libsodium-signcryption VS OpenSSL

Compare libsodium-signcryption vs OpenSSL and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
libsodium-signcryption OpenSSL
7 150
57 24,254
- 1.1%
0.0 9.9
3 months ago 3 days ago
C C
MIT License Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

libsodium-signcryption

Posts with mentions or reviews of libsodium-signcryption. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-31.
  • Macaroons Escalated Quickly
    4 projects | news.ycombinator.com | 31 Jan 2024
    I like the "solve the now" perspective here, and having code examples is very helpful to understand some of the rational behind the approach. Having read your previous "tedious survey"[0] post on various token formats, I generally agree with a lot of your conclusions. Curious though about your thought process wrt macaroons vs biscuits.

    To me the one major downside of macaroons has always been the single shared root symmetric key. Many use cases are addressed by third party attenuation, but then there are the problems like key rotation, having to do online verification, no built in encryption, no peer-to-peer support through an "untrusted" fly.io, and no third party token verification without decryption like in signcryption[1] schemes. Of course this is traded off by having to do PK issuance and management so I can see the simplicity of it.

    Is fly.io scoping this pretty hard to just auth tokens with third party attenuation, or do you see further development and maybe moving to other token systems like biscuit when/if the need arises to address those known issues?

    fwiw I've done a bit of research work myself on a token format using signcryption [2] where I explored addressing some of these ideas (but not the attenuation side of it yet, which I get is a big deal here).

    [0] https://fly.io/blog/api-tokens-a-tedious-survey/

    [1] https://github.com/jedisct1/libsodium-signcryption

    [2] https://github.com/michelp/pgsodium/blob/feat/signcryption-t...

  • Supabase secrets management available in beta
    6 projects | news.ycombinator.com | 16 Dec 2022
    You've hit the nail right on the head with this question on how hard group encryption is, and we don't have all the answers yet as we are still working the use cases around it. We are hoping to reach a level of security that you mention in your SE question using something similar to the excellent accepted answer, distributed private key sharing among trusted participants.

    The basis we are exploring is using an algorithm called Signcryption (https://github.com/jedisct1/libsodium-signcryption) that is already included in pgsodium. This doesn't solve any of the shared private key issues you mention above, but it is a useful foundation for distributing encrypted messages that separate out sender and receiver identifiers from their keys, a sort of lower level foundation on top of which distributed key sharing can occur.

    I also think signcryption is a great foundation for a better token format than JWT or PASETO, as it covers all of their use cases without algorithm confusion attacks (despite PASETO's insistence on "Algorithm Lucidity") and supports more features such as third party verification and streaming shared key generation from any token without having to exchange the key, we hope to use these tokens so that end-to-end peers can exchange tokens, derive streaming shared keys, and then do direct point-to-point message exchange using libsodium crypto_secretstream API which supports key ratcheting for forward secrecy.

    Would love to discuss more about your research with you and include it with attribution into our future work, send me an intro at [email protected] when any other ideas or resources you'd like us to see!

  • Age and Authenticated Encryption
    2 projects | news.ycombinator.com | 12 Oct 2022
    Another signcryption scheme as described in the article is also implemented by the libsodium author as an extension:

    https://github.com/jedisct1/libsodium-signcryption

    It's unclear from the article if this is the same algorithm age uses.

    Signcryption schemes are also a good candidate algorithm for replacing JWTs and PASETO as they suffer from no algorithm confusion, and don't need what PASETO calls "Algorithm Lucidity" and serve both plaintext authentication, authenticated encryption, sender receiver verification, and shared key generation that can be used for unlimited encrypted streaming, for example with libsodium's crypto_secretstream API.

    https://doc.libsodium.org/secret-key_cryptography/secretstre...

    https://github.com/paseto-standard/paseto-spec/blob/master/d...

  • Show HN: Pgsodium – A Crytographic PostgreSQL Extension
    4 projects | news.ycombinator.com | 10 Jan 2022
    * Support for [SignCryption](https://github.com/jedisct1/libsodium-signcryption) Sign & Encrypt identity verification. Signcryption goes beyond public key verification to provide identity verification, and negotiating a shared-secret key between two parties to use fast streaming encryption of the payload.
  • Pgsodium 2.0.0: Modern cryptography for PostgreSQL
    3 projects | news.ycombinator.com | 9 Jan 2022
    From Mike's comments on Reddit[0]

    pgsodium 2.0.0 is a postgres extension that uses the libsodium library to provide high-performance, modern cryptography support for PostgreSQL 10+.

    2.0.0 includes a ton of new feature and a few bug-fixes:

    * Support for XChaCha20-SIV[2] deterministic nonce-free encryption

    * Support for SignCryption[3] Sign & Encrypt identity verification

    * Key id support for HMACSHA 512/256, generichash, and shorthash

    * Support for low level XChaCha20 streaming[4]

    * More tests, docs, and small bug fixes in argument parsing

    * In-memory key now protected with sodium_malloc[5]

    [0] https://www.reddit.com/r/PostgreSQL/comments/s0b6o2/pgsodium...

