wan24-Crypto
2.18.0
See the version list below for details.
dotnet add package wan24-Crypto --version 2.18.0
NuGet\Install-Package wan24-Crypto -Version 2.18.0
<PackageReference Include="wan24-Crypto" Version="2.18.0" />
paket add wan24-Crypto --version 2.18.0
#r "nuget: wan24-Crypto, 2.18.0"
// Install wan24-Crypto as a Cake Addin #addin nuget:?package=wan24-Crypto&version=2.18.0 // Install wan24-Crypto as a Cake Tool #tool nuget:?package=wan24-Crypto&version=2.18.0
wan24-Crypto
This library exports a generic high level crypto API, which allows to use an implemented cryptographic algorithm to be applied using a simple interface. It also implements abstract and configurable RNG handling, which uses a local (CS)RNG entropy source, if not overridden and extended with a customized RNG algorithm, which may use a physical entropy source, too.
Per default these cryptographic algorithms are implemented:
Usage | Algorithm |
---|---|
Hashing | MD5 |
SHA-1 | |
SHA-256 | |
SHA-384 | |
SHA-512 | |
SHA3-256 | |
SHA3-384 | |
SHA3-512 | |
Shake128 | |
Shake256 | |
MAC | HMAC-SHA-1 |
HMAC-SHA-256 | |
HMAC-SHA-384 | |
HMAC-SHA-512 | |
HMAC-SHA3-256 | |
HMAC-SHA3-384 | |
HMAC-SHA3-512 | |
Symmetric encryption | AES-256-CBC (ISO10126 padding) |
Asymmetric keys | Elliptic Curve Diffie Hellman |
Elliptic Curve DSA (RFC 3279 signatures) | |
KDF key stretching | PBKDF#2 (250,000 iterations per default) |
SP 800-108 HMAC CTR KBKDF |
These elliptic curves are supported at present:
- secp256r1
- secp384r1
- secp521r1
The number of algorithms can be extended easy, a bunch of additional libraries implementing more algorithms (and probably more elliptic curves) will follow soon.
The goals of this library are:
- Make a choice being a less torture
- Make a complex thing as easy as possible
Implementing (new) cryptographic algorithms into (existing) code can be
challenging. wan24-Crypto
tries to make it as easy as possible, while the
API is still complex due to the huge number of options it offers. Please see
the Wiki for examples of the
most common use cases, which cover:
- Simple encryption using a password
- Advanced encryption using a private PFS key
- Advanced encryption using a private PFS key and hybrid key exchange
- Advanced encryption using a peers public key
- Advanced encryption using a peers public key and hybrid key exchange
For more examples please open an issue - I'd be glad to help! If you've found a security issue, please report it private.
NOTE: The cipher output of this library may include a header, which can't (yet) be interpreted by any third party vendor code (which is true especially if the raw data was compressed before encryption, which is the default). That means, a cipher output of this library can't be decrypted with a third party crypto library, even this library implements standard cryptographic algorithms.
Using this library for a cipher which has to be exchanged with a third party application, which relies on working with standard crypto algorithm output, is not recommended - it may not work!
Anyway, this library should be a good choice for isolated use within your application(s), if want to avoid a hussle with implementing newer crypto algorithms.
How to get it
This library is available as NuGet package.
These extension NuGet packages are available:
- wan24-Crypto-BC (adopts some algorithms from Bouncy Castle)
- wan24-Crypto-NaCl (adopts the Argon2id KDF algorithm from NSec)
- wan24-Crypto-TPM (simplifies including TPM into your apps security)
Usage
In case you don't use the wan24-Core
bootstrapper logic, you need to
initialize the library first:
wan24.Crypto.Bootstrap.Boot();
In case you work with dependency injection (DI), you may want to add some services:
builder.Services.AddWan24Crypto();
WARNING: The factory default algorithms may not be available on every
platform! The wan24-Crypto-BC
extension library contains pure .NET
implementations of most algorithms from wan24-Crypto
, which can be used
instead.
Hashing
byte[] hash = rawData.Hash();
The default hash algorithm ist SHA3-512.
Shake128/256 hash algorithms
The Shake128 and Shake256 hash algorithms support a variable output (hash)
length. The default output length of the hash implementations of
wan24-Crypto
is
- 32 bytes for Shake128
- 64 bytes for Shake256
when using the HashHelper
, the extension methods, or the
HashShake128/256Algorithm
instances directly.
Anyway, if you need other output lengths, you may use the
NetShake128/256HashAlgorithmAdapter
classes, which allow to give the desired
output length in bytes (a multiple of 8) to the constructor, and can be used
as every other .NET HashAlgorithm
implementation (also in a crypto
stream/transform, for example).
MAC
byte[] mac = rawData.Mac(password);
The default MAC algorithm is HMAC-SHA3-512.
NOTE: The CryptoOptions.MacPassword
won't be used here, since you have
to specify the MAC password in the method call already. The MacPassword
is
only used during encryption, if it is different from the encryption key.
KDF (key stretching)
(byte[] stretchedPassword, byte[] salt) = password.Stretch(len: 64);
The default KDF algorithm is PBKDF#2, using 250,000 iterations, with a salt length of 16 byte and SHA3-384 for hashing.
TIP: You may override the default hash algorithm which is being used in a
new options instance in the static KdfPbKdf2Options.DefaultHashAlgorithm
property.
Example options usage:
(byte[] stretchedPassword, byte[] salt) = password.Stretch(len: 64, options: new KdfPbKdf2Options()
{
HashAlgorithm = HashSha3_512Algorithm.ALGORITHM_NAME
});// KdfPbKdf2Options cast implicit to CryptoOptions
NOTE: The SP 800-108 HMAC CTR KBKDF algorithm isn't available in a WASM
app, and there's currently no pure .NET replacement included in the
wan24-Crypto-BC
library. It doesn't support iterations and salt (but a label
and context value instead). Not all hash algorithms may be supported (you'll
need to register custom hash algorithms to the .NET CryptoConfig
).
Encryption
byte[] cipher = raw.Encrypt(password);
byte[] decrypted = cipher.Decrypt(password);
There are extension methods for memory and streams.
The default algorithms used:
Usage | Algorithm |
---|---|
Symmetric encryption | AES-256-CBC |
MAC | HMAC-SHA3-512 |
KDF | PBKDF#2 |
Asymmetric key exchange | EC Diffie Hellman |
Asymmetric digital signature | EC DSA |
NOTE: The CryptoOptions.MacPassword
will optionally be used, if an
additional MAC is being computed, but it doesn't affect the AEAD included MAC,
which is going to be calculated separately. If no MacPassword
was set, the
final encryption password is going to be used instead.
