Không có mô tả

Kyle Fuller 77b2318146 [HMAC] Support SHA384 and SHA512 10 năm trước cách đây
CryptoSwift 77b2318146 [HMAC] Support SHA384 and SHA512 10 năm trước cách đây
CryptoSwift.xcodeproj ad13df968b [*] - Updatin settings 10 năm trước cách đây
CryptoSwiftTests 77b2318146 [HMAC] Support SHA384 and SHA512 10 năm trước cách đây
.gitignore 3df18d495e update .gitignore 10 năm trước cách đây
CryptoSwift.podspec 6a2770ed96 Updated PodSpec for IV Block Length Fix #35 10 năm trước cách đây
LICENSE 0c22922fb7 Some useful extensions for numbers and initial work of MD5 imlementation. 11 năm trước cách đây
README.md 7f8a765a22 [README.md] Switch back to “licence” 10 năm trước cách đây

README.md

#CryptoSwift Crypto related functions and helpers for Swift implemented in Swift. (#PureSwift)

##Requirements Good mood

##Features

  • Easy to use
  • Convenience extensions

###What implemented?

Hash

#####Cipher

#####Message authenticators

#####Cipher block mode

  • Electronic codebook (ECB)
  • Cipher-block chaining (CBC)
  • Cipher feedback (CFB)

#####Data padding

###Why Why? Because I can.

###Contribution

For latest version, please check develop branch. This is latest development version that will be merged into master branch at some point.

##Installation

To install CryptoSwift, add it as a submodule to your project (on the top level project directory):

git submodule add https://github.com/krzyzanowskim/CryptoSwift.git

Then, drag the CryptoSwift.xcodeproj file into your Xcode project, and add CryptoSwift.framework as a dependency to your target.

#####iOS and OSX By default project is setup for iOS. You need to switch to OSX SDK manually see #8

####CocoaPods

You can use CocoaPods. You need version 0.36 or newer to use Swift framework.

pod 'CryptoSwift'

##Usage

import CryptoSwift

Generally you should use CryptoSwift.Hash, CryptoSwift.Cipher enums or convenience extensions

Hash enum usage

/* Hash enum usage */
var data:NSData = NSData(bytes: [49, 50, 51] as [Byte], length: 3)
if let data = CryptoSwift.Hash.md5(data).calculate() {
    println(data.hexString)
}

Hashing a data

let hash = data.md5()
let hash = data.sha1()
let hash = data.sha224()
let hash = data.sha256()
let hash = data.sha384()
let hash = data.sha512()
	
let crc = data.crc32()

println(hash.hexString)

Hashing a String and printing result

if let hash = "123".md5() {
    println(hash)
}

Some content-encryption algorithms assume the input length is a multiple of k octets, where k is greater than one. For such algorithms, the input shall be padded.

let paddedData = PKCS7(data: dataToEncrypt).addPadding(AES.blockSizeBytes())

Working with Ciphers

ChaCha20

let chacha20Encrypted = Cipher.ChaCha20(key: keyData, iv: ivData).encrypt(dataToEncrypt)
let decryptedChaCha20 = Cipher.ChaCha20(key: keyData, iv: ivData).decrypt(encryptedData)

AES

Notice regarding padding: Manual padding of data is optional and CryptoSwift by default always will add PKCS7 padding before encryption, and remove after decryption when Cipher enum is used. If you need manually disable/enable padding, you can do this by setting parameter for encrypt()/decrypt() on class AES.

// 1. Add padding (Optional)
let plaintextData = PKCS7(data: plaintextData).addPadding(AES.blockSizeBytes())

// 2. Encrypt with key and random IV
let keyData = NSData.withBytes([0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00])
let ivData:NSData = Cipher.randomIV(keyData)

let encryptedData = Cipher.AES(key: keyData, iv: ivData, blockMode: .CBC).encrypt(plaintextData)
	
// 3. decrypt with key and IV
let decryptedData = Cipher.AES(key: keyData, iv: ivData, blockMode: .CBC).decrypt(encryptedData)
	
// 4. remove padding ONLY IF applied earlier (Optional)
let plaintextData = PKCS7(data: decryptedData).removePadding()	

AES without data padding

let aes = AES(key: keyData, iv: ivData, blockMode: .CBC) // CBC is default
let encryptedData = aes?.encrypt(plaintextData, addPadding: false)
let decryptedData = aes?.decrypt(encryptedData, removePadding: false)

Using extensions

// convenience setup tuple
let setup = (key: keyData, iv: ivData)

let encrypted = dataToEncrypt.encrypt(Cipher.ChaCha20(setup))
let decrypted = encrypted.decrypt(Cipher.ChaCha20(setup))

Message authenticators

// Calculate Message Authentication Code (MAC) for message
let mac = Authenticator.Poly1305(key: key).authenticate(message)

##Contact Marcin Krzyżanowski @krzyzanowskim

##Licence

Copyright (C) 2014 Marcin Krzyżanowski marcin.krzyzanowski@gmail.com This software is provided 'as-is', without any express or implied warranty.

In no event will the authors be held liable for any damages arising from the use of this software.

Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:

  • The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.
  • Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.
  • This notice may not be removed or altered from any source or binary distribution.