#opaque #authentication #cryptography #passwords #client-server

no-std opaque-ke

An implementation of the OPAQUE password-authenticated key exchange protocol

23 releases (6 stable)

3.0.0 Oct 10, 2024
3.0.0-pre.4 Jul 25, 2023
3.0.0-pre.2 Mar 15, 2023
2.1.0-pre.1 Oct 10, 2024
0.1.0 Jun 5, 2020

#8 in No standard library

Download history 2306/week @ 2024-07-18 2085/week @ 2024-07-25 1853/week @ 2024-08-01 1402/week @ 2024-08-08 1434/week @ 2024-08-15 1709/week @ 2024-08-22 1006/week @ 2024-08-29 1593/week @ 2024-09-05 1993/week @ 2024-09-12 1944/week @ 2024-09-19 2208/week @ 2024-09-26 1511/week @ 2024-10-03 1901/week @ 2024-10-10 1070/week @ 2024-10-17 1360/week @ 2024-10-24 1128/week @ 2024-10-31

5,845 downloads per month
Used in 7 crates (6 directly)

Apache-2.0 OR MIT

510KB
8K SLoC

The OPAQUE key exchange protocol Build Status

OPAQUE is an augmented password-authenticated key exchange protocol. It allows a client to authenticate to a server using a password, without ever having to expose the plaintext password to the server.

This implementation is based on the Internet Draft for OPAQUE.

Background

Augmented Password Authenticated Key Exchange (aPAKE) protocols are designed to provide password authentication and mutually authenticated key exchange without relying on PKI (except during user/password registration) and without disclosing passwords to servers or other entities other than the client machine.

OPAQUE is a PKI-free aPAKE that is secure against pre-computation attacks and capable of using a secret salt.

Documentation

The API can be found here along with an example for usage. More examples can be found in the examples directory.

Installation

Add the following line to the dependencies of your Cargo.toml:

opaque-ke = "3"

Minimum Supported Rust Version

Rust 1.74 or higher.

Audit

This library was audited by NCC Group in June of 2021. The audit was sponsored by WhatsApp for its use in enabling end-to-end encrypted backups.

The audit found issues in release v0.5.0, and the fixes were subsequently incorporated into release v1.2.0. See the full audit report here.

Resources

Contributors

The authors of this code are Kevin Lewi (@kevinlewi) and François Garillot (@huitseeker). To learn more about contributing to this project, see this document.

Acknowledgments

Special thanks go to Hugo Krawczyk and Chris Wood for helping to clarify discrepancies and making suggestions for improving this implementation. Additional credit goes to @daxpedda for adding no_std support, p256 support, and making other general improvements to the library.

License

This project is dual-licensed under either the MIT license or the Apache License, Version 2.0. You may select, at your option, one of the above-listed licenses.

Dependencies

~3–5MB
~100K SLoC