Using asymmetric keys for encryption
This way you encrypt using a stored private key (which will be required for decryption later):
using IAsymmetricPrivateKey privateKey = AsymmetricHelper.CreateKeyExchangeKeyPair();
byte[] cipher = raw.Encrypt(privateKey);
byte[] decrypted = cipher.Decrypt(privateKey);
In case you want to encrypt for a peer using the peers asymmetric public key for performing a PFS key exchange:
// Peer creates a key pair (PFS or stored) and sends peerPublicKeyData to the provider
using IAsymmetricPrivateKey peerPrivateKey = AsymmetricHelper.CreateKeyExchangeKeyPair();
byte[] peerPublicKeyData = (byte[])peerPrivateKey.PublicKey;// Needs to be available at the provider
// Encryption at the provider (pfsKey shouldn't be stored and can be a new key for every cipher message)
using IAsymmetricPublicKey peerPublicKey = AsymmetricKeyBase.Import<IAsymmetricPublicKey>(peerPublicKeyData);// Deserialize the peers public key of any format
CryptoOptions options = EncryptionHelper.GetDefaultOptions();// Add the asymmetric key information for key pair creation
options.AsymmetricAlgorithm = peerPublicKey.Algorithm.Name;
options.AsymmetricKeyBits = peerPublicKey.Bits;
options.PublicKey = peerPublicKey;// Required for encrypting especially for the one specific peer
byte[] cipher;
using(IKeyExchangePrivateKey pfsKey = AsymmetricHelper.CreateKeyExchangeKeyPair(options))
cipher = raw.Encrypt(pfsKey, options);// Only the peer can decrypt the cipher after pfsKey was disposed
// Decryption at the peer
byte[] decrypted = cipher.Decrypt(peerPrivateKey, options);
Time critical decryption
It's possible to define a maximum age for cipher data, which can't be decrypted after expired:
// Encryption
CryptoOptions options = new()
{
TimeIncluded = true
};
byte[] cipher = raw.Encrypt(password, options);
// Decryption (required to be decrypted within 10 seconds, or the decryption will fail)
options = new()
{
RequireTime = true,
MaximumAge = TimeSpan.FromSeconds(10)
}
byte[] decrypted = cipher.Decrypt(password, options);
By defining CryptoOptions.MaximumTimeOffset
you may define a time tolerance
which is being used to be tolerant with peers having a slightly different
system time.
Password pre-processing
The CryptoOptions.EncryptionPassword(Async)PreProcessor
delegates may pre-
process an encryption password from CryptoOptions.Password
before the key
bytes are being finalized for use with the desired crypto engine. Key
derivation from asymmetric keys and KDF are being applied before.
The asynchronous delegate will only be used during asynchronous operations, while the synchronous delegate is a fallback during asynchronous operations, if no asynchronous delegate was set.
The delegate itself need to set the final key to use to
CryptoOptions.Password
and should clear the current value.
TIP: For setting a new password to CryptoOptions.Password
use the
CryptoOptions.SetNewPassword
method. This method will clear the previous
value, if any.
Asymmetric keys
Key exchange
PFS example:
// A: Create a key pair
using IKeyExchangePrivateKey privateKeyA = AsymmetricHelper.CreateKeyExchangeKeyPair();
byte[] publicKeyData = (byte[])privateKeyA.PublicKey.Export();// publicKeyData needs to be available at B
// B: Create a key pair, key exchange data and derive the shared key
using IAsymmetricPublicKey publicKeyA = AsymmetricKeyBase.Import<IAsymmetricPublicKey>(publicKeyData);// Deserialize the peers public key of any format
using IKeyExchangePrivateKey privateKeyB = AsymmetricHelper.CreateKeyExchangeKeyPair(new()
{
AsymmetricAlgorithm = publicKeyA.Algorithm.Name,
AsymmetricKeyBits = publicKeyA.Bits
});
(byte[] keyB, byte[] keyExchangeData) = privateKeyB.GetKeyExchangeData(publicKeyA);// keyExchangeData needs to be available at A
// A: Derive the exchanged key
byte[] keyA = privateKeyA.DeriveKey(keyExchangeData);
Assert.IsTrue(keyA.SequenceEquals(keyB));
The default key exchange algorithm is ECDH from a secp521r1 elliptic curve.
IKeyExchange
interface
All asymmetric private keys which can be used for a key exchange implement the
IKeyExchange
interface. This interface is also used for PAKE, for example.
By working with this interface, it's possible to implement more abstract key
exchange routines:
// Initiator side
(byte[] keyA, byte[] keyExchangeData) = initiatorKeyExchangeProcessor.GetKeyExchangeData();
// Transfer keyExchangeData to the peer using a secure communication channel
// Peer side
byte[] keyB = peerKeyExchangeProcessor.DeriveKey(keyExchangeData);
Assert.IsTrue(keyA.SequenceEquals(keyB));
initiatorKeyExchangeProcessor
and peerKeyExchangeProcessor
are
IKeyExchange
instances and may be an asymmetric private key, or a PAKE
instance, for example.
Both peers need to agree to the same key exchange method, first. And both peers need to use a key exchange processor which can produce/take the key exchange data of the initiator.
NOTE: The PrivateKeySuite
implements IKeyExchange
using the managed
KeyExchangeKey
, if any.
Digital signature
// Create a key pair for signature
using ISignaturePrivateKey privateKey = AsymmetricHelper.CreateSignatureKeyPair();
// Sign data
SignatureContainer signature = privateKey.SignData(anyData);
// Validate a signature
privateKey.PublicKey.ValidateSignature(signature, anyData);
The default signature algorithm is ECDSA from a secp521r1 elliptic curve.
Value protection
The ValueProtection
contains some static methods for protecting a value in a
specified scope:
value = ValueProtection.Protect(value);
value = ValueProtection.Unprotect(value);
There are 3 scopes, which may be given as parameter:
System
: System (permanent system bound protection)User
: Current user (permanent user bound protection)Process
: Current process (default; for non-permanent protection only!)
The scope keys will be set automatic, but may be replaced with your own logic. Per default the keys are generated like this:
System
: Hash of application location and machine nameUser
: Hash of user domain and name, application location and machine nameProcess
: Random data
WARNING: Setting new keys isn't thread-safe!
The Protect
and Unprotect
methods are delegate properties which can be
exchanged. For example for Windows and Linux OS you may want to use different
approaches.
For protecting a value it'll be encrypted using the current default encryption options.
Using the ValueProtectionLevels
you can manage keys for a specific security
requirement by defining keys using the ValueProtectionKeys.Set
method, and
getting them later using the ValueProtectionKeys.Get
method. The protection
levels include variations for the system (mashine) and user level, with or
without TPM (for TPM usage the wan24-Crypto-TPM
module is required) and
optional with an online key storage and/or a manual entered user password
(the online key storage and user password input needs to be implemented by
yourself):
// userPassword should be entered manually whenever it's required to (un)protect a value
byte[] protectedValue = ValueProtectionLevels.UserTpmPassword.Protect(value, userPassword);
// protectedValue is ready to be stored for the current user scope
byte[] unprotectedValue = ValueProtectionLevels.UserTpmPassword.Unprotect(protectedValue, userPassword);
The ValueProtectionKeys
is used to (re)store a protection key for each level
using the Set(2)
and (Try)Get
methods. It uses a ISecureValue
for
serious key protection:
ValueProtectionKeys.Set(ValueProtectionLevels.UserTpmPassword, protectionKey, userPassword);
NOTE: While the Set
method requires a ISecureValue
, the Set2
method
creates a SecureValue
from the protectionKey
byte array parameter. The
(Try)Get
methods will return the final key to use (after MAC, if
applicable). Stored keys will be protected for the according scope using
ValueProtection
.
You may use the extension method ValueProtectionLevels.*.Protect/Unprotect
for protecting/unprotecting a value, or the raw protection key which is being
returned from the ValueProtectionKeys.(Try)Get
methods for applying
en-/decryption of values by yourself.
To determine the capabilities of a protection level, you can use these
ValueProtectionLevels
extension methods:
RequiresPasswordInput
: If a manual entered user password is requiredRequiresTpm
: If a TPM is requiredRequiresNetwork
: If an online key storage is requiredGetScope
: Determines the accordingValueProtection.Scope
enumeration value
NOTE: In order to be able to use the TPM protection levels,
wan24-Crypto-TPM
and a TPM must be available. The protection levels
including online communication require implementing an online key storage
service. ValueProtectionKeys
does support a single user context only (it's
designed for an app which runs in a specific user context).
WARNING: For each value protection level that you want to use you'll need
to set a key using ValueProtectionKeys.Set(2)
, which is not thread-safe.
Too many options?
