Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/pedroalbanese/xoodyak
Lightweight, versatile, cryptographic scheme suitable in constrained environments
https://github.com/pedroalbanese/xoodyak
aead-authenticated-cryptography-mac message-digest-algorithm symmetric-encryption xoodoo xoodyak
Last synced: about 1 month ago
JSON representation
Lightweight, versatile, cryptographic scheme suitable in constrained environments
- Host: GitHub
- URL: https://github.com/pedroalbanese/xoodyak
- Owner: pedroalbanese
- License: isc
- Created: 2022-12-06T20:30:13.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2023-08-11T19:27:25.000Z (over 1 year ago)
- Last Synced: 2024-06-20T10:13:39.263Z (6 months ago)
- Topics: aead-authenticated-cryptography-mac, message-digest-algorithm, symmetric-encryption, xoodoo, xoodyak
- Language: Go
- Homepage: http://albanese.atwebpages.com
- Size: 51.8 KB
- Stars: 3
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE.md
Awesome Lists containing this project
README
# Xoodyak Tools
[![ISC License](http://img.shields.io/badge/license-ISC-blue.svg)](https://github.com/pedroalbanese/xoodyak/blob/master/LICENSE.md)
[![GoDoc](https://godoc.org/github.com/pedroalbanese/xoodyak?status.png)](http://godoc.org/github.com/pedroalbanese/xoodyak)
[![GitHub downloads](https://img.shields.io/github/downloads/pedroalbanese/xoodyak/total.svg?logo=github&logoColor=white)](https://github.com/pedroalbanese/xoodyak/releases)
[![GitHub release (latest by date)](https://img.shields.io/github/v/release/pedroalbanese/xoodyak)](https://github.com/pedroalbanese/xoodyak/releases)[Xoodyak](https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/Xoodyak-spec-round2.pdf) is a lightweight, versatile, cryptographic scheme suitable in constrained environments. It can be used for hashing, encryption, MAC computation and authenticated encryption.
Xoodyak builds upon the Xoodoo permutations and the duplex construction.
### Xoodyak AEAD Encryption Tool
Usage of xoodyak:
xoodyak [-d] -p "pass" [-i N] [-s "salt"] -f <file.ext>
-a string
Additional Associated data.
-d Decrypt instead of Encrypt.
-f string
Target file. ('-' for STDIN)
-h HMAC-based key derivation function.
-i int
Iterations. (for PBKDF2) (default 1024)
-k string
128-bit key to Encrypt/Decrypt.
-p string
Password-based key derivation function.
-r Generate random 128-bit cryptographic key.
-s string
Salt. (for PBKDF2)### Xoodyak Recursive Hasher
Usage of xoodyaksum:
xoodyaksum [-c <hash.ext>] [-r] <file.ext>
-c string
Check hashsum file.
-r Process directories recursively.### Xoodyak MAC
Usage of xoodyakmac:
xoodyakmac [-k <secret>] -f <file.ext>
-f string
Target file. ('-' for STDIN)
-k string
Secret key.## License
This project is licensed under the ISC License.
##### Industrial-Grade Reliability. Copyright (c) 2020-2023 ALBANESE Research Lab.