crypto-api-0.10.2: A generic interface for cryptographic operations

Portabilityportable
Stabilitybeta
MaintainerThomas.DuBuisson@gmail.com
Safe HaskellSafe-Infered

Crypto.Modes

Contents

Description

Authors: Thomas DuBuisson, Francisco Blas Izquierdo Riera (klondike)

Generic mode implementations useable by any correct BlockCipher instance Be aware there are no tests for CFB mode yet. See Crypto.

Synopsis

Initialization Vector Type, Modifiers (for all ciphers, all modes that use IVs)

data IV k Source

Initilization Vectors for BlockCipher implementations (IV k) are used for various modes and guarrenteed to be blockSize bits long. The common ways to obtain an IV are to generate one (getIV or getIVIO) or to use one provided with the ciphertext (using the Serialize instance of IV).

zeroIV also exists and is of particular use for starting ctr mode with a fresh key.

Instances

Eq (IV k) 
Ord (IV k) 
Show (IV k) 
BlockCipher k => Serialize (IV k) 

getIV :: (BlockCipher k, CryptoRandomGen g) => g -> Either GenError (IV k, g)Source

Obtain an IV using the provided CryptoRandomGenerator.

getIVIO :: BlockCipher k => IO (IV k)Source

Obtain an IV using the system entropy (see Random)

zeroIV :: BlockCipher k => IV kSource

Obtain an IV made only of zeroes

incIV :: BlockCipher k => IV k -> IV kSource

Increase an IV by one. This is way faster than decoding, increasing, encoding

dblIV :: BlockCipher k => IV k -> IV kSource

Perform doubling as defined by the CMAC and SIV papers

Blockcipher modes. Names with a prime (') means strict, without a prime means lazy bytestrings.

ecb :: BlockCipher k => k -> ByteString -> ByteStringSource

Cook book mode - not really a mode at all. If you don't know what you're doing, don't use this mode^H^H^H^H library.

unEcb :: BlockCipher k => k -> ByteString -> ByteStringSource

ECB decrypt, complementary to ecb.

cbc :: BlockCipher k => k -> IV k -> ByteString -> (ByteString, IV k)Source

Cipher block chaining encryption for lazy bytestrings

unCbc :: BlockCipher k => k -> IV k -> ByteString -> (ByteString, IV k)Source

Cipher block chaining decryption for lazy bytestrings

cfb :: BlockCipher k => k -> IV k -> ByteString -> (ByteString, IV k)Source

Ciphertext feed-back encryption mode for lazy bytestrings (with s == blockSize)

unCfb :: BlockCipher k => k -> IV k -> ByteString -> (ByteString, IV k)Source

Ciphertext feed-back decryption mode for lazy bytestrings (with s == blockSize)

ofb :: BlockCipher k => k -> IV k -> ByteString -> (ByteString, IV k)Source

Output feedback mode for lazy bytestrings

unOfb :: BlockCipher k => k -> IV k -> ByteString -> (ByteString, IV k)Source

Output feedback mode for lazy bytestrings

ecb' :: BlockCipher k => k -> ByteString -> ByteStringSource

Like ecb but for strict bytestrings

unEcb' :: BlockCipher k => k -> ByteString -> ByteStringSource

Decryption complement to ecb'

cbc' :: BlockCipher k => k -> IV k -> ByteString -> (ByteString, IV k)Source

Cipher block chaining encryption mode on strict bytestrings

unCbc' :: BlockCipher k => k -> IV k -> ByteString -> (ByteString, IV k)Source

Cipher block chaining decryption for strict bytestrings

cfb' :: BlockCipher k => k -> IV k -> ByteString -> (ByteString, IV k)Source

Ciphertext feed-back encryption mode for strict bytestrings (with s == blockSize)

unCfb' :: BlockCipher k => k -> IV k -> ByteString -> (ByteString, IV k)Source

Ciphertext feed-back decryption mode for strict bytestrings (with s == blockSize)

ofb' :: BlockCipher k => k -> IV k -> ByteString -> (ByteString, IV k)Source

Output feedback mode for strict bytestrings

unOfb' :: BlockCipher k => k -> IV k -> ByteString -> (ByteString, IV k)Source

Output feedback mode for strict bytestrings

ctr :: BlockCipher k => (IV k -> IV k) -> k -> IV k -> ByteString -> (ByteString, IV k)Source

Counter mode for lazy bytestrings

unCtr :: BlockCipher k => (IV k -> IV k) -> k -> IV k -> ByteString -> (ByteString, IV k)Source

Counter mode for lazy bytestrings

ctr' :: BlockCipher k => (IV k -> IV k) -> k -> IV k -> ByteString -> (ByteString, IV k)Source

Counter mode for strict bytestrings

unCtr' :: BlockCipher k => (IV k -> IV k) -> k -> IV k -> ByteString -> (ByteString, IV k)Source

Counter mode for strict bytestrings

siv :: BlockCipher k => k -> k -> [ByteString] -> ByteString -> Maybe ByteStringSource

SIV (Synthetic IV) mode for lazy bytestrings. First argument is the optional list of bytestrings to be authenticated but not encrypted As required by the specification this algorithm may return nothing when certain constraints aren't met.

unSiv :: BlockCipher k => k -> k -> [ByteString] -> ByteString -> Maybe ByteStringSource

SIV (Synthetic IV) for lazy bytestrings. First argument is the optional list of bytestrings to be authenticated but not encrypted. As required by the specification this algorithm may return nothing when authentication fails.

siv' :: BlockCipher k => k -> k -> [ByteString] -> ByteString -> Maybe ByteStringSource

SIV (Synthetic IV) mode for strict bytestrings. First argument is the optional list of bytestrings to be authenticated but not encrypted. As required by the specification this algorithm may return nothing when certain constraints aren't met.

unSiv' :: BlockCipher k => k -> k -> [ByteString] -> ByteString -> Maybe ByteStringSource

SIV (Synthetic IV) for strict bytestrings First argument is the optional list of bytestrings to be authenticated but not encrypted As required by the specification this algorithm may return nothing when authentication fails.

Authentication modes

cbcMac' :: BlockCipher k => k -> ByteString -> ByteStringSource

Cipher block chaining message authentication

cbcMac :: BlockCipher k => k -> ByteString -> ByteStringSource

Cipher block chaining message authentication

cMac :: BlockCipher k => k -> ByteString -> ByteStringSource

Obtain the cmac for lazy bytestrings

cMac' :: BlockCipher k => k -> ByteString -> ByteStringSource

Obtain the cmac for strict bytestrings

Combined modes (nothing here yet)