139 lines
5.7 KiB
Rust
139 lines
5.7 KiB
Rust
//! [](https://crates.io/crates/double-ratchet-2)
|
|
//! [](https://github.com/Decentrailzed-Communication-System/double-ratchet-2/blob/main/LICENSE)
|
|
//! [](https://github.com/Decentrailzed-Communication-System/double-ratchet-2/actions)
|
|
//!
|
|
//! Implementation of the double ratchet system/encryption as specified by [Signal][1].
|
|
//!
|
|
//! The implementation follows the cryptographic recommendations provided by [Signal][2].
|
|
//! The AEAD Algorithm uses a constant Nonce. This might be changed in the future.
|
|
//!
|
|
//! # Example Usage:
|
|
//!
|
|
//! ## Standard:
|
|
//! ```
|
|
//! use double_ratchet_2::ratchet::Ratchet;
|
|
//!
|
|
//! let sk = [1; 32]; // Initial Key created by a symmetric key agreement protocol
|
|
//! let (mut bob_ratchet, public_key) = Ratchet::init_bob(sk); // Creating Bobs Ratchet (returns Bobs PublicKey)
|
|
//! let mut alice_ratchet = Ratchet::init_alice(sk, public_key); // Creating Alice Ratchet with Bobs PublicKey
|
|
//! let data = b"Hello World".to_vec(); // Data to be encrypted
|
|
//!
|
|
//! let (header, encrypted, nonce) = alice_ratchet.ratchet_encrypt(&data); // Encrypting message with Alice Ratchet (Alice always needs to send the first message)
|
|
//! let decrypted = bob_ratchet.ratchet_decrypt(&header, &encrypted, &nonce); // Decrypt message with Bobs Ratchet
|
|
//! assert_eq!(data, decrypted)
|
|
//! ```
|
|
//!
|
|
//! ## With lost message:
|
|
//! ```
|
|
//! # use double_ratchet_2::ratchet::Ratchet;
|
|
//!
|
|
//! let sk = [1; 32]; // Initial Key created by a symmetric key agreement protocol
|
|
//! let (mut bob_ratchet, public_key) = Ratchet::init_bob(sk); // Creating Bobs Ratchet (returns Bobs PublicKey)
|
|
//! let mut alice_ratchet = Ratchet::init_alice(sk, public_key); // Creating Alice Ratchet with Bobs PublicKey
|
|
//! let data = b"Hello World".to_vec(); // Data to be encrypted
|
|
//!
|
|
//! let (header1, encrypted1, nonce1) = alice_ratchet.ratchet_encrypt(&data); // Lost message
|
|
//! let (header2, encrypted2, nonce2) = alice_ratchet.ratchet_encrypt(&data); // Successful message
|
|
//!
|
|
//! let decrypted2 = bob_ratchet.ratchet_decrypt(&header2, &encrypted2, &nonce2); // Decrypting second message first
|
|
//! let decrypted1 = bob_ratchet.ratchet_decrypt(&header1, &encrypted1, &nonce1); // Decrypting latter message
|
|
//!
|
|
//! let comp = decrypted1 == data && decrypted2 == data;
|
|
//! assert!(comp);
|
|
//! ```
|
|
//!
|
|
//! ## Encryption before recieving inital message
|
|
//!
|
|
//! ```should_panic
|
|
//! use double_ratchet_2::ratchet::Ratchet;
|
|
//! let sk = [1; 32];
|
|
//!
|
|
//! let (mut bob_ratchet, _) = Ratchet::init_bob(sk);
|
|
//! let data = b"Hello World".to_vec();
|
|
//!
|
|
//! let (_, _, _) = bob_ratchet.ratchet_encrypt(&data);
|
|
//! ```
|
|
//!
|
|
//! ## Encryption after recieving initial message
|
|
//! However bob can (of course) also encrypt messages. This is possible, after decrypting the first message from alice.
|
|
//!
|
|
//! ```
|
|
//! use double_ratchet_2::ratchet::Ratchet;
|
|
//! let sk = [1; 32];
|
|
//!
