We wanted to be able to write Javascript that used crypto on both the client and the server but we did not want to rely on Javascript implementations of crypto. The only native cryptography available in browser is Web Crypto, this resulted in us creating a node-webcrypto-ossl
a native polyfill for WebCrypto based on OpenSSL.
At this time this solution should be considered suitable for research and experimentation, further code and security review is needed before utilization in a production application.
npm install node-webcrypto-ossl;
git clone https://github.com/PeculiarVentures/node-webcrypto-ossl
cd node-webcrypto-ossl
npm install
mocha
Algorithm name | generateKey | digest | export/import | sign/verify | encrypt/decrypt | wrapKey/unwrapKey | derive |
---|---|---|---|---|---|---|---|
SHA-1 | X | ||||||
SHA-256 | X | ||||||
SHA-384 | X | ||||||
SHA-512 | X | ||||||
RSASSA-PKCS1-v1_5 | X | X | X | ||||
RSA-PSS | X | X | X | ||||
RSA-OAEP | X | X | X | X | |||
AES-CBC | X | X | X | X | |||
AES-CTR | X | X | X | X | |||
AES-ECB 2 | X | X | X | X | |||
AES-GCM | X | X | X | X | |||
AES-KW | X | X | X | ||||
AES-CMAC | X | X | X | ||||
ECDSA | X | X | X | ||||
ECDH | X | X | X | ||||
HMAC | X | X | X | ||||
PBKDF2 | X | X | |||||
DES-CBC | X | X | X | X | |||
DES-EDE3-CBC | X | X | X | X |
2 ECB support is not defined by the WebCrypto specifications. Use of ECB in a safe way is hard, it was added for the purpose of enabling interoperability with an existing system. We recommend against its use unless needed for interoperability.
const { Crypto } = require("node-webcrypto-ossl");
const crypto = new Crypto();
secp256k1
curve is not defined by the WebCrypto specifications. This module implements K-256
curve for ECDSA algorithm.
To use KeyStorage you should init WebCrypto with directory
option. If directory
option is missing then keyStorage
is null
const { Crypto } = require("node-webcrypto-ossl");
const crypto = new Crypto({
directory: "key_storage"
})
KeyStorage implements interface of W3 Storage
var keyStorage = webcrypto.keyStorage;
// generating RSA key
crypto.subtle.generateKey({
name: "RSASSA-PKCS1-v1_5",
modulusLength: 1024,
publicExponent: new Uint8Array([1, 0, 1]),
hash: {
name: "SHA-1"
}
},
false,
["sign", "verify"]
)
.then(function(keyPairs){
/**
* saving private RSA key to KeyStorage
* creates file ./key_storage/prvRSA-1024.json
*/
keyStorage.setItem("prvRSA-1024", keyPairs.privateKey);
})
To get key from KeyStorage
var rsaKey = webcrypto.keyStorage.getItem("prvRSA-1024");
The threat model is defined in terms of what each possible attacker can achieve.
TODO: ADD ASSUMPTIONS
TODO: ADD THREATS FROM NODE-WEBCRYPTO-OSSL DEFECT
TODO: ADD THREATS FROM WEAK CRYPTOGRAPHY
TODO: ADD THREATS FOR IMPROPER USE OF CRYPTOGRAPHY
Please report bugs either as pull requests or as issues in the issue tracker. node-webcrypto-ossl has a full disclosure vulnerability policy. Please do NOT attempt to report any security vulnerability in this code privately to anybody.