The CryptoOptions
contains a huge collection of properties, which follow a
simple pattern in case of en-/decryption: Which information should be included
in the cipher header, and is an information in the header required? Because
the options include information for all sections, there are single values
which belongs to the specific section only. If you separate the options into
sections, it's easy to overview:
Section | Property | Description | Default value |
---|---|---|---|
Encryption | Algorithm |
Encryption algorithm name | null (AES256CBC ) |
EncryptionOptions |
String serialized encryption options | null |
|
EncryptionPasswordPreProcessor |
Delegate for pre-processing an encryption password (the default can be set to DefaultEncryptionPasswordPreProcessor ) |
null |
|
EncryptionPasswordAsyncPreProcessor |
Delegate for pre-processing an encryption password (only applied during asynchronous operation; the default can be set to DefaultEncryptionPasswordAsyncPreProcessor ) |
null |
|
FlagsIncluded |
Are the flags included in the header? | true |
|
RequireFlags |
Are the flags required to be included in the header? | true |
|
PrivateKeysStore |
Private keys store to use for decryption, using automatic key suite revision selection (the default can be set to DefaultPrivateKeysStore ) |
null |
|
PrivateKeyRevision |
Revision of the used private key suite (may be set automatic) | 0 |
|
PrivateKeyRevisionIncluded |
Is the private key suite revision included in the header? | true , if a DefaultPrivateKeysStore was set |
|
RequirePrivateKeyRevision |
Is the private key suite revision required to be included in the header? | true , if a DefaultPrivateKeysStore was set |
|
RngSeeding |
RNG seeding options (overrides RND.AutoRngSeeding ) |
null |
|
MAC | MacAlgorithm |
MAC algorithm name | null (HMAC-SHA3-512 ) |
MacIncluded |
Include a MAC in the header | true |
|
RequireMac |
Is the MAC required in the header? | true |
|
CounterMacAlgorithm |
Counter MAC algorithm name | null |
|
CounterMacIncluded |
Include a counter MAC in the header | false |
|
RequireCounterMac |
Is the counter MAC required in the header? | false |
|
ForceMacCoverWhole |
Force the MAC to cover all data | false |
|
RequireMacCoverWhole |
Is the MAC required to cover all data? | false |
|
MacPassword |
Password to use for a MAC | null |
|
Encryption / Key creation / Signature | AsymmetricAlgorithm |
Asymmetric algorithm name | null (ECDH for encryption, ECDSA for signature) |
AsymmetricAlgorithmOptions |
String serialized algorithm options | null |
|
AsymmetricCounterAlgorithm |
Asymmetric counter algorithm name | null |
|
KeyExchangeData |
Key exchange data (includes counter key exchange data; generated automatic) | null |
|
RequireKeyExchangeData |
Is the key exchange data required in the header? | false |
|
PrivateKey |
Private key for key exchange | null |
|
CounterPrivateKey |
Private key for counter key exchange (required when using a counter asymmetric algorithm) | null |
|
PublicKey |
Public key for key exchange (if not using a PFS key) | null |
|
CounterPublicKey |
Public key for counter key exchange (required when using a counter asymmetric algorithm and not using a PFS key) | null |
|
KDF | KdfAlgorithm |
KDF algorithm name | null (PBKDF2 ) |
KdfIterations |
KDF iteration count | 1 |
|
KdfOptions |
String serialized KDF algorithm options | null |
|
KdfSalt |
KDF salt (generated automatic) | null |
|
KdfAlgorithmIncluded |
Include the KDF information in the header | true |
|
RequireKdfAlgorithm |
Is the KDF information required in the header? | true |
|
CounterKdfAlgorithm |
Counter KDF algorithm name | null |
|
CounterKdfIterations |
Counter KDF iteration count | 1 |
|
CounterKdfOptions |
String serialized KDF algorithm options | null |
|
CounterKdfSalt |
Counter KDF salt (generated automatic) | null |
|
CounterKdfAlgorithmIncluded |
Include the counter KDF information in the header | false |
|
RequireCounterKdfAlgorithm |
Is the counter KDF information required in the header? | false |
|
Payload | PayloadData |
Plain payload | null |
PayloadIncluded |
Is the payload object data included in the header? | false |
|
RequirePayload |
Is payload object data required in the header? | false |
|
Serializer version | CustomSerializerVersion |
Serializer version number (set automatic) | null |
SerializerVersionIncluded |
Include the serializer version number in the header | true |
|
RequireSerializerVersion |
Is the serializer version number required in the header? | true |
|
Header version | HeaderVersion |
Header version number (set automatic) | 1 |
HeaderVersionIncluded |
Is the header version included in the header? | true |
|
RequireHeaderVersion |
Is the header version required in the header? | true |
|
Encryption time | Time |
Encryption timestamp (UTC) | null |
TimeIncluded |
Is the encryption time included in the header? | false |
|
RequireTime |
Is the encryption time required to be included in the header? | false |
|
MaximumAge |
Maximum age of cipher data (the default can be set to DefaultMaximumAge ) |
null |
|
MaximumTimeOffset |
Maximum time offset for a peer with a different system time (the default can be set to DefaultMaximumTimeOffset ) |
null |
|
Compression | Compressed |
Should the raw data be compressed before encryption? | true |
Compression |
The CompressionOptions instance to use (will be set automatic, if not given) |
null |
|
MaxUncompressedDataLength |
Maximum uncompressed data length in bytes (when decrypting) | -1 |
|
Hashing / Signature | HashAlgorithm |
The name of the hash algorithm to use | null (SHA3-512 ) |
Key creation | AsymmetricKeyBits |
Key size in bits to use for creating a new asymmetric key pair | 1 |
Stream options | LeaveOpen |
Leave the processing stream open after operation? | false |
Debug options | Tracer |
Collects tracing information during en-/decryption | null |
Tag | Tag |
Can store any tagged object which will be cloned on GetCopy , if IClonable is implemented |
null |
Other options, which are not listed here, are used internal only.
If you use a new instance of CryptoOptions
, all defaults will be applied.
You can override these defaults in the static *Helper.Default*
properties,
or by setting other values in the CryptoOptions
instance, which you use when
calling any method.
For encryption these sections matter:
- Encryption
- MAC
- PFS
- KDF
- Payload
- Serializer version
- Header version
- Encryption time
- Compression
- Stream options
In case you want to use the *Counter*
options, you'll need to set the
CounterPrivateKey
value.
For MAC these sections matter:
- MAC
- Stream options
For hashing these sections matter:
- Hashing
- Stream options
For asymmetric key creation the "Key creation" section matters.
For signature these sections matter:
- Signature
- Hashing
- Stream options
The CryptoEnvironment
helps configuring the whole wan24-Crypto
environment
at once by providing an options class which contains all the options that one
might miss, when not knowing where to look at:
CryptoEnvironment.Configure(new()
{
...
});
NOTE: See the developer reference for details of the
CryptoEnvironment.Options
class. Options will only be applied, if they have
a non-null value.
The CryptoEnvironment
has also some static properties for storing some
singleton instances (which are used as default for the configurable options).
You could implement a JSON configuration file using the AppConfig
logic from
wan24-Core
, and the CryptoAppConfig
. In this configuration it's possible
to define many options from the CryptoEnvironment.Options
, which can be
written as a JSON value. There it's also possible to define disabled
algorithms, which makes it possible to react to a broken algorithm very fast
and without having to update your app, for example.
If you use an AppConfig
, it could look like this:
public class YourAppConfig : AppConfig
{
public YourAppConfig() : base() { }
[AppConfig(AfterBootstrap = true)]
public CryptoAppConfig? Crypto { get; set; }
}
await AppConfig.LoadAsync<YourAppConfig>();
NOTE: If you use the CompressionAppConfig
also, it should be applied
before the CryptoAppConfig
by defining a Priority
in the
AppConfigAttribute
.
In the config.json
in your app root folder:
{
"Crypto":{
...
}
}
Anyway, you could also place and load a CryptoAppConfig
in any configuration
which supports using that custom type.
