containerd/vendor/github.com/miscreant/miscreant-go
Stefan Berger 30c3443947 Add crypto dependencies/vendoring
Signed-off-by: Stefan Berger <stefanb@linux.vnet.ibm.com>
2019-07-17 15:19:28 -04:00
..
block Add crypto dependencies/vendoring 2019-07-17 15:19:28 -04:00
cmac Add crypto dependencies/vendoring 2019-07-17 15:19:28 -04:00
pmac Add crypto dependencies/vendoring 2019-07-17 15:19:28 -04:00
aead.go Add crypto dependencies/vendoring 2019-07-17 15:19:28 -04:00
LICENSE.txt Add crypto dependencies/vendoring 2019-07-17 15:19:28 -04:00
README.md Add crypto dependencies/vendoring 2019-07-17 15:19:28 -04:00
siv.go Add crypto dependencies/vendoring 2019-07-17 15:19:28 -04:00
stream.go Add crypto dependencies/vendoring 2019-07-17 15:19:28 -04:00

miscreant.go Build Status GoDoc Go Report Card MIT licensed Gitter Chat

The best crypto you've never heard of, brought to you by Phil Rogaway

Go implementation of Miscreant: Advanced symmetric encryption library which provides the AES-SIV (RFC 5297), AES-PMAC-SIV, and STREAM constructions. These algorithms are easy-to-use (or rather, hard-to-misuse) and support encryption of individual messages or message streams.

import "github.com/miscreant/miscreant-go"

All types are designed to be thread-compatible: Methods of an instance shared between multiple threads (or goroutines) must not be accessed concurrently. Callers are responsible for implementing their own mutual exclusion.

About AES-SIV and AES-PMAC-SIV

AES-SIV and AES-PMAC-SIV provide nonce-reuse misuse-resistance (NRMR): accidentally reusing a nonce with this construction is not a security catastrophe, unlike more popular AES encryption modes like AES-GCM where nonce reuse leaks both the authentication key and the XOR of both plaintexts, both of which can potentially be leveraged for full plaintext recovery attacks.

With AES-SIV, the worst outcome of reusing a nonce is an attacker can see you've sent the same plaintext twice, as opposed to almost all other AES modes where it can facilitate chosen ciphertext attacks and/or full plaintext recovery.

Help and Discussion

Have questions? Want to suggest a feature or change?

Security Notice

Though this library is written by cryptographic professionals, it has not undergone a thorough security audit, and cryptographic professionals are still humans that make mistakes.

This library makes an effort to use constant time operations throughout its implementation, however actual constant time behavior has not been verified.

Use this library at your own risk.

Code of Conduct

We abide by the Contributor Covenant and ask that you do as well.

For more information, please see CODE_OF_CONDUCT.md.

Contributing

Bug reports and pull requests are welcome on GitHub at:

https://github.com/miscreant/miscreant-go

Copyright (c) 2017-2018 The Miscreant Developers. See LICENSE.txt for further details.