Crate chacha12_blake3

Crate chacha12_blake3 

Source
Expand description

§ChaCha12-BLAKE3

Simple, Secure and Fast encryption for any CPU.

ChaCha12-BLAKE3 is a secure Authenticated Encryption with Associated Data (AEAD) algorithm that is:

  • more secure than classic AEADs by providing message commitment
  • uses long nonces that can safely generated randomly
  • doesn’t require any specific harware instruction but instead scales with the width of the SIMD instructions of your CPU (AVX2 / AVX-512 on amd64 and NEON / SVE on amr64)

Making it a great fit for everything from microcontrollers to huge servers.

It was designed to be the only encryption algorithm you will ever need.

§Specification

https://kerkour.com/chacha12-blake3

§Usage

Warning ⚠️: A (key, nonce) pair SHOULD NEVER be used to encrypt two messages. You can use either an unique key for every message, the same key with unique random nonces, or the same key with a NON-REPEATING counter in the first X bytes of the nonce.

Cargo.toml

[dependencies]
chacha12-blake3 = "0.9"
use chacha12_blake3::ChaCha12Blake3;

fn main() {
    let key: [u8; 32] = rand::random();
    let nonce: [u8; 32] = rand::random();
    // or with an u64 counter to encrypt up to 2^64 messages:
    // let mut nonce = [0u8; 32];
    // nonce[..8].copy_from_slice(&counter.to_le_bytes());

    let message = b"Hello World!";

    let cipher = ChaCha12Blake3::new(key);

    let ciphertext: Vec<u8> = cipher.encrypt(&nonce, message, &[]);

    let plaintext: Vec<u8> = cipher.decrypt(&nonce, &ciphertext, &[]).unwrap();

    assert_eq!(plaintext, message);
}

§Features

FeatureDefault?Description
allocEnables encrypt / decrypt APIs that allocate memory
zeroizeEnables zeroize to erase sensitive secrets from memory

§License

MIT. See LICENSE.txt

Structs§

ChaCha12Blake3
Error

Constants§

KEY_SIZE
NONCE_SIZE
TAG_SIZE