Crypto suite
You can use a CryptoOptions
instance as crypto suite. The type can be binary
serialized (using the Stream-Serializer-Extensions
) for storing/restoring
to/from anywhere.
NOTE: Only crypto suite relevant information will be serialized! This excludes:
SerializerVersion
HeaderVersion
PrivateKeystore
(needs to be stored in another place; a default can be set inDefaultPrivateKeysStore
)PrivateKeyRevision
(will be managed automatic)PrivateKey
(needs to be stored in another place)CounterPrivateKey
(needs to be stored in another place)PublicKey
CounterPublicKey
KeyExchangeData
PayloadData
Time
LeaveOpen
MacPosition
Mac
HeaderProcessed
Password
MacPassword
Tracer
Tag
Also delegates won't be serialized.
PKI
Using the AsymmetricSignedPublicKey
type, you can implement a simple PKI,
which allows to
- define trusted root keys
- define a key revocation list
- sign public keys
- validate signed public keys until the root signer key
// Create the root key pair
using ISignaturePrivateKey privateRootKey = AsymmetricHelper.CreateSignatureKeyPair();
// Self-sign the public root key
using AsymmetricSignedPublicKey signedPublicRootKey = new(privateRootKey.PublicKey);
signedPublicRootKey.Sign(privateRootKey);
// Create a key pair, which will be signed, and a signing request
using ISignaturePrivateKey privateKey = AsymmetricHelper.CreateSignatureKeyPair();
using AsymmetricPublicKeySigningRequest signingRequest = new(privateKey.PublicKey);
// Sign the public key
using AsymmetricSignedPublicKey signedPublicKey = signingRequest.GetAsUnsignedKey();
signedPublicKey.Sign(privateRootKey);
// Setup the PKI (minimal setup for signed public key validation)
AsymmetricSignedPublicKey.RootTrust =
// Normally you would have a DBMS which stores the trusted public key IDs
(id) => id.SequenceEqual(privateRootKey.ID);
AsymmetricSignedPublicKey.SignedPublicKeyStore = (id) =>
{
// Normally you would have a DBMS which stores the known keys
if(id.SequenceEqual(privateRootKey.ID)) return signedPublicRootKey;
if(id.SequenceEqual(privateKey.ID)) return signedPublicKey;
return null;
};
// Normally you would have a DBMS which stores a revocation list for AsymmetricSignedPublicKey.SignedPublicKeyRevocation
// Validate the signed public key
signedPublicKey.Validate();
As you can see, it's a really simple PKI implementation. It's good for
internal use, and if there won't be too many keys to manage. For managing a
larger amount of keys, you can use the SignedPkiStore
:
using SignedPkiStore pki = new();
pki.AddTrustedRoot(signedPublicRootKey);
pki.AddGrantedKey(signedPublicKey);
pki.EnableLocalPki();
By calling EnableLocalPki
all PKI callbacks in AsymmetricSignedPublicKey
will be set with methods from the SignedPkiStore
instance. This allows
signed key and signature validations using your PKI.
The GetKey
methods will find the hosted key with the given ID of the public
key. The PKI may also host revoked keys. By revoking a key, it'll be removed
from the trusted root/granted key tables, and GetKey
will throw on key
request.
Signed attributes and other PKI extensions
The signed attributes are fully customizable and not pre-defined at all,
you're the designer of your own PKI implementation. In order you want some
inspiration and ideas, you may have a look at the SignedAttributes
class,
wich contains some examples/suggestions for signed attributes and their names.
Name | Usage |
---|---|
Domain | PKI domain name to identify/validate the keys PKI |
OwnerId | Foreign owner ID for loading meta data from a store (should be encrypted by the PKI host) |
KeyValidationUri | URI that should point to a RESTful API for online key revokation validation |
GrantedKeyUsages | Allowed usages for the signed key |
PkiSig | Permitted to sign sub-keys |
KePublicKey | Identifier of the public key for the key exchange with the owner |
KePublicCounterKey | Identifier of the public counter key for the key exchange with the owner |
SigPublicKey | Identifier of the public signature key of the owner |
SigPublicCounterKey | Identifier of the public signature counter key of the owner |
CipherSuite | Serialized CryptoOptions to use with the signed key owner |
Serial | Serial number (the key revision of the owner context) |
Some key meta data like the creation and expiration time, or a nonce, is
included in a lower level in the AsymmetricSignedPublicKey
already, and
don't need to appear in the signed attribute list again.
A key signing request may also contain more attributes than the final signed key, if you want to give signing instructions to the PKI. The PKI may remove/replace/extend those instructions for signing.
As said before, the list above doesn't need to be implemented fully, and it
may be extended with any attribute that your PKI requires in addition. There
are only suggestions for value formats - but how you implement it finally, is
your business only. If you implement the suggested attributes and value
formats, you'll have a fully usable PKI. In addition a key revokation list
would be a nice feature (as a part of a RESTful PKI API). For a trusted root
key list you could use the PublicKeySuiteStore
, for example. A key
revokation list may only contain the IDs of revoked keys, which are not yet
expired.
You can use the AsymmetricKeySigner
as template for a key signing request
handler, which supports the attributes from above. You should implement
algorithm validation etc. for a key signing request by yourself, since such
requirements are not really good to match with a basic API.
For validating the signed attributes of a signing request or a signed key, you
can use the SignedAttributes.Validate(Async)
methods. Using the
SignedAttributes.ValidationOptions
you can specify common restrictions for
the above listed default attributes. The validation will be executed also, if
AsymmetricSignedPublicKey.Validate(Async)
was called. For additional
attribute validations you can set
SignedAttributes.AdditionalValidation(Async)
handlers. If no public key
suite store was given, key exchange/signature keys will be looked up in the
PKI, which was given in the options (CryptoEnvironment.PKI
is being used per
default).
Key ring
The KeyRing
type can store these key types:
- Symmetric key (a byte sequence)
- Asymmetric key
- Key suite
- Key suite store
- PAKE record
- PAKE record store
- PKI
In addition different CryptoOptions
can be stored to a name.
Every key will be stored with a unique name, which is required to get the key later:
// Create a new key ring
using KeyRing keys = new();
// Add a key
if(!keys.TryAdd("name", anyKey))
throw new Exception("Key exists already");
// Get a key
if(!keys.TryGetSymmetric("name", out anyKey))
throw new Exception("Key not found");
// Encrypt/decrypt
byte[] keyBytes = keys.Encrypt(secret);
// Can be restored using `KeyRing.Decrypt(keyBytes, secret)`
Adding, updating, getting, removing keys and encryption is thread safe.
The static MaxCount
and MaxSymmetricKeyLength
properties limit the max.
number of stored keys and the max. symmetric key length in bytes. A key name
is limited to 255 characters.
NOTE: If a key ring uses algorithms or types which are not available in a deserializing context, it can't be restored anymore!
In order to ignore unusable keys during deserialization use the constructor
which takes ignoreSerializationErrors
and set the value to true
:
using KeyRing keys = new(ignoreSerializationErrors: true);
int serializerVersion = stream.ReadSerializerVersion();
((IStreamSerializer)keys).Deserialize(stream, serializerVersion);
It's assumed that stream
contains the decrypted key ring serialization data
already.
NOTE: Only type/algorithm incompatibilities will be ignored by skipping the stored object. Serialized structure errors will still throw.
PAKE
Pake
(see tests) can be used for implementing a password authenticated key
exchange, which should be wrapped with a PFS protocol in addition. PAKE uses
symmetric cryptographic algorithms only and uses random bytes for session key
generation. After signup, it can be seen as a symmetric PFS protocol, if the
random bytes are random for each session and never stored as communicated
between the peers.
CAUTION: PAKE doesn't support counter algorithms! For working with PQ counter algorithms, you'll have to combine two PAKE with different options by yourself.