|
|
//! let (mut bob_ratchet, public_key) = Ratchet::init_bob(sk);
|
|
//! let mut alice_ratchet = Ratchet::init_alice(sk, public_key);
|
|
//!
|
|
//! let data = b"Hello World".to_vec();
|
|
//!
|
|
//! let (header1, encrypted1, nonce1) = alice_ratchet.ratchet_encrypt(&data);
|
|
//! let _decrypted1 = bob_ratchet.ratchet_decrypt(&header1, &encrypted1, &nonce1);
|
|
//!
|
|
//! let (header2, encrypted2, nonce2) = bob_ratchet.ratchet_encrypt(&data);
|
|
//! let decrypted2 = alice_ratchet.ratchet_decrypt(&header2, &encrypted2, &nonce2);
|
|
//!
|
|
//! assert_eq!(data, decrypted2);
|
|
//! ```
|
|
//! ## Constructing and Deconstructing Headers
|
|
//!
|
|
//! ```
|
|
//! # use double_ratchet_2::ratchet::Ratchet;
|
|
//! # use double_ratchet_2::header::Header;
|
|
//! # let sk = [1; 32];
|
|
//! # let (mut bob_ratchet, public_key) = Ratchet::init_bob(sk);
|
|
//! # let mut alice_ratchet = Ratchet::init_alice(sk, public_key);
|
|
//! # let data = b"hello World".to_vec();
|
|
//! # let (header, _, _) = alice_ratchet.ratchet_encrypt(&data);
|
|
//! let header_bytes: Vec<u8> = header.clone().into();
|
|
//! let header_const = Header::from(header_bytes);
|
|
//! assert_eq!(header, header_const);
|
|
//! ```
|
|
//!
|
|
//! # Example Ratchet with encrypted headers
|
|
//!
|
|
//! ```
|
|
//! use double_ratchet_2::ratchet::RatchetEncHeader;
|
|
//! let sk = [0; 32];
|
|
//! let shared_hka = [1; 32];
|
|
//! let shared_nhkb = [2; 32];
|
|
//!
|
|
//! let (mut bob_ratchet, public_key) = RatchetEncHeader::init_bob(sk, shared_hka, shared_nhkb);
|
|
//! let mut alice_ratchet = RatchetEncHeader::init_alice(sk, public_key, shared_hka, shared_nhkb);
|
|
//! let data = b"Hello World".to_vec();
|
|
//!
|
|
//! let (header, encrypted, nonce) = alice_ratchet.ratchet_encrypt(&data);
|
|
//! let decrypted = bob_ratchet.ratchet_decrypt(&header, &encrypted, &nonce);
|
|
//! assert_eq!(data, decrypted)
|
|
//! ```
|
|
//!
|
|
//! # Features
|
|
//!
|
|
//! Currently the crate only supports one feature: ring. If feature is enabled the crate switches
|
|
//! to ring-compat and uses ring as backend for Sha512 Hashing. May result in slightly better performance.
|
|
//!
|
|
//!
|
|
//! TODO:
|
|
//! - [x] Standard Double Ratchet
|
|
//! - [x] [Double Ratchet with encrypted headers][3]
|
|
//!
|
|
//! [1]: https://signal.org/docs/specifications/doubleratchet/
|
|
//! [2]: https://signal.org/docs/specifications/doubleratchet/#recommended-cryptographic-algorithms
|
|
//! [3]: https://signal.org/docs/specifications/doubleratchet/#double-ratchet-with-header-encryption
|
|
|
|
#![no_std]
|
|
#![allow(stable_features)]
|
|
|
|
extern crate alloc;
|
|
|
|
pub use x25519_dalek::PublicKey;
|
|
|
|
mod aead;
|
|
mod dh;
|
|
mod kdf_root;
|
|
mod kdf_chain;
|
|
|
|
pub mod ratchet;
|
|
|
|
/// Message Header
|
|
pub mod header;
|
|
|