RustCrypto VS mundane

Compare RustCrypto vs mundane and see what are their differences.

RustCrypto

Authenticated Encryption with Associated Data Algorithms: high-level encryption ciphers (by RustCrypto)

mundane

Mundane is a Rust cryptography library backed by BoringSSL that is difficult to misuse, ergonomic, and performant (in that order). (by google)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
RustCrypto mundane
10 4
641 1,069
3.3% 0.4%
7.6 0.0
4 days ago 10 months ago
Rust Rust
MIT License MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

RustCrypto

Posts with mentions or reviews of RustCrypto. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-06-03.

mundane

Posts with mentions or reviews of mundane. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-08-05.
  • Crates for helping with C FFI?
    1 project | /r/rust | 25 Oct 2022
    I'm the author of Mundane, which wraps BoringSSL, which is written in C. We have some internal utilities which make it safer to work with C objects by doing a certain amount of automatic memory management and lifecycle tracking.
  • SAML Is Insecure by Design
    5 projects | news.ycombinator.com | 5 Aug 2021
    Most problems with security specs and libraries that implement them are communication problems. They involve people incompletely describing or understanding their requirements, capabilities, or threat model. Usually this also involves providing/using interfaces that are not ergonomic (https://github.com/google/mundane/blob/master/DESIGN.md), which in turn comes from the spec trying to do too much (as XML Signature does).

    I don't know how GPT could help with that. If anything I would expect it to bias toward things it has already seen, which is the opposite of what you want when writing a new spec/library aiming to avoid past mistakes.

  • Void Linux: "Switching back to OpenSSL"
    2 projects | /r/linux | 28 Feb 2021
    I'm quite intrigued by mundane which is cryptography library with a Rust interface that contains lots of code from OpenSSL (via BoringSSL, which is a fork of OpenSSL).
  • How to implement a simple password-based encryption with ring?
    5 projects | /r/rust | 21 Jan 2021
    (https://sequoia-pgp.org/, https://github.com/google/mundane, etc)

What are some alternatives?

When comparing RustCrypto and mundane you can also consider the following projects:

ring - Safe, fast, small crypto using Rust

saml-idp - Simple SAML Identity Provider (IdP)

rustls - A modern TLS library in Rust

shib-sp - Containerized Shibboleth SP

sodiumoxide - [DEPRECATED] Sodium Oxide: Fast cryptographic library for Rust (bindings to libsodium)

ASP.NET SAML - Very simple SAML 2.0 consumer module for ASP.NET/C#

rust-crypto - A (mostly) pure-Rust implementation of various cryptographic algorithms.

orion - Usable, easy and safe pure-Rust crypto [Moved to: https://github.com/orion-rs/orion]

rage - A simple, secure and modern file encryption tool (and Rust library) with small explicit keys, no config options, and UNIX-style composability.

Ockam - Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale.

fusionauth-samlv2 - SAML v2.0 bindings in Java using JAXB