NOTE: For PAKE both peers need to use the same KDF and MAC options. If the algorithm is going to be changed, a new signup has to be performed. In case a peer changes its authentication (identifier or key), a new signup operation has to be performed, too. A signup should always be performed using an additional factor, which was communicated using another transport. An authentication may use a second factor, while it's recommended to use at last two factors for each operation.
PAKE allows single directional authenticated messages and should be performed bi-directional for a bi-directional communication, if possible.
While a MAC can be computed fast, KDF needs time. During a PAKE handshake both algorithms are used on both peers. But the server will perform KDF only after a MAC was validated, which closes a door for DoS attacks by an anonymous attacker.
NOTE: Default options for PAKE can be overridden by setting a custom value
to Pake.DefaultOptions
.
FastPakeClient/Server
allow fast followup authentications after the first
authentication of an already known peer (after a signup was performed).
They're designed to be alive for a longer time, if the server expects a client
to perform multiple authentications. They're good for a single-directional UDP
protocol, for example, where each message is PAKE authenticated, and each
followup message is encrypted using the session key of the first
authentication message.
NOTE: This PAKE implementation is patent free!
PAKE with http requests
PAKE can encrypt http messages and provide an additional authentication to a JWT. Benefits of encrypting http messages:
- additional authentication to JWT
- Perfect Forward Secrecy (PFS) encryption for every single http request
- nothing from the request can be sniffed from a man in the middle (MiM)
- the request can't be repeated in another authentication context
- you can implement replay attack avoiding measures by denying the same random data (from the PAKE authentication object) within a timespan
The final http method, request path, headers and body are completely hidden to any attacker who may be able to sniff your network traffic. Also in a client browser the developer tools won't show any request details, which is perfect in a WASM app to hide even your servers API effectively.
Of course processing each request and response with PAKE has an overhead, especially when using compression, too.
Example client code:
using PakeHttpRequestFactory factory = new(username, password);
using PakeRequest request = await factory.CreateRequestAsync(
new("https://domain.tld"),
HttpMethod.Get,
"/request/path"
);
// request.Request contains the http request message
using PakeResponse response = await httpResponseMessage.GetPakeResponseAsync(request.Key);
// response.Response contains the decoded PAKE response, response.Body.CryptoStream the response stream
response.Response.EnsureSuccessStatusCode();
The server needs to process messages, too, of course. This part isn't included within this library and does vary depending on the webserver.
Client/server authentication protocol
Asymmetric keys + PAKE
wan24-Crypto
implements a client/server authentication protocol for stream
connections (like a TCP NetworkStream
). This protocol allows
- server public key request
- signup
- authentication
while all features are optional. It implements Zero Knowledge Password Proof (ZKPP) and Perfect Forward Secrecy (PFS).
During a signup an asymmetric public key of the client can be signed by the server for long term use.
The authentication is encrypted using
- (hopefully pre-shared) server public keys and PFS keys
- PAKE
If the public servers keys are not pre-shared, a PKI should be used to ensure working with valid keys.
See the tests (Auth_Tests.cs
) for an example of a simple but working client/
server implementation.
On signup, the server needs to store the PAKE identity and the clients public
keys, which then need to be provided for a later authentication process. The
ClientAuthContext
has all the information required to handle a signup or an
authentication, and it contains the exchanged PFS session key for encrypted
communication, too.
For optimal security (in 2023), you should use an asymmetric PQC algorithm for
the key exchange and signature key, and a common non-PQC algorithm as counter
key exchange and signature key. You can find asymmetric PQC algorithms in the
wan24-Crypto-BC
library, for example.
NOTE: Login username and password won't be communicated to the server. If any authentication related information changes, a follow-up signup needs to be performed.
The signup process (as seen from the client; is bi-directional always):
- Send the clients public PFS key
- Start encryption using the servers public key and a private PFS key of the client
- Send the clients public counter PFS key
- Extend the encryption using the servers public counter key and a private PFS key of the client
- Send the PAKE signup request and extend the encryption using the PAKE session key (the request contains the public key suite and a key signing request, if this is the signup of a new user, or the public key suite changed)
- Sign the authentication sequence using the private client key
- Validate the server signature of the authentication sequence
- Receive the servers public PFS key
- Extend the encryption using the private key and the servers public PFS key
- Receive the servers public counter PFS key
- Extend the encryption with the PFS key computed using the private PFS keys and the servers public PFS keys
- Get the signed public client key
- Sign the public key suite including the signed public key and store the private and public key suites
NOTE: The PAKE authentication allows to attach any payload, which enables the app to extend the process with additional meta data as required.
A later authentication process (as seen from the client; may be uni- directional):
- Send the clients public PFS key
- Start encryption using the servers public key and a private PFS key of the client
- Send the clients public counter PFS key
- Extend the encryption using the servers public counter key and a private PFS key of the client
- Send the PAKE authentication request and extend the encryption using the PAKE session key
- Sign the authentication sequence using the private client key
For a bi-directional communication channel in addition:
- Validate the server signature of the authentication sequence
- Receive the servers public PFS key
- Extend the encryption using the private key and the servers public PFS key
- Receive the servers public counter PFS key
- Extend the encryption using the PFS key computed using the private PFS keys and the servers public PFS keys
WARNING: An uni-directional connection does use a PFS key, but this key is being applied on a pre-shared long term key only.
NOTE: Since a temporary client like a browser may not be able to store the private client keys, such a client may only use the signup and not send a key signing request. Then the server is required to identify the authenticating client using the PAKE identifier (not the public key ID).
In total at last three session keys are being exchanged during a request (six session keys for bi-directional communication). The first two keys are pseudo- PFS keys, while the third key is the PAKE session key. Each part of the authentication sequence will be encrypted using the latest exchanged session key (encryption does change each time a new session key can be derived at the server).
NOTE: The encryption key will always be extended by the next derived key, but not replaced.
To avoid replay-attacks, the server should implement methods to deny re-using PFS keys or random byte sequences. A timestamp validation is implemented already (which defaults to a maximum time offset of 5 minutes to the clients system time). So the server should ensure, that a (pseudo-)PFS key or random byte sequence can't be re-used within five minutes after it was received from a client.
NOTE: The long term client key exchange keys can be used for encrypting an off-session peer-to-peer message. They're not used for signup/authentication.
Things that must be known in advance are the used algorithms, while the PFS keys use the public server keys algorithms and key sizes. But these algorithms must be pre-defined in both (client and server) apps anyway:
- Hash algorithm
- MAC algorithm
- KDF algorithm
- Encryption algorithm (and other
CryptoOptions
settings for encryption)
CAUTION: The chosen encryption algorithm must not require MAC
authentication (while built-in MAC authentication like with AEAD is ok). You
can find a stream cipher in the wan24-Crypto-BC
library, for example. The
encryption settings shouldn't use KDF to avoid too much overhead (KDF will be
used for PAKE already).
PAKE authentication only
Quiet different from the "Asymmetric keys + PAKE" authentication protocol,
there is another implementation, which uses PAKE only. See the tests
(PakeAuth_Tests.cs
) for an example of a simple but working client/server
implementation.
This protocol allows
- signup
- authentication
while all features are optional. It implements Zero Knowledge Password Proof (ZKPP) and Perfect Forward Secrecy (PFS).
CAUTION: At last the signup communication is required to be wrapped with a PFS protocol! Use a TLS socket, for example. A later authentication may be performed using a raw socket.
During the signup the server will respond a random signup to the client. The produces PAKE values need to be stored on both peers for later authentication.
WARNING: This authentication protocol doesn't support the use of a pre- shared key for the signup. This clearly opens doors for a MiM attack during the signup: If the signup communication was compromised, the attacker will be able to authenticate successful later! It's absolutely required to use a wrapping PFS protocol which ensures the server identity, before sending any signup information.
