Skip to content

philanc/luamonocypher

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CI

LuaMonocypher

A Lua wrapper for the excellent Monocypher crypto library by Loup Vaillant - https://monocypher.org/

The Monocypher library source is included here (currently version 3.1.3)

Monocypher implements:

  • Authenticated encryption with Chacha20 (more precisely XChacha20, ie. Chacha with a 24-byte nonce) and Poly1305 MAC (RFC 8439),
  • Blake2b hash function (RFC 7693), as secure as SHA-3, and as fast as MD5
  • Curve25519-based Diffie-Hellman key exchange (RFC 7748),
  • EdDSA signature (RFC 8032) based on the Ed25519 curve and using Blake2b hash instead of SHA512,
  • SHA2-512 hash function
  • HMAC-SHA512 Keyed-Hashing for Message Authentication using SHA512 hash
  • Ed25519 signature using SHA512 hash (compatible with the original ed25519 signature functions in NaCl by Dan Bernstein)
  • Argon2i (RFC 9106), a modern key derivation function based on Blake2b. Like scrypt, it is designed to be expensive in both CPU and memory.

The complete documentation of the Monocypher library is available at https://monocypher.org/manual/

The Lua wrapper

It includes also some utilities:

  • an interface to an OS random generator (it uses getrandom() or /dev/urandom on Linux, or CryptGenRandom on Windows)

  • base64 encoding and decoding functions

LuaMonocypher API summary:


--- Authenticated encryption

encrypt(key, nonce, plain [, ninc]) => crypted
	authenticated encryption using Xchacha20 and a Poly1305 MAC
	key must be a 32-byte string
	nonce must be a 24-byte string
	plain is the text to encrypt as a string
	ninc: optional nonce increment (useful when encrypting a long text
	   as a sequence of block). The same parameter n can be used for 
	   the sequence. ninc is added to n for each block, so the actual
	   nonce used for each block encryption is distinct.
	   ninc defaults to 0 (the nonce n is used as-is)
	return the encrypted text as a string. The encrypted text includes 
	the 16-byte MAC. So  #crypted == #plain + 16
	
decrypt(key, nonce, crypted [, ninc]) => plain
	authenticated decryption - verification of the Poly1305 MAC
	and decryption with Xcahcha20.
	key must be a 32-byte string
	nonce must be a 24-byte string
	crypted is the text to decrypt as a string
	ninc: optional nonce increment (see above. defaults to 0)
	return the decrypted plain text as a string or nil if the MAC 
	verification fails.


--- Blake2b cryptographic hash

blake2b(text, [digest_size [, key]]) => digest
	digest_size is the optional length of the expected digest. 
	If provided, it must be an integer between 1 and 64. 
	It defaults to 64.
	key is an optional key allowing to use blake2b as a MAC function.
	If provided, key is a string with a length that must be between 
	1 and 64. The default is no key.
	The returned digest is a binary string. Default length is 64 bytes.


--- Argon2i password derivation 

argon2i(pw, salt, nkb, niter) => k
	compute a key given a password and some salt
	This is a password key derivation function similar to scrypt.
	It is intended to make derivation expensive in both CPU 
	and memory.
	pw: the password string
	salt: some entropy as a string (typically 16 bytes)
	nkb:  number of kilobytes used in RAM (as large as possible)
	niter: number of iterations (as large as possible, >= 10)
	Return k, a key string (32 bytes).

	For example: on a i5-8250U CPU @ 1.60GHz laptop,
	with nkb=100000 (100MB) and niter=10, the derivation takes close
	to 1 sec.


