in some countries, the use, distribution, import and/or export of cryptographic applications is restricted by law. The precise restrictions may depend on the strenght of the cryptography used (e.g. key size), but also on its purpose (e.g. confidentiality vs. authentication). It is up to the users of this library to comply with regulations applicable in their country.
Design notes and references
The library is organized around the concept of "transforms". A transform is an object that accepts strings, sub-strings, characters and bytes as input, transforms them, and buffers the output. While it is possible to enter all input, then fetch the output, lower memory requirements can be achieved by purging the output periodically during data input.
The AES implementation is the public-domain optimized reference implementation by Daemen, Rijmen and Barreto. On x86 processors that support the AES-NI extensions, hardware implementation is used instead.
The Chacha20 implementation is due to D.J.Bernstein, https://cr.yp.to/streamciphers/timings/estreambench/submissions/salsa20/chacha8/regs/chacha.c . It is in the public domain.
The DES implementation is based on Outerbridge's popular "d3des" implementation. This is not the fastest DES implementation available, but one of the cleanest. Outerbridge's code is marked as public domain.
The Blowfish implementation is that of Paul Kocher with some performance improvements. It is under the LGPL. It passes the test vectors listed at http://www.schneier.com/code/vectors.txt
ARCfour (``alleged RC4'') is implemented from scratch, based on the algorithm described in Schneier's Applied Cryptography
For AES-GCM, the GHASH implementation is that of Steven M. Gibson at https://github.com/mko-x/SharedAES-GCM/blob/master/Sources/gcm.c . On x86 processors that support the PCLMUL extension, hardware implementation is used instead. Test vectors are taken from "The Galois/Counter Mode of Operation (GCM)" by David A. McGrew and John Viega.
For Chacha20-Poly1305, Poly1305 is based on the "Donna" implementation by Andrew Moon, https://github.com/floodyberry/poly1305-donna . Test vectors are taken from RFC 7539 and from the BoringSSL project.
SHA-1 is also implemented from scratch, based on the algorithm described in the Handbook of Applied Cryptography. It passes the FIPS test vectors.
SHA-2 is implemented from scratch based on FIPS publication 180-2. It passes the FIPS test vectors.
SHA-3 is based on the "readable" implementation of Keccak written by Markku-Juhani O. Saarinen mjos@iki.fi.
BLAKE2b and BLAKE2s are implemented from scratch based on RFC 7693. The test vectors are taken from https://github.com/BLAKE2/BLAKE2/tree/master/testvectors; others were obtained with the b2sum program.
BLAKE3 uses the portable C implementation from https://github.com/BLAKE3-team/BLAKE3 . The authors released the code into the public domain with CC0 1.0. The test vectors come from the same source.
RIPEMD-160 is based on the reference implementation by A.Bosselaers. It passes the test vectors listed at http://www.esat.kuleuven.ac.be/~bosselae/ripemd160.html
MD5 uses the public-domain implementation by Colin Plumb that is also used in the OCaml runtime system for module Digest.
SipHash is based on the reference implementation by J.-P. Aumasson and D. J. Bernstein, https://github.com/veorq/SipHash . It passes their test vectors.
RSA encryption and decryption was implemented from scratch, using the Zarith OCaml library for arbitrary-precision arithmetic, which itself uses GMP. Modular exponentiation is the constant-time implementation provided by GMP. The Chinese remainder theorem is exploited when possible, though. Like all ciphers in this library, the RSA implementation is not protected against timing attacks.
RSA key generation uses GMP's nextprime
function for probabilistic primality testing.
The hardware RNG uses the RDRAND instruction of recent x86 processors, if supported. It is not available on other platforms. A check is included to reject the broken RDRAND on AMD Ryzen 3000 processors (https://arstechnica.com/gadgets/2019/10/how-a-months-old-amd-microcode-bug-destroyed-my-weekend/).
The system RNG uses the getentropy
function provided by Linux, macOS and the BSDs, or the CryptGenRandom
function from the Windows cryptographic API.
The seeded PRNG is just the Chacha20 stream cipher encrypting the all-zeroes message. The seed is used as the Chacha20 key. An alternate seeded PRNG is provided, based on AES encryption of a 128-bit counter. Both PRNGs pass the Dieharder statistical tests. Still, better use the system RNG or the hardware RNG if high-quality random numbers are needed.
Performance
If you run dune exec test/speedtest.exe
, a simple benchmark is performed and shows the speed of various operations from this library.
Dependencies (6)
- conf-gmp-powm-sec
- conf-zlib
-
zarith
>= "1.4"
- dune-configurator
-
dune
>= "2.5"
-
ocaml
>= "4.08.0"
Dev Dependencies
None
Used by (47)
- activitypub
- ahrocksdb
-
async_smtp
>= "113.24.00" & < "v0.16.0"
-
async_websocket
>= "v0.13.1" & < "v0.16.0"
-
aws
< "1.0.0"
-
aws-s3
< "3.0.0"
- awsm
- azblob
-
azure-cosmos-db
>= "0.1.5"
- bamboo
-
bitcoin
>= "2.0"
- bitcoinml
- bookaml
- bt
- caradoc
- cca
- cryptodbm
- cryptoverif
- daft
-
dht
< "0.2.0"
-
dns
< "0.7.0"
-
email_message
>= "112.17.00" & < "113.24.00" | >= "v0.9.0" & < "v0.16.0"
- erm_xmpp
- gapi-ocaml
-
git
< "1.2.0"
-
google-drive-ocamlfuse
>= "0.6.23"
-
imap
< "1.0"
-
jupyter
>= "1.0.0"
- jwt
-
jwto
< "0.4.0"
- kinetic-client
- libres3
-
memtrace_viewer
< "v0.15.0"
- mysql_protocol
- nanoid
- obigstore
- ocamltter
- ocsigenserver
-
pardi
>= "2.0.2" & < "3.2.2"
- plasma
-
rdf
>= "0.6.0" & < "1.0.0"
- rdf_impls
- sociaml-oauth-client
- solid_server
- stog_server
-
websocket
< "0.9.1"
-
yocaml_unix
< "2.0.0"
Conflicts
None