    [1] https://doc.libsodium.org/

    [2] https://github.com/jedisct1/libsodium-xchacha20-siv

    [3] https://github.com/jedisct1/libsodium-signcryption

    [4] https://libsodium.gitbook.io/doc/advanced/stream_ciphers/xch...

    [5] https://libsodium.gitbook.io/doc/memory_management

  • pgsodium 2.0.0: Modern cryptography for PostgreSQL
    3 projects | /r/PostgreSQL | 9 Jan 2022
    Support for SignCryption Sign & Encrypt identity verification
  • Libsodium-Signcryption: Encrypt, Authenticate, and Sign with One Keypair
    1 project | news.ycombinator.com | 22 Dec 2021

OpenSSL

Posts with mentions or reviews of OpenSSL. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-04-26.
  • RVM Ruby 2.6.0 — built with custom openssl version on Ubuntu 22.04
    2 projects | dev.to | 26 Apr 2024
    ENV OPENSSL_PREFIX=/opt/openssl ENV SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt WORKDIR /tmp RUN git clone --branch OpenSSL_1_0_2n https://github.com/openssl/openssl.git RUN cd openssl RUN ./config shared --prefix=$OPENSSL_PREFIX --openssldir=$OPENSSL_PREFIX/ssl RUN make RUN make install RUN rvm install 2.6.0 -C --with-openssl-dir=$OPENSSL_PREFIX ENV PATH /usr/local/rvm/bin:$PATH RUN rvm --default use ruby-2.6.0 ENV PATH /usr/local/rvm/bin:/usr/local/rvm/rubies/ruby-2.6.0/bin:$PATH ENV GEM_HOME /usr/local/rvm/rubies/ruby-2.6.0/lib/ruby/gems/2.6.0
  • Heartbleed and XZ Backdoor Learnings: Open Source Infrastructure Can Be Improved Efficiently With Moderate Funding
    2 projects | dev.to | 7 Apr 2024
    Today, April 7th, 2024, marks the 10-year anniversary since CVE-2014-0160 was published. This security vulnerability known as "Heartbleed" was a flaw in the OpenSSL cryptography software, the most popular option to implement Transport Layer Security (TLS). In more layman's terms, if you type https:// in your browser address bar, chances are high that you are interacting with OpenSSL.
  • Ask HN: How does the xz backdoor replace RSA_public_decrypt?
    1 project | news.ycombinator.com | 1 Apr 2024
    At this point I pretty much understand the entire process on how the xz backdoor came to be: its execution stages, extraction from binary "test" files etc. But one thing puzzles me: how can the ifunc mechanism be used to replace something like RSA_public_decrypt? Granted this probably stems from my lack of understanding of ifunc, but I was under the impression that in order for the ifunc mechanism to work in your code, you have to explicitly mark specific function with multiple implementations with __attribute__ ((ifunc ("the_resolver_function"))). Looking at the source code of the RSA function in question, ifunc attribute isn't present:

    https://github.com/openssl/openssl/blob/master/crypto/rsa/rsa_crpt.c#L51

    So how does the backdoor actually replace the call? Does this means that the ifunc mechanism can be used to override pretty much anything on the system?

  • Use of HTTPS Resource Records
    1 project | news.ycombinator.com | 4 Jan 2024
    OpenSSL and Go crypt/tls has no support yet, so none of the webservers that depend on them support it. Apache, Nginx, and Caddy, they all need upstream ECH support first.

    - https://github.com/openssl/openssl/issues/7482

    - https://github.com/openssl/openssl/pull/22938

    - https://github.com/golang/go/issues/63369

  • openssl-3.2.0 released
    1 project | /r/linux | 25 Nov 2023
  • Large performance degradation in OpenSSL 3
    1 project | news.ycombinator.com | 6 Oct 2023
  • OpenSSL 3.2 Alpha 2
    1 project | news.ycombinator.com | 30 Sep 2023
  • Encrypted Client Hello – the last puzzle piece to privacy
    4 projects | news.ycombinator.com | 29 Sep 2023
    If I'm understanding the draft correctly, I think the webserver you're hosting your sites on would need it implemented as it requires private keys and ECH configuration. In the example of nginx since it uses openssl, openssl would need to implement it. I found an issue on their Github but it's still open: https://github.com/openssl/openssl/issues/7482
  • eBPF Practical Tutorial: Capturing SSL/TLS Plain Text Data Using uprobe
    3 projects | dev.to | 19 Sep 2023
  • OpenSSL Versions... whats the plan here
    1 project | /r/Ubuntu | 19 Aug 2023
    I confirmed that the systm was on 1.1.1f with openssl version command. Hmm...... I check the openssl version in the repo with apt list... LOL package names wernt helpful. finally went to the repo pages and found that its still on 1.1.1f, https://launchpad.net/ubuntu/+source/openssl. Meenwhile I looked up the version history on https://www.openssl.org/ and saw that 1.1.1v was released at the beginning of this month... ok. I can understand it it was out less then 30 days. I looked up when f came out, end of MARCH 2020. NEARLY 3-1/2 YEARS