--- Curve25519-based Diffie-Hellman key exchange

public_key(sk) => pk
	return the public key associated to a curve25519 secret key
	sk is the secret key as a 32-byte string
	pk is the associated public key as a 32-byte string

	To generate a curve25519 key pair (sk, pk), do:
		sk = randombytes(32)
		pk = public_key(sk)
	
key_exchange(sk, pk) => k
	DH key exchange. Return a session key k used to encrypt 
	or decrypt a text.
	sk is the secret key of the party invoking the function 
	("our secret key"). 
	pk is the public key of the other party 
	("their public key").
	sk, pk and k are 32-byte strings

x25519(s, P1) => s.P1
	// raw scalar multiplication over curve25519
	// Note: usually this function should not be used directly.
	// For DH key exchange, the key_exchange() function above 
	// should be used instead.
	// --
	// s: a scalar as a 32-byte string
	// P1: a curve point as a 32-byte string
	// return the product s.P1 as a 32-byte string


--- EdDSA signature (RFC 8032). 

The signature functions are based on the Ed25519 curve and Blake2b hash.

sign_public_key(sk) => pk
	return the public key associated to a secret key
	sk is the secret key as a 32-byte string
	pk is the associated public key as a 32-byte string

	Note: curve25519 key pairs cannot be used for EdDSA signature. 
	To generate a signature key pair (sk, pk), do:
		sk = randombytes(32)
		pk = sign_public_key(sk)

sign(sk, pk, text) => sig
	sign a text with a secret key
	sk is the secret key as a 32-byte string
	text is the text to sign as a string
	Return the text signature as a 64-byte string.

check(sig, pk, text) => is_valid
	check a text signature with a public key
	sig is the signature to verify, as a 64-byte string
	pk is the public key as a 32-byte string
	text is the signed text
	Return a boolean indicating if the signature is valid or not.
	
	
--- SHA512 and NaCl original Ed25519 signature based on SHA512

sha512(m) => digest
	return the sha512 hash of message m as a 64-byte binary string
	
hmac_sha512(sk, m)
	return the hmac-sha512 of message m with secret key sk
	as a 64-byte binary string.
	sk is the secret key used to compute the hmac. It is a string 
	of any length (but keys longer than 128 bytes will be hashed 
	to a 64-byte string before computing the hmac) 
	
ed25519_public_key(sk)
	return the public key associated to a secret key
	sk is the secret key as a 32-byte string
	pk is the associated public key as a 32-byte string

	Note: curve25519 keypairs or keys generated by sign_public_key() 
	cannot be used for the ed25519_* signature functions.
	To generate a signature key pair (sk, pk), do:
		sk = randombytes(32)
		pk = ed25519_public_key(sk)

ed25519_sign(sk, pk, text) => sig
	sign a text with a secret key
	sk is the secret key as a 32-byte string
	text is the text to sign as a string
	Return the text signature as a 64-byte string.

ed25519_check(sig, pk, text) => is_valid
	check a text signature with a public key
	sig is the signature to verify, as a 64-byte string
	pk is the public key as a 32-byte string
	text is the signed text
	Return a boolean indicating if the signature is valid or not
	
Note: contrary to the sign() and sign_open() NaCl functions, the 
signature is not prepended to the text ("detached signature")


--- Utilities

randombytes(n)
	return a string containing n random bytes

b64encode(str [, linelen])
	str is the string to base64-enccode
	linelen is an optional output line length
	(should be be multiple of 4). default is 72.
	if linelen == 0, no '\n' is inserted.

b64decode(str)
	str is the base64-encoded string to decode
	return the decoded string, or nil if str contains 
	an invalid character (whitespaces and newlines are ignored)


Building

Adjust the Makefile according to your Lua installation (set the LUADIR variable).

Targets:

	make          -- build luamonocypher.so
	make test     -- build luamonocypher.so if needed, 
	                 then run test_luamonocypher.lua
	make clean

An alternative Lua installation can be specified:

	make LUA=/path/to/lua LUAINC=/path/to/lua_include_dir test

License

The original Monocypher source code is dual-licensed (2-clause BSD or CC-0) - see src/monocypher-LICENSE.md

The LuaMonocypher wrapper library is MIT-licensed.

About

A Lua wrapper for the Monocypher crypto library

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published