cipher-aes: Fast AES cipher implementation with advanced mode of operations
Fast AES cipher implementation with advanced mode of operations.
The modes of operations available are ECB (Electronic code book), CBC (Cipher block chaining), CTR (Counter), XTS (XEX with ciphertext stealing), GCM (Galois Counter Mode).
The AES implementation uses AES-NI when available (on x86 and x86-64 architecture), but fallback gracefully to a software C implementation.
The software implementation uses S-Boxes, which might suffer for cache timing issues. However do notes that most other known software implementations, including very popular one (openssl, gnutls) also uses similar implementation. If it matters for your case, you should make sure you have AES-NI available, or you'll need to use a different implementation.
|Versions [faq]||0.1.0, 0.1.1, 0.1.2, 0.1.3, 0.1.4, 0.1.5, 0.1.6, 0.1.7, 0.1.8, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.2.5, 0.2.6, 0.2.7, 0.2.8, 0.2.9, 0.2.10, 0.2.11|
|Dependencies||base (==4.*), byteable, bytestring, crypto-cipher-types (>=0.0.6 && <0.1), securemem (>=0.1.2) [details]|
|Copyright||Vincent Hanquez <email@example.com>|
|Author||Vincent Hanquez <firstname.lastname@example.org>|
|Maintainer||Vincent Hanquez <email@example.com>|
|Source repo||head: git clone https://github.com/vincenthz/hs-cipher-aes|
|Uploaded||by VincentHanquez at Sun Jun 21 12:13:54 UTC 2015|
|Distributions||Arch:0.2.11, Debian:0.2.11, Fedora:0.2.11, FreeBSD:0.2.11, LTSHaskell:0.2.11, NixOS:0.2.11, Stackage:0.2.11|
|Downloads||115421 total (494 in the last 30 days)|
|Rating||(no votes yet) [estimated by rule of succession]|
Docs available [build log]
Last success reported on 2015-06-21 [all 1 reports]
allow compilation with AESNI on system and architecture that supports it
Use -f <flag> to enable a flag, or -f -<flag> to disable that flag. More info
For package maintainers and hackage trustees