pgsodium VS libsodium-signcryption

Compare pgsodium vs libsodium-signcryption and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
pgsodium libsodium-signcryption
15 7
509 57
- -
4.4 0.0
10 days ago 3 months ago
C C
GNU General Public License v3.0 or later MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

pgsodium

Posts with mentions or reviews of pgsodium. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-31.
  • Macaroons Escalated Quickly
    4 projects | news.ycombinator.com | 31 Jan 2024
    I like the "solve the now" perspective here, and having code examples is very helpful to understand some of the rational behind the approach. Having read your previous "tedious survey"[0] post on various token formats, I generally agree with a lot of your conclusions. Curious though about your thought process wrt macaroons vs biscuits.

    To me the one major downside of macaroons has always been the single shared root symmetric key. Many use cases are addressed by third party attenuation, but then there are the problems like key rotation, having to do online verification, no built in encryption, no peer-to-peer support through an "untrusted" fly.io, and no third party token verification without decryption like in signcryption[1] schemes. Of course this is traded off by having to do PK issuance and management so I can see the simplicity of it.

    Is fly.io scoping this pretty hard to just auth tokens with third party attenuation, or do you see further development and maybe moving to other token systems like biscuit when/if the need arises to address those known issues?

    fwiw I've done a bit of research work myself on a token format using signcryption [2] where I explored addressing some of these ideas (but not the attenuation side of it yet, which I get is a big deal here).

    [0] https://fly.io/blog/api-tokens-a-tedious-survey/

    [1] https://github.com/jedisct1/libsodium-signcryption

    [2] https://github.com/michelp/pgsodium/blob/feat/signcryption-t...

  • PostgreSQL Encryption: The Available Options
    4 projects | news.ycombinator.com | 6 Nov 2023
    pg_sodium [1] is another great options for transparent (column level!) encryption. Its integrated with Supabase [2] if you want to give it a try

    [1] https://github.com/michelp/pgsodium

  • Update - I built an app that analyses your worries and challenges your thoughts, looking for feedback
    2 projects | /r/CBTpractice | 16 May 2023
    Yes! Concerning privacy: The entries are saved in Supabase and encrypted with pgsodium. I think there's a lot more to privacy, though – currently working on other safety measures like anonymization that I'll include before scaling. What sets the app apart: I have built the app specifically to integrate therapy tactics into your daily life and to make them a habit (e. g. if you talk to ChatGPT or Wysa it tells you what tactics to integrate and learn about them, with my app you actually integrate them) => less about learning, more about doing.
  • I built an app that helped me move on by teaching me how to react differently to my thoughts.
    2 projects | /r/heartbreak | 13 Apr 2023
    Valid concern. The entries are saved in Supabase and encrypted with pgsodium. I think there's a lot more to privacy, though – currently working on other safety measures like anonymization that I'll include before scaling and releasing the app to the broader public. Still looking for testers; sent you a DM. Let me know if you're in!
  • pgsodium- Modern cryptography for PostgreSQL using libsodium.
    1 project | /r/CKsTechNews | 29 Mar 2023
  • Supabase secrets management available in beta
    6 projects | news.ycombinator.com | 16 Dec 2022
    > Is Vault something that can handle this without getting into my app code? Basically, if i gave a someone root access to my supabase instance is that encrypted data safe?

    The answer is slightly offset from your question, so let me start by pointing out that the Vault is about Encrypted Data At Rest. This is mentioned in the docs and in the blog and video, but it's something that I like to always mention first in discussions. The main purpose of the Vault is to store your data encrypted, so that it's encrypted on disk, and in backups. In SQL the decrypted secrets are available to you, because that's where you are using them and encrypted data must be decrypted to be useful.

    If someone roots access to your database, then yes they can access the decrypted secrets through the view. This is by design, the secrets must be decrypted to be useful in query code. This risk is similar to someone rooting your application code, they will see decrypted secrets via your environment key, so no it won't protect you against anyone rooting processes in your stack that need useful access to secrets and it's not meant to. Like all security you must take a layered approach, the Vault is just one storage level layer strategy.

