ct-fuzz VS essie-tls-rs

Compare ct-fuzz vs essie-tls-rs and see what are their differences.

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
ct-fuzz essie-tls-rs
1 1
9 -
- -
1.8 -
over 3 years ago -
C++
GNU General Public License v3.0 or later -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

ct-fuzz

Posts with mentions or reviews of ct-fuzz. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-01-04.
  • What's everyone working on this week (1/2021)?
    12 projects | /r/rust | 4 Jan 2021
    Useful information I found on this topic: - Rust RFC 2533: Keeping Secrets in Rust - Variable-time multiplication attacked - subtle crate tries to proved constant-time data types - secrets crate zeros dropped secrets and prevents swapping secrets to disk. It uses the libsodium C library. - ct-fuzz can detect timing leaks in constant-time code. - Eliminating Timing Side-Channel Leaks using Program Repair, research paper, code not available - Timing Attacks and Countermeasures. Peter Schwabe. 2016.

essie-tls-rs

Posts with mentions or reviews of essie-tls-rs. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-01-04.
  • What's everyone working on this week (1/2021)?
    12 projects | /r/rust | 4 Jan 2021
    This week I started writing a safe TLS library for it, called Essie TLS. I read a lot and found that constant-time Rust code requires unsafe. So my plan is to use a delay timer to avoid leaking secrets via timing side-channels. This will make TLS handshakes a little bit slower. Writing a TLS library is a lot of work. TLS 1.3 is very complicated and spans about 200 pages of RFCs. But the tools are working very nicely: Rust stable, CLion, and Gitlab.com.

What are some alternatives?

When comparing ct-fuzz and essie-tls-rs you can also consider the following projects:

rust-socketio - An implementation of a socket.io client written in the Rust programming language.

gattii

iai - Experimental one-shot benchmarking/profiling harness for Rust

chronoutil - ChronoUtil module provides powerful extensions to rust's Chrono crate.

fingine - A personal finance simulation engine in Rust.

pilka - Another live-coding tool for creating shader demos, Vulkan+Wgpu powered.

scribble - An experimental terminal text-editor written in Rust. ⚠️

bfc-rs - Brainfuck compiler for x86-64 Linux implemented in Rust.