For authentication, the client sends the identifier of the servers PAKE values, which have been pre-shared during the signup. Using random bytes a temporary session key will be calculated and used to send the PAKE authentication request. The temporary session key will then be extended using the now fully exchanged PAKE session key.
NOTE: The authentication may use a raw socket, while a wrapping PFS protocol is of course never a mistake. However, if using raw sockets, a MiM is able to know who is authenticating, because the servers random PAKE identifier needs to be sent plain (and this value won't change, if not forced).
Things that must be known in advance are the used algorithms, which must be pre-defined in both (client and server) apps:
- MAC algorithm
- KDF algorithm
- Encryption algorithm (and other
CryptoOptions
settings for encryption)
CAUTION: The chosen encryption algorithm must not require MAC
authentication (while built-in MAC authentication like with AEAD is ok). You
can find a stream cipher in the wan24-Crypto-BC
library, for example. The
encryption settings shouldn't use KDF to avoid too much overhead (KDF will be
used for PAKE already).
In total this authentication may be a good choice for use with fixed client devices, which are able to store the servers PAKE values in a safe way for the long term. But also temporary devices may benefit, if they'll connect to a server multiple times.
Random number generator
You can use RND
as a random data source. RND
is customizable and falls
back to RandomNumberGenerator
from .NET. It uses /dev/random
as data
source, if available.
byte[] randomData = RND.GetBytes(123);
NOTE: /dev/random
may be too slow for your requirements. If you don't
want to use RandomDataGenerator
(which can speed up RND
a lot), you can
disable /dev/random
:
RND.UseDevRandom = false;
NOTE: In case you want to force using /dev/random
ONLY:
RND.RequireDevRandom = true;// This will cause RND to throw on Windows!
The RandomDataGenerator
is an IHostedService
which can be customized, but
falls back to RND
per default. The service uses a buffer to pre-buffer
random data, in case your RNG is slow. It's possible to define custom
fallbacks which are being used in case the buffer doesn't have enough data to
satisfy a request. If you use a RandomDataGenerator
, you can set the
instance to RND.Generator
to use it per default.
The full generator process is:
- Try reading pre-buffered random data
- If not satisfied, call the defined fallback RNG delegates (
RND
methods are preset) - Default
RND
methods useRandomNumberGenerator
, finally
Each step in this process can be customized in RND
AND
RandomDataGenerator
, while the defaults of RandomDataGenerator
fall back
to RandomStream
and RND
, and the methods of RND
use RND.Generator
or
fall back to RandomNumberGenerator
. To simplify that and avoid an endless
recursion in your code: DO NOT call RND.Get/FillBytes(Async)
from a
customized RandomDataGenerator
! DO call RND.DefaultRng(Async)
instead.
If you use the plain RandomDataGenerator
, it uses the RandomStream
as
random data source, if /dev/random
isn't available or disabled.
(RandomStream
uses RandomNumberGenerator
, finally.)
There's another Rng
type, which is a RandomNumberGenerator
implementation
that skips the OS random number generator implementation and uses RND
instead (also the static methods of RandomNumberGenerator
are overridden).
The RngHelper
extends any RandomNumberGenerator
instance with a GetInt32
method (which applies to customized Rng
instances, too, since they extend
RandomNumberGenerator
).
NOTE: Rng
implements non-zero random number generation. However, any non-
zero random byte sequence isn't as random as it could be anymore - keep that
in mind.
To sum it up: Use RND
for (optional customized) getting cyptographic random
bytes. You can use SecureRandomStream.Instance
, too (it uses RND
on
request). Use Rng
as (also asynchronous) random integer generator, or where
a RandomNumberGenerator
instance is required.
CAUTION: True randomness is the most important source of security for any crypto application. PRNG and CSRNG random sources, and even physical phenomen based hardware random sources won't produce true random, and/or can be manipulated in some way to produce predictable random data, unless it's a QRNG source.
Seeding
Use the RND.AddSeed(Async)
methods for seeding your RNG. The
AddDevRandomSeed(Async)
only seed /dev/random
, while when calling
AddSeed(Async)
, the method will try to seed
- the
RND.SeedConsumer
- the
RND.Generator
/dev/random
and return after providing the seed to the first available target, or when there's no target for consuming the seed.
CAUTION: Be aware of the patent US10402172B1!
Seeding automatic
A seedable RNG (ISeedableRng
) can be seeded automatic using
- received IV bytes
- received cipher data
- received random bytes
CAUTION: Even if it's extremely unlikely, an untrusted seed source may be able to cause a RNG to produce predictable random data, unless it combines QRNG entropy.
To enable automatic seeding, set the seed source flags to RND.AutoRngSeeding
.
Per default the RND.Generator
will be seeded, unless you specify another
seed target in RND.SeedConsumer
. A seed consumer needs to implement the
ISeedableRng
interface, which RandomDataGenerator
does, for example.
Seeding during encryption can be overridden using CryptoOptions.RngSeeding
.
Seeding during PAKE authentication can be overridden using the given options for encryption.
When deserializing the SignatureContainer
embedded signed data, the nonce
will be seeded, if RND.AutoRngSeeding
has the Random
flag.
Because seeding may be synchronized, there's a RngSeederQueue
queue worker,
which is a simple hosted service that seeds the given target ISeedableRng
in
background, using a copy of the given seeds. The RngSeederQueue
may be
customized easily by extending the type (pregnant methods are virtual).
CAUTION: Be aware of the patent US10402172B1!
Some words on secure seeding
A PRNG isn't enough, and even a CSRNG isn't enough, if the RNG's seed is not good. Modern OS CSRNG implementations use hardware and software environment information like
- system clock
- IP stack I/O timings
- temperature sensors values
- environment sounds
- harddisc values
- user information digest
- process ID
- thread ID
- ...and so on.
But this still isn't really good, because all sources can be manipulated and/or predicted. The only really good seed source is a quantum device which is used by a QRNG. But not everyone has access to a QRNG, and the hardware is expensive, too.
A company may decide to buy a QRNG hardware, which is a good investment in 2023, since quantum computing resources are becoming available to anyone now, and the development speed is really amazing (and will speed up more with the also fast growing AI possibilities!).
But a private person might run into problems, unless there's a free QRNG seed source available online, hopefully for free. It'll take some time until enduser systems will contain a chip which can produce QRNG sequences on the local mashine, and isn't too expensive, so everyone can afford to own one.
Anyway, when using a CSRNG, finally, it should be re-seeded as often as possible, because if a CSRNG output is being collected over a time, and the underlaying algorithm is known, the future output becomes predictable - and this is something you'd like to avoid as good as possible. There are several steps that you should implement fully, if possible in any way:
- Use a PRNG and seed it with CSRNG data from the operating system
- Wrap the PRNG with a CSRNG which uses an underlaying stream cipher to encrypt the PRNG's random data stream
- Re-seed the PRNG as often as possible using at last CSRNG data from the operating system, and if possible in combination with entropy from a QRNG
Of course the best solution would be to use a QRNG instead of a PRNG in step 1, because then you wouldn't need to re-seed usually. But step 2 is important in all cases, please don't miss it! A good practice is to combine multiple entropy sources, at last for seeding, but also for the RNG's output, which you're going to use for symmetric keys (DEK), for example.
If you carefully red and understood this information, you should get quiet
good results with a CSRNG already, even you don't have access to a quantum
entropy source. The wan24-Crypto
and wan24-Crypto-BC
libraries should
offer everything a C# developer needs for a better random number source.
NOTE: Even the best PQC algorithm will fail when not using a good RNG!
Entropy monitoring
The (Disposable)EntropyMonitor
can monitor the entropy of produced RND and
enforce a minimum required entropy using available algorithms from
EntropyHelper
. The monitor simply wraps an IRng
for this and adds entropy
checks for produced RND before returning.