    One big difference from the env var approach though is that the key Supabase uses to encrypt your secrets with the Vault is stored outside the database, it is inaccessible to SQL, which is an enhancement over sticking the raw key into an environment variable or a table that is accessible to your application. Instead of revealing the raw key, pgsodium has a feature called [Server Key Management](https://github.com/michelp/pgsodium#server-key-management) where you do not have access to the raw key, but instead reference keys by an key identifier. It is safe to store this identifier alongside the data it encrypts. The raw key itself is never stored. I'm very intentionally overusing the word "store" here, because that's specifically the layer of security that the Vault provides.

  • Supabase Vault
    1 project | news.ycombinator.com | 20 Aug 2022
    The article links directly to here, which may answer your question:

    https://github.com/michelp/pgsodium#server-key-management

  • Encrypting data for a Finance App
    1 project | /r/Supabase | 8 Jul 2022
  • How do I encrypt data before sending it to the database?
    2 projects | /r/reactjs | 3 Feb 2022
  • Show HN: Pgsodium – A Crytographic PostgreSQL Extension
    4 projects | news.ycombinator.com | 10 Jan 2022
    Hey HN, I shared an earlier prototype version of pgsodium but I just released 2.0 and felt this could be a good opportunity to share some updates!

    [pgsodium](https://github.com/michelp/pgsodium) 2.0.0 is a postgres extension that uses the [libsodium](https://doc.libsodium.org/) library to provide high-performance, modern cryptography support for PostgreSQL 10+.

    2.0.0 includes a ton of new feature and a few bug-fixes:

    * Support for [XChaCha20-SIV](https://github.com/jedisct1/libsodium-xchacha20-siv) deterministic nonce-free encryption, this is useful for one-time workflows sacrificing a bit of speed and larger key size without worrying about nonce-handling issues.

libsodium-signcryption

Posts with mentions or reviews of libsodium-signcryption. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-31.
  • Macaroons Escalated Quickly
    4 projects | news.ycombinator.com | 31 Jan 2024
    I like the "solve the now" perspective here, and having code examples is very helpful to understand some of the rational behind the approach. Having read your previous "tedious survey"[0] post on various token formats, I generally agree with a lot of your conclusions. Curious though about your thought process wrt macaroons vs biscuits.

    To me the one major downside of macaroons has always been the single shared root symmetric key. Many use cases are addressed by third party attenuation, but then there are the problems like key rotation, having to do online verification, no built in encryption, no peer-to-peer support through an "untrusted" fly.io, and no third party token verification without decryption like in signcryption[1] schemes. Of course this is traded off by having to do PK issuance and management so I can see the simplicity of it.

    Is fly.io scoping this pretty hard to just auth tokens with third party attenuation, or do you see further development and maybe moving to other token systems like biscuit when/if the need arises to address those known issues?

    fwiw I've done a bit of research work myself on a token format using signcryption [2] where I explored addressing some of these ideas (but not the attenuation side of it yet, which I get is a big deal here).

    [0] https://fly.io/blog/api-tokens-a-tedious-survey/

    [1] https://github.com/jedisct1/libsodium-signcryption

    [2] https://github.com/michelp/pgsodium/blob/feat/signcryption-t...

  • Supabase secrets management available in beta
    6 projects | news.ycombinator.com | 16 Dec 2022
    You've hit the nail right on the head with this question on how hard group encryption is, and we don't have all the answers yet as we are still working the use cases around it. We are hoping to reach a level of security that you mention in your SE question using something similar to the excellent accepted answer, distributed private key sharing among trusted participants.

    The basis we are exploring is using an algorithm called Signcryption (https://github.com/jedisct1/libsodium-signcryption) that is already included in pgsodium. This doesn't solve any of the shared private key issues you mention above, but it is a useful foundation for distributing encrypted messages that separate out sender and receiver identifiers from their keys, a sort of lower level foundation on top of which distributed key sharing can occur.

