GithubHelp home page GithubHelp logo

alexxnica / botan Goto Github PK

View Code? Open in Web Editor NEW

This project forked from randombit/botan

0.0 0.0 0.0 58.42 MB

Crypto and TLS for C++11

Home Page: https://botan.randombit.net

License: BSD 2-Clause "Simplified" License

Python 5.09% C 2.21% C++ 91.91% Emacs Lisp 0.03% HTML 0.01% Perl 0.40% XS 0.29% Batchfile 0.01% Shell 0.06%

botan's Introduction

Botan: Crypto and TLS for C++11

Botan (Japanese for peony) is a cryptography library written in C++11 and released under the permissive Simplified BSD license.

Botan's goal is to be the best option for cryptography in new C++ code by offering the tools necessary to implement a range of practical systems, such as TLS/DTLS, PKIX certificate handling, PKCS#11 and TPM hardware support, password hashing, and post quantum crypto schemes. In addition to the C++, botan has a C89 API specifically designed to be easy to call from other languages. A Python binding using ctypes calling the C89 API is included.

Find the full feature list below.

Development is coordinated on GitHub and contributions are welcome (read doc/contributing.rst for more info).

If you need help with a problem, please open an issue on GitHub or email the botan-devel mailing list.

New releases are announced on the botan-announce mailing list.

If you think you have found a security bug in Botan please contact Jack Lloyd by emailing [email protected]. His PGP public key with fingerprint 4E60C73551AF2188DF0A5A6278E9804357123B60 can can be found in doc/pgpkey.txt in the distribution, https://keybase.io/jacklloyd, and some public PGP key servers.

For all the details on building the library, read the users manual, but basically:

$ ./configure.py --help
$ ./configure.py [probably some options]
$ make
$ ./botan-test
# lots of output...
Tests all ok
$ ./botan
# shows available commands
$ make install

Botan can also be built into a single-file amalgamation for easy inclusion into external build systems, see the manual for details.

Travis CI status AppVeyor CI status Kullo CI status Code coverage report Coverity results Sonarqube analysis CII Best Practices statement

Release Downloads

See the release notes and security advisories

All releases are signed with a PGP key:

pub   2048R/EFBADFBC 2004-10-30
      Key fingerprint = 621D AF64 11E1 851C 4CF9  A2E1 6211 EBF1 EFBA DFBC
uid                  Botan Distribution Key

Some distributions such as Arch, Fedora and Debian include packages for Botan. However these are often out of date; using the latest source release is recommended.

Current Stable Release

Version 2 requires a C++11 compiler; GCC 4.8 and later, Clang 3.5 and later, and MSVC 2015 are regularly tested.

The latest 2.x release is 2.3.0 (sig) released on 2017-10-02

Old Stable Release

The 1.10 branch is the last version of the library written in C++98 and is still the most commonly packaged version. It is no longer supported except for critical security updates (with all support ending on 2018-1-1), and the developers do not recommend its use anymore.

The latest 1.10 release is 1.10.17 (sig) released on 2017-10-02

Find Enclosed

Transport Layer Security (TLS) Protocol

  • TLS v1.0, v1.1, and v1.2. The broken SSLv3 protocol is no longer supported.
  • DTLS v1.0 and v1.2 are adaptations of TLS to datagram operation.
  • Extensions include session tickets, SNI, ALPN, OCSP staple requests (client side only right now), encrypt-then-mac CBC, and extended master secret.
  • Supports authentication using preshared keys (PSK) or passwords (SRP)
  • Supports record encryption with ChaCha20Poly1305, AES/OCB, AES/GCM, AES/CCM, Camellia/GCM, and legacy CBC ciphersuites with AES, Camellia, SEED, or 3DES.
  • Key exchange using Diffie-Hellman, ECDH, RSA, or CECPQ1

Public Key Infrastructure

  • X.509v3 certificates and CRL creation and handling
  • PKIX certificate path validation, including name constraints.
  • OCSP request creation and response handling
  • PKCS #10 certificate request generation and processing
  • SQL database backed certificate store

Public Key Cryptography

  • RSA signatures and encryption
  • DH and ECDH key agreement
  • Signature schemes ECDSA, DSA, Ed25519, ECGDSA, ECKCDSA, SM2, and GOST 34.10-2001
  • Post-quantum signature scheme XMSS
  • Post-quantum key agreement schemes McEliece and NewHope
  • ElGamal encryption
  • Padding schemes OAEP, PSS, PKCS #1 v1.5, X9.31

Ciphers, hashes, MACs, and checksums

  • Authenticated cipher modes EAX, OCB, GCM, SIV, CCM, and ChaCha20Poly1305
  • Cipher modes CTR, CBC, XTS, CFB, and OFB
  • Block ciphers AES, ARIA, Blowfish, Camellia, CAST-128, CAST-256, DES/3DES, GOST 28147, IDEA, KASUMI, Lion, MISTY1, Noekeon, SEED, Serpent, SHACAL2, SM4, Threefish-512, Twofish, XTEA
  • Stream ciphers ChaCha20, Salsa20/XSalsa20, SHAKE-128, and RC4
  • Hash functions SHA-1, SHA-2, SHA-3, RIPEMD-160, Skein-512, BLAKE2b, SM3, Tiger, Whirlpool, GOST 34.11, MD5, MD4
  • Hash function combiners Parallel and Comb4P
  • Authentication codes HMAC, CMAC, Poly1305, SipHash, GMAC, CBC-MAC, X9.19 DES-MAC
  • Non-cryptographic checksums Adler32, CRC24, and CRC32

Other Useful Things

  • Full C++ PKCS #11 API wrapper
  • Interfaces for TPM v1.2 device access
  • Simple compression API wrapping zlib, bzip2, and lzma libraries
  • RNG wrappers for system RNG and hardware RNGs
  • HMAC_DRBG and entropy collection system for userspace RNGs
  • PBKDF2 password based key derivation
  • Password hashing function bcrypt and passhash9 (custom PBKDF scheme)
  • SRP-6a password authenticated key exchange
  • Key derivation functions including HKDF, KDF2, SP 800-108, SP 800-56A, SP 800-56C
  • HOTP and TOTP algorithms
  • Format preserving encryption scheme FE1
  • Threshold secret sharing
  • RFC 3394 AES key wrap

Recommended Algorithms

  • For encryption of network traffic use TLS v1.2
  • Packet encryption: AES-256/GCM, AES-256/OCB, Serpent/OCB, or ChaCha20Poly1305
  • General hash function: BLAKE2b, SHA-2, SHA-3, or Skein-512
  • Message authentication or PRF: HMAC with SHA-256
  • Key derivation function: KDF2 or HKDF
  • Public Key Encryption: RSA, 2048+ bit keys, with OAEP/SHA-256
  • Public Key Signatures: RSA, 2048+ bit keys with PSS/SHA-512, or ECDSA using P-256/SHA-256 or P-521/SHA-512
  • Key Agreement: ECDH using P-256 or X25519. If you are concerned about quantum computers, combine ECC with NewHope.

botan's People

Contributors

alonbl avatar bluerise avatar bluhm avatar bmburstein avatar cdesjardins avatar cynecx avatar danieltbrown avatar flanfly avatar fxdupont avatar jsonn avatar jurajsomorovsky avatar kriskwiatkowski avatar ksanderon avatar lanurmi avatar louiz avatar lowjoel avatar matejk avatar mgierlings avatar mouse07410 avatar naskata avatar neusdan avatar neverhub avatar nunojpg avatar phwork avatar randombit avatar reneme avatar securitykernel avatar tiwoc avatar webmaster128 avatar zgyarmati avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.