13 releases
Uses new Rust 2024
new 0.5.1 | Apr 21, 2025 |
---|---|
0.4.4 | Apr 17, 2025 |
0.4.3 | Mar 3, 2025 |
0.4.2 | Mar 21, 2023 |
0.1.0 | Apr 28, 2021 |
#2741 in Cryptography
1,128 downloads per month
Used in 9 crates
(5 directly)
62KB
605 lines
Ascon AEAD
Pure Rust implementation of the lightweight Authenticated Encryption with Associated Data (AEAD) algorithm Ascon-AEAD128.
Security Notes
No security audits of this crate have ever been performed.
USE AT YOUR OWN RISK!
Minimum Supported Rust Version
This crate requires Rust 1.85 at a minimum.
License
Licensed under either of:
at your option.
Contribution
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.
lib.rs
:
Usage
Simple usage (allocating, no associated data):
use ascon_aead::{AsconAead128, AsconAead128Key, AsconAead128Nonce, Key, Nonce};
use ascon_aead::aead::{Aead, KeyInit};
let key = AsconAead128Key::from_slice(b"very secret key.");
let cipher = AsconAead128::new(key);
// 128-bits; unique per message
let nonce = AsconAead128Nonce::from_slice(b"unique nonce 012");
let ciphertext = cipher.encrypt(nonce, b"plaintext message".as_ref())
.expect("encryption failure!"); // NOTE: handle this error to avoid panics!
let plaintext = cipher.decrypt(nonce, ciphertext.as_ref())
.expect("decryption failure!"); // NOTE: handle this error to avoid panics!
assert_eq!(&plaintext, b"plaintext message");
With randomly sampled keys and nonces (requires getrandom
feature):
use ascon_aead::AsconAead128;
use ascon_aead::aead::{Aead, AeadCore, KeyInit, OsRng};
let key = AsconAead128::generate_key(&mut OsRng);
let cipher = AsconAead128::new(&key);
// 128 bits; unique per message
let nonce = AsconAead128::generate_nonce(&mut OsRng);
let ciphertext = cipher.encrypt(&nonce, b"plaintext message".as_ref())
.expect("encryption failure!"); // NOTE: handle this error to avoid panics!
let plaintext = cipher.decrypt(&nonce, ciphertext.as_ref())
.expect("decryption failure!"); // NOTE: handle this error to avoid panics!
assert_eq!(&plaintext, b"plaintext message");
In-place Usage (eliminates alloc
requirement)
This crate has an optional alloc
feature which can be disabled in e.g.
microcontroller environments that don't have a heap.
The AeadInPlace::encrypt_in_place
and AeadInPlace::decrypt_in_place
methods accept any type that impls the aead::Buffer
trait which
contains the plaintext for encryption or ciphertext for decryption.
Note that if you enable the heapless
feature of this crate,
you will receive an impl of aead::Buffer
for heapless::Vec
(re-exported from the aead
crate as aead::heapless::Vec
),
which can then be passed as the buffer
parameter to the in-place encrypt
and decrypt methods:
use ascon_aead::{AsconAead128, AsconAead128Key, AsconAead128Nonce, Key, Nonce};
use ascon_aead::aead::{AeadInPlace, KeyInit};
use ascon_aead::aead::heapless::Vec;
let key = AsconAead128Key::from_slice(b"very secret key.");
let cipher = AsconAead128::new(key);
// 128-bits; unique per message
let nonce = AsconAead128Nonce::from_slice(b"unique nonce 012");
// Buffer needs 16-bytes overhead for authentication tag
let mut buffer: Vec<u8, 128> = Vec::new();
buffer.extend_from_slice(b"plaintext message");
// Encrypt `buffer` in-place, replacing the plaintext contents with ciphertext
cipher.encrypt_in_place(nonce, b"", &mut buffer).expect("encryption failure!");
// `buffer` now contains the message ciphertext
assert_ne!(&buffer, b"plaintext message");
// Decrypt `buffer` in-place, replacing its ciphertext context with the original plaintext
cipher.decrypt_in_place(nonce, b"", &mut buffer).expect("decryption failure!");
assert_eq!(&buffer, b"plaintext message");
Similarly, enabling the arrayvec
feature of this crate will provide an impl of
aead::Buffer
for arrayvec::ArrayVec
(re-exported from the aead
crate as
aead::arrayvec::ArrayVec
), and enabling the bytes
feature of this crate will
provide an impl of aead::Buffer
for bytes::BytesMut
(re-exported from the
aead
crate as aead::bytes::BytesMut
).
Dependencies
~0.7–1.6MB
~35K SLoC