essie-tls-rs
By leonhard-llc
ct-fuzz
By michael-emmi
essie-tls-rs | ct-fuzz | |
---|---|---|
1 | 1 | |
- | 9 | |
- | - | |
- | 1.8 | |
- | over 3 years ago | |
C++ | ||
- | GNU General Public License v3.0 or later |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
essie-tls-rs
Posts with mentions or reviews of essie-tls-rs.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-01-04.
-
What's everyone working on this week (1/2021)?
This week I started writing a safe TLS library for it, called Essie TLS. I read a lot and found that constant-time Rust code requires unsafe. So my plan is to use a delay timer to avoid leaking secrets via timing side-channels. This will make TLS handshakes a little bit slower. Writing a TLS library is a lot of work. TLS 1.3 is very complicated and spans about 200 pages of RFCs. But the tools are working very nicely: Rust stable, CLion, and Gitlab.com.
ct-fuzz
Posts with mentions or reviews of ct-fuzz.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-01-04.
-
What's everyone working on this week (1/2021)?
Useful information I found on this topic: - Rust RFC 2533: Keeping Secrets in Rust - Variable-time multiplication attacked - subtle crate tries to proved constant-time data types - secrets crate zeros dropped secrets and prevents swapping secrets to disk. It uses the libsodium C library. - ct-fuzz can detect timing leaks in constant-time code. - Eliminating Timing Side-Channel Leaks using Program Repair, research paper, code not available - Timing Attacks and Countermeasures. Peter Schwabe. 2016.
What are some alternatives?
When comparing essie-tls-rs and ct-fuzz you can also consider the following projects:
rust-socketio - An implementation of a socket.io client written in the Rust programming language.
iai - Experimental one-shot benchmarking/profiling harness for Rust
gattii
fingine - A personal finance simulation engine in Rust.
chronoutil - ChronoUtil module provides powerful extensions to rust's Chrono crate.
scribble - An experimental terminal text-editor written in Rust. ⚠️
pilka - Another live-coding tool for creating shader demos, Vulkan+Wgpu powered.