The cipher-aes package

[Tags: bsd3, library]

Fast AES cipher implementation with advanced mode of operations.

The modes of operations available are ECB (Electronic code book), CBC (Cipher block chaining), CTR (Counter), XTS (XEX with ciphertext stealing), GCM (Galois Counter Mode).

The AES implementation uses AES-NI when available (on x86 and x86-64 architecture), but fallback gracefully to a software C implementation.

The software implementation uses S-Boxes, which might suffer for cache timing issues. However do notes that most other known software implementations, including very popular one (openssl, gnutls) also uses similar implementation. If it matters for your case, you should make sure you have AES-NI available, or you'll need to use a different implementation.


Properties

Versions0.1.0, 0.1.1, 0.1.2, 0.1.3, 0.1.4, 0.1.5, 0.1.6, 0.1.7, 0.1.8, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.2.5, 0.2.6, 0.2.7, 0.2.8
Dependenciesbase (==4.*), byteable, bytestring, crypto-cipher-types (>=0.0.6 && <0.1), securemem (>=0.1.2)
LicenseBSD3
CopyrightVincent Hanquez <vincent@snarc.org>
AuthorVincent Hanquez <vincent@snarc.org>
MaintainerVincent Hanquez <vincent@snarc.org>
CategoryCryptography
Home pagehttp://github.com/vincenthz/hs-cipher-aes
Source repositoryhead: git clone git://github.com/vincenthz/hs-cipher-aes
Upload dateMon Jun 30 16:50:23 UTC 2014
Uploaded byVincentHanquez
DistributionsDebian:0.2.8, FreeBSD:0.1.8, NixOS:0.2.8
Downloads68544 total (8718 in last 30 days)

Modules

[Index]

Flags

NameDescriptionDefault
support_aesniallow compilation with AESNI on system and architecture that supports itEnabled

Use -f <flag> to enable a flag, or -f -<flag> to disable that flag. More info

Downloads

Maintainers' corner

For package maintainers and hackage trustees