CAUTION: If you didn't set a MaxRetries
value larger than zero, a wrong
EntropyHelper
configuration could cause system exhaustion when RND was
requested.
Password helper
Using the PasswordHelper
you can easily generate and validate passwords:
string pwd = new(PasswordHelper.GeneratePassword());
Assert.AreEqual(PasswordOptions.None, PasswordHelper.CheckPassword(pwd, PasswordOptions.Lower));
The PasswordOptions
flags allow to specify password requirements for the
generator and the validation. These options are available for generating a
password:
- Length
- Entropy validation
- Lower case character set
- Upper case character set
- Numeric character set
- Special character set
All used character sets may be customized as required.
The generator can
- use any password length
- use a lower case character set
- use an upper case character set
- use a numeric character set
- use a special character set
- validate the entropy of the generated password
while the validation checks
- password length restrictions
- a minimum entropy
- for lower case characters
- for upper case characters
- for numeric characters
- for special characters
All those options can be mixed up using the PasswordOptions
as required.
The CheckPassword
returns PasswordOptions.None
on success. Any other
return value contains a flag for each found problem with the given password.
Password post-processing
An entered user password may be easy to break using brute force. For this
reason it's recommended to apply at last KDF on the raw password. The
PasswordPostProcessor
base type allows to create a reuseable post-processor,
which can also be used for pre-processing an encryption password.
PasswordPostProcessorChain
does apply a chain of PasswordPostProcessor
in
sequential order.
The PasswordPostProcessor.Instance
is a ready-to-use post-processor, which
does these steps for processing a password:
- apply KDF
- apply a counter KDF, if configured
- compute a MAC, if configured
For a fully customized processing you can use the static
DefaultPasswordPostProcessor.ProcessPwd
method, which allows giving the
processing options to use as an argument.
You're free to set your own default processor to
PasswordPostProcessor.Instance
(which will be used when calling
WithEncryptionPasswordPreProcessing
on CryptoOptions
without any argument
values).
The CryptoEnvironment.Options
have a property PasswordPostProcessors
for
storing password post-processor instances which are used to build a
PasswordPostProcessorChain
, which will be set to
PasswordPostProcessor.Instance
. If the property
UsePasswordPostProcessorsInCryptoOptions
was set to true
, its methods will
be set to CryptoOptions.DefaultEncryptionPassword(Async)PreProcessor
.
For the CryptoAppConfig
it's the same logic, except that you need to define
the CLR type names including namespace to the PasswordPostProcessors
property. The password post-processors need a parameterless constructor in
order to be able to be used in this context.
Object encryption
By using the DekAttribute
and EncryptAttribute
(and optional the
IEncryptProperties
interface) you can en-/decrypt objects with the
ObjectEncryption
helper methods/extensions:
public class YourType : IEncryptProperties
{
[Dek]
public byte[] Dek { get; set; } = null!;
[Encrypt]
public byte[] Raw { get; set; } = null!;
}
NOTE: null
values won't be en-/decrypted! Using the
IEncryptPropertiesExt
interface your object can define en-/decryption
handler methods.
The Dek
will hold a random data encryption key, while all properties having
the Encrypt
attribute will be encrypted using that DEK:
YourType obj = new()
{
Raw = ...
};
obj.EncryptObject(kek);
NOTE: The real object type will be used for finding properties to process,
not the generic method argument of EncryptObject
and DecryptObject
.
The kek
holds the key, which is used for the DEK encryption. Use
DecryptObject
for decryption.
The DekAttribute
and EncryptAttribute
can be extended to override the
methods that are used to get/set values.
The rules for the used keys are simple:
- If you have a
Dek
property, it'll be used to store a KEK encrypted random DEK (which will be (re-)generated for each encryption) - If you don't have a
Dek
property, you'll need to specify the DEK in the method parameters (and of course no KEK parameter value is required)
Automatic key ecryption key providing
Implement the IEncryptPropertiesKek
interface for automatic key encryption
key (KEK) providing. The object needs to implement a data encryption key (DEK)
property with a DekAttribute
. Then you can use the AutoEn/DecryptObject
extension methods.
Notes
Sometimes you'll read something like "will be disposed" or "will be cleared" in the documentation. These are important diclaimers, which should be respected in order to work safe with sensitive data.
WARNING: The disclaimer may be missing in some places!
Will be disposed
When noted to a given value, it'll be disposed after the desired operation, or when the hosting object is being disposed.
When noted to a returned value, and you don't want to use the value only for a short term (during the hosted value wasn't disposed for sure), you should consider to create a copy. The hosting object will dispose the value, when it's being disposed.
Should be disposed
This is a disclaimer that reminds you to dispose a returned value after use.
Will be cleared
When noted to a given value, it'll be cleared after the desired operation, or when the hosting object is being disposed/cleared.
When noted to a returned value, and you don't want to use the value only for a short term (during the hosted value wasn't disposed/cleared for sure), you should consider to create a copy. The hosting object will clear the value, when it's being disposed/cleared.
Should be cleared
This is a disclaimer that reminds you to clear a returned value after use. For
this usually you can use the Clear
or Clean
(extension?) method of the
value. (In case of Memory<T>
or Span<T>
it's Clean
, because Clear
is
used to zero out the value already, while Clean
will fill it with random
bytes before.)
Algorithm IDs
Internal each algorithm has an unique ID within a category:
- Asymmetric cryptography
- Symmetric cryptography
- Hashing
- MAC
- KDF
If you'd like to implement inofficial algorithms on your own, please use the ID bits 24-32 only to avoid possible collisions with official libraries! These are the official implementation IDs (not guaranteed to be complete):
Algorithm | ID | Library |
---|---|---|
Asymmetric cryptography | ||
ECDH | 0 | wan24-Crypto |
ECDSA | 1 | wan24-Crypto |
CRYSTALS-Kyber | 2 | wan24-Crypto-BC |
CRYSTALS-Dilithium | 3 | wan24-Crypto-BC |
FALCON | 4 | wan24-Crypto-BC |
SPHINCS+ | 5 | wan24-Crypto-BC |
FrodoKEM | 6 | wan24-Crypto-BC |
NTRUEncrypt | 7 | wan24-Crypto-BC |
Ed25519 | 8 | wan24-Crypto-BC |
Ed448 | 9 | wan24-Crypto-BC |
X25519 | 10 | wan24-Crypto-BC |
X448 | 11 | wan24-Crypto-BC |
XEd25519 | 12 | wan24-Crypto-BC |
XEd448 | 13 | wan24-Crypto-BC |
Streamlined NTRU Prime | 14 | wan24-Crypto-BC |
BIKE | 15 | wan24-Crypto-BC |
HQC | 16 | wan24-Crypto-BC |
Picnic | 17 | wan24-Crypto-BC |
Symmetric cryptography | ||
AES-256-CBC | 0 | wan24-Crypto |
ChaCha20 | 1 | wan24-Crypto-BC |
XSalsa20 | 2 | wan24-Crypto-BC |
AES-256-GCM | 3 | wan24-Crypto-BC |
XCrypt | 4 | (none) |
Serpent 256 CBC | 5 | wan24-Crypto-BC |
Serpent 256 GCM | 6 | wan24-Crypto-BC |
Twofish 256 CBC | 7 | wan24-Crypto-BC |
Twofish 256 GCM | 8 | wan24-Crypto-BC |
Hashing | ||
MD5 | 0 | wan24-Crypto |
SHA-1 | 1 | wan24-Crypto |
SHA-256 | 2 | wan24-Crypto |
SHA-384 | 3 | wan24-Crypto |
SHA-512 | 4 | wan24-Crypto |
SHA3-256 | 5 | wan24-Crypto |
SHA3-384 | 6 | wan24-Crypto |
SHA3-512 | 7 | wan24-Crypto |
Shake128 | 8 | wan24-Crypto |
Shake256 | 9 | wan24-Crypto |
MAC | ||
HMAC-SHA-1 | 0 | wan24-Crypto |
HMAC-SHA-256 | 1 | wan24-Crypto |
HMAC-SHA-384 | 2 | wan24-Crypto |
HMAC-SHA-512 | 3 | wan24-Crypto |
HMAC-SHA3-256 | 4 | wan24-Crypto |
HMAC-SHA3-384 | 5 | wan24-Crypto |
HMAC-SHA3-512 | 6 | wan24-Crypto |
TPMHMAC-SHA-1 | 7 | wan24-Crypto-TPM |
TPMHMAC-SHA-256 | 8 | wan24-Crypto-TPM |
TPMHMAC-SHA-384 | 9 | wan24-Crypto-TPM |
TPMHMAC-SHA-512 | 10 | wan24-Crypto-TPM |
KDF | ||
PBKDF#2 | 0 | wan24-Crypto |
Argon2id | 1 | wan24-Crypto-NaCl |
SP 800-108 HMAC CTR KBKDF | 2 | wan24-Crypto |
PAKE has no algorithm ID, because it doesn't match into any category (there is no PAKE multi-algorithm support implemented), and it's a key exchange protocol - but not a cryptographic algorithm.
