/pbcs

Primary LanguageElixirApache License 2.0Apache-2.0

PBCS

Hex version Build Status

The PBCS library securely protects secrets using passwords by following the style and recommendations in PKCS #5 2.1. As in PKCS #5, this library uses a salt to protect against dictionary attacks and iterates the key derivation function to increase the computation cost of attacks. These parameters and the cryptographic algorithms used are configurable.

Key derivation algorithms include:

Content encryption algorithms include:

  • A256GCM, A192GCM, A128GCM - AES GCM. See RFC 7518 5.3
  • A256CBC-HS512, A192CBC-HS384, A128CBC-HS256 - AES_CBC_HMAC_SHA2. See RFC 7518 5.2.6

Usage

protected = %{
  alg: "PBES2-HS512",
  enc: "A256GCM",
  p2c: 4096,
  p2s: :crypto.strong_rand_bytes(32)
}

tag = "ARBITRARY_TAG"

cipher_text = PBCS.encrypt({tag, "Text to encrypt"}, protected, password: "12345")
{:ok, "Text to encrypt"} = PBCS.decrypt({tag, cipher_text}, password: "12345")