mundane VS orion

Compare mundane vs orion and see what are their differences.

mundane

Mundane is a Rust cryptography library backed by BoringSSL that is difficult to misuse, ergonomic, and performant (in that order). (by google)

orion

Usable, easy and safe pure-Rust crypto [Moved to: https://github.com/orion-rs/orion] (by brycx)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
mundane orion
4 5
1,070 236
0.4% -
0.0 6.6
10 months ago about 3 years ago
Rust Rust
MIT License MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

mundane

Posts with mentions or reviews of mundane. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-08-05.
  • Crates for helping with C FFI?
    1 project | /r/rust | 25 Oct 2022
    I'm the author of Mundane, which wraps BoringSSL, which is written in C. We have some internal utilities which make it safer to work with C objects by doing a certain amount of automatic memory management and lifecycle tracking.
  • SAML Is Insecure by Design
    5 projects | news.ycombinator.com | 5 Aug 2021
    Most problems with security specs and libraries that implement them are communication problems. They involve people incompletely describing or understanding their requirements, capabilities, or threat model. Usually this also involves providing/using interfaces that are not ergonomic (https://github.com/google/mundane/blob/master/DESIGN.md), which in turn comes from the spec trying to do too much (as XML Signature does).

    I don't know how GPT could help with that. If anything I would expect it to bias toward things it has already seen, which is the opposite of what you want when writing a new spec/library aiming to avoid past mistakes.

  • Void Linux: "Switching back to OpenSSL"
    2 projects | /r/linux | 28 Feb 2021
    I'm quite intrigued by mundane which is cryptography library with a Rust interface that contains lots of code from OpenSSL (via BoringSSL, which is a fork of OpenSSL).
  • How to implement a simple password-based encryption with ring?
    5 projects | /r/rust | 21 Jan 2021
    (https://sequoia-pgp.org/, https://github.com/google/mundane, etc)

orion

Posts with mentions or reviews of orion. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-03-28.

What are some alternatives?

When comparing mundane and orion you can also consider the following projects:

saml-idp - Simple SAML Identity Provider (IdP)

ring - Safe, fast, small crypto using Rust

RustCrypto - Authenticated Encryption with Associated Data Algorithms: high-level encryption ciphers

rust-djangohashers - A Rust port of the password primitives used in Django Project.

shib-sp - Containerized Shibboleth SP

rust-crypto - A (mostly) pure-Rust implementation of various cryptographic algorithms.

ASP.NET SAML - Very simple SAML 2.0 consumer module for ASP.NET/C#

rage - A simple, secure and modern file encryption tool (and Rust library) with small explicit keys, no config options, and UNIX-style composability.

octavo - Highly modular & configurable hash & crypto library

fusionauth-samlv2 - SAML v2.0 bindings in Java using JAXB

suruga - [INACTIVE] TLS 1.2 implementation in Rust