Counter algorithms
A counter algorithm is being applied after the main algorithm. So the main algorithm result is secured by the counter algorithm result. You can use this in case you want to double security, for example when using post quantum algorithms, which may not be trustable at present.
The HybridAlgorithmHelper
allows to set default hybrid algorithms for
- key exchange in
KeyExchangeAlgorithm
- signature in
SignatureAlgorithm
- KDF in
KdfAlgorithm
- MAC in
MacAlgorithm
and exports some helper methods, which are being used internal during encryption (you don't need to use them unless you have to). If you want the additional hybrid algorithms to be used every time, you can set the
EncryptionHelper.UseHybridOptions
AsymmetricHelper.UseHybridKeyExchangeOptions
AsymmetricHelper.UseHybridSignatureOptions
to true
to extend used CryptoOptions
instances by the algorithms defined
in the HybridAlgorithmHelper
properties.
WARNING: The HybridAlgorithmHelper
counter MAC implementation isn't
really good - it's only a trade-off to gain compatibility and performance. You
should consinder to create a counter MAC from the whole raw data manually, if
possible, instead.
Post quantum safety
Some of the used cryptographic algorithms are quantum safe already, but
especially the asymmetric algorithms are not post quantum safe at all. If you
use an extension library which offers asymmetric post quantum safe algorithms
for key exchange and signature, you can enforce post quantum safety for all
used default algorithms by calling CryptoHelper.ForcePostQuantumSafety
. This
method will ensure that all used default algorithms are post quantum safe. In
case it's not possible to use post quantum algorithms for all defaults, this
method will throw an exception.
NOTE: AES-256, and SHA-384+, SHA3 and Shake128/256 (and HMAC-SHA-384+ and
HMAC-SHA3-*) are considered to be post quantum-safe algorithms, while
currently no post quantum-safe asymmetric algorithms are implemented in this
main library (wan24-Crypto-BC
does implement some), since .NET doesn't offer
any API (this may change with coming .NET releases).
NOTE: While SHA3 and Shake128/256 (KECCAK) was designed for post quantum safety, AES-256 and SHA-384+ (SHA2) wasn't and is only considered to be post quantum safe because of its key/output length (this also applies to the HMACs). While the post quantum safety of SHA3 and Shake218/256 should stay stable, key/output length based considerations may be reconsidered from time to time, based on the recent quantum computing capabilities available.
Disclaimer
wan24-Crypto
and provided sub-libraries are provided "as is", without any
warranty of any kind. Please read the license for the full disclaimer.
This library uses the available .NET cryptographic algorithms and doesn't implement any "selfmade" cryptographic algorithms. Extension libraries may add other well known third party cryptographic algorithm libraries, like Bouncy Castle. Also "selfmade" cryptographic algorithms may be implemented as extensions.
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net8.0 is compatible. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
-
net8.0
- ObjectValidation (>= 2.7.0)
- Stream-Serializer-Extensions (>= 3.10.0)
- wan24-Compression (>= 2.11.0)
- wan24-Core (>= 2.36.0)
- wan24-Core-Validation (>= 1.3.0)
NuGet packages (4)
Showing the top 4 NuGet packages that depend on wan24-Crypto:
Package | Downloads |
---|---|
wan24-Crypto-BC
Bouncy Castle adoption to wan24-Crypto |
|
wan24-Crypto-Shared-Tests
Shared tests for wan24-Crypto libraries |
|
wan24-Crypto-NaCl
NaCl adoption for wan24-Crypto |
|
wan24-Crypto-TPM
TPM crypto helper extension package for wan24-Crypto |
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated | |
---|---|---|---|
2.20.0 | 263 | 10/27/2024 | |
2.19.0 | 178 | 9/21/2024 | |
2.18.0 | 130 | 9/9/2024 | |
2.17.0 | 448 | 8/16/2024 | |
2.16.1 | 205 | 7/13/2024 | |
2.16.0 | 144 | 7/6/2024 | |
2.15.0 | 134 | 6/29/2024 | |
2.14.0 | 166 | 6/22/2024 | |
2.13.0 | 296 | 6/16/2024 | |
2.12.0 | 135 | 5/20/2024 | |
2.11.0 | 85 | 5/11/2024 | |
2.10.0 | 120 | 4/28/2024 | |
2.9.1 | 109 | 4/21/2024 | |
2.9.0 | 130 | 4/20/2024 | |
2.8.1 | 126 | 4/14/2024 | |
2.8.0 | 162 | 4/13/2024 | |
2.7.0 | 171 | 3/9/2024 | |
2.6.0 | 188 | 3/2/2024 | |
2.5.0 | 194 | 2/24/2024 | |
2.4.0 | 176 | 2/17/2024 | |
2.3.0 | 123 | 2/17/2024 | |
2.2.0 | 127 | 2/14/2024 | |
2.1.1 | 158 | 2/11/2024 | |
2.1.0 | 167 | 2/10/2024 | |
2.0.0 | 181 | 1/20/2024 | |
1.26.1 | 255 | 11/11/2023 | |
1.26.0 | 161 | 11/1/2023 | |
1.25.0 | 176 | 10/29/2023 | |
1.24.0 | 198 | 10/21/2023 | |
1.23.0 | 245 | 10/15/2023 | |
1.22.0 | 227 | 10/8/2023 | |
1.20.1 | 201 | 10/1/2023 | |
1.20.0 | 133 | 10/1/2023 | |
1.19.0 | 219 | 9/19/2023 | |
1.18.0 | 170 | 9/16/2023 | |
1.17.0 | 194 | 9/10/2023 | |
1.16.0 | 192 | 9/3/2023 | |
1.15.1 | 180 | 7/30/2023 | |
1.15.0 | 164 | 7/30/2023 | |
1.14.0 | 225 | 7/22/2023 | |
1.13.0 | 255 | 6/8/2023 | |
1.12.0 | 234 | 6/3/2023 | |
1.11.0 | 162 | 5/29/2023 | |
1.10.0 | 175 | 5/27/2023 | |
1.8.0 | 193 | 5/20/2023 | |
1.7.0 | 218 | 5/11/2023 | |
1.6.0 | 302 | 5/7/2023 | |
1.5.0 | 259 | 5/1/2023 | |
1.4.0 | 307 | 4/30/2023 | |
1.3.0 | 234 | 4/29/2023 | |
1.2.2 | 246 | 4/28/2023 | |
1.2.1 | 269 | 4/28/2023 | |
1.2.0 | 344 | 4/26/2023 | |
1.1.0 | 206 | 4/25/2023 |