    I also think signcryption is a great foundation for a better token format than JWT or PASETO, as it covers all of their use cases without algorithm confusion attacks (despite PASETO's insistence on "Algorithm Lucidity") and supports more features such as third party verification and streaming shared key generation from any token without having to exchange the key, we hope to use these tokens so that end-to-end peers can exchange tokens, derive streaming shared keys, and then do direct point-to-point message exchange using libsodium crypto_secretstream API which supports key ratcheting for forward secrecy.

    Would love to discuss more about your research with you and include it with attribution into our future work, send me an intro at [email protected] when any other ideas or resources you'd like us to see!

  • Age and Authenticated Encryption
    2 projects | news.ycombinator.com | 12 Oct 2022
    Another signcryption scheme as described in the article is also implemented by the libsodium author as an extension:

    https://github.com/jedisct1/libsodium-signcryption

    It's unclear from the article if this is the same algorithm age uses.

    Signcryption schemes are also a good candidate algorithm for replacing JWTs and PASETO as they suffer from no algorithm confusion, and don't need what PASETO calls "Algorithm Lucidity" and serve both plaintext authentication, authenticated encryption, sender receiver verification, and shared key generation that can be used for unlimited encrypted streaming, for example with libsodium's crypto_secretstream API.

    https://doc.libsodium.org/secret-key_cryptography/secretstre...

    https://github.com/paseto-standard/paseto-spec/blob/master/d...

  • Show HN: Pgsodium – A Crytographic PostgreSQL Extension
    4 projects | news.ycombinator.com | 10 Jan 2022
    * Support for [SignCryption](https://github.com/jedisct1/libsodium-signcryption) Sign & Encrypt identity verification. Signcryption goes beyond public key verification to provide identity verification, and negotiating a shared-secret key between two parties to use fast streaming encryption of the payload.
  • Pgsodium 2.0.0: Modern cryptography for PostgreSQL
    3 projects | news.ycombinator.com | 9 Jan 2022
    From Mike's comments on Reddit[0]

    pgsodium 2.0.0 is a postgres extension that uses the libsodium library to provide high-performance, modern cryptography support for PostgreSQL 10+.

    2.0.0 includes a ton of new feature and a few bug-fixes:

    * Support for XChaCha20-SIV[2] deterministic nonce-free encryption

    * Support for SignCryption[3] Sign & Encrypt identity verification

    * Key id support for HMACSHA 512/256, generichash, and shorthash

    * Support for low level XChaCha20 streaming[4]

    * More tests, docs, and small bug fixes in argument parsing

    * In-memory key now protected with sodium_malloc[5]

    [0] https://www.reddit.com/r/PostgreSQL/comments/s0b6o2/pgsodium...

    [1] https://doc.libsodium.org/

    [2] https://github.com/jedisct1/libsodium-xchacha20-siv

    [3] https://github.com/jedisct1/libsodium-signcryption

    [4] https://libsodium.gitbook.io/doc/advanced/stream_ciphers/xch...

    [5] https://libsodium.gitbook.io/doc/memory_management

  • pgsodium 2.0.0: Modern cryptography for PostgreSQL
    3 projects | /r/PostgreSQL | 9 Jan 2022
    Support for SignCryption Sign & Encrypt identity verification
  • Libsodium-Signcryption: Encrypt, Authenticate, and Sign with One Keypair
    1 project | news.ycombinator.com | 22 Dec 2021

What are some alternatives?

When comparing pgsodium and libsodium-signcryption you can also consider the following projects:

libsodium-xchacha20-siv - Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.

OpenSSL - TLS/SSL and crypto library

libsodium.js - libsodium compiled to Webassembly and pure JavaScript, with convenient wrappers.

node-sodium - Port of the lib sodium encryption library to Node.js

postgrest-js - Isomorphic JavaScript client for PostgREST.

vault - Extension for storing encrypted secrets in the Vault

Swift-Sodium - Safe and easy to use crypto for iOS and macOS

paseto-spec - Specification for Platform Agnostic SEcurity TOkens (PASETO)

supabase - The open source Firebase alternative.