The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning. Learn more →
Top 23 Go Cryptography Projects
-
kcptun
A Stable & Secure Tunnel based on KCP with N:M multiplexing and FEC. Available for ARM, MIPS, 386 and AMD64。N:M 多重化と FEC を備えた KCP に基づく安定した安全なトンネル。 N:M 다중화 및 FEC를 사용하는 KCP 기반의 안정적이고 안전한 터널입니다. Un tunnel stable et sécurisé basé sur KCP avec multiplexage N:M et FEC.
-
Project mention: If I connect a personal wallet to my Bitcoin Lightning node, do I have to open a channel? | /r/BitcoinBeginners | 2023-07-30
If you want multiple users, you'll need multiple node instances. LNbits (mentioned by /u/sos755) does not implement this. Rather, it simply abstracts the funds associated with a single node into multiple logical accounts. This means that the node administrator still has underlying control of all funds associated with the node. See this GitHub discussion for a bit more info: https://github.com/lightningnetwork/lnd/issues/2652
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
Super intriguing. Thanks for sharing!
It reminds me a bit of an early Go project called Upspin [1]. And also a bit of Solid [2]. Did you get any inspiration from them?
What excites me about your project is that you're addressing the elephant in the room when it comes to data sovereignty (~nobody wants to self-host a personal database but their personal devices aren't publicly accessible) in an elegant way.
By storing the data on my personal device and (presumably?) paying for a managed relay (and maybe an encrypted backup), I can keep my data in my physical possession, but I won't have to host anything on my own. Is that the idea?
-
-
-
cli
🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc. (by smallstep)
Project mention: Google will disable all but OAuth for IMAP, SMTP and POP starting Sept. 30 | news.ycombinator.com | 2024-01-18https://github.com/smallstep/cli implements some OAuth flows from the CLI, it may be helpful for you.
-
This is a great idea. I now exclusively use SSH keys on hardware security modules of some kind. I use "Secretive", a mac app that does the same, plus a yubikey using yubikey-agent (https://github.com/FiloSottile/yubikey-agent; there are too many complicated ways to use SSH keys with a yubikey this is one of the friendliest ones). Depending on the security and frequency of which I access the service impacts whether I need presence confirmation or use secretive versus the yubikey.
I would be remiss to mention there are existing SSH TPM projects, not sure how this one differentiates. It seems to at least have the user experience pretty simple, similar to yubikey-agent (and secretive), and unlike some of the existing solutions which have quite a few extra steps:
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
-
There's also Picocrypt.
-
Read the full release notes here: https://github.com/iotexproject/iotex-core/releases/tag/v1.11.0
-
acra
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL. (by cossacklabs)
-
- https://github.com/cloudflare/circl
-
-
Terrapin-Scanner
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Project mention: Tell HN: Ubiquiti APs likely vulnerable to Terrapin | news.ycombinator.com | 2024-03-14For more details visit our website available at https://terrapin-attack.com
-
-
Project mention: Time-Lock Puzzles in the Random Oracle Model (2011) | news.ycombinator.com | 2023-06-18
If you're interested in time-lock puzzles, drand [1] achieves this but through randomness instead of computational effort.
-
You could use OpenPubkey [0, 1] to bind your identity key to your say Google or Okta account. With an MFA Cosigner, a malicious Google wouldn't be able to impersonate you.
IF you really wanted to go full cipherpunk, you could use the stuff risc.zero [2] is building to could keep your identity secret via ZKPs over ID Token (JWT).
[0]: OpenPubkey: Augmenting OpenID Connect with User held Signing Keys, https://eprint.iacr.org/2023/296
[1]: https://github.com/openpubkey/openpubkey
[2]: "Under the hood is JWT and OIDC verification on top of the RISC Zero zkVM" https://www.risczero.com/news/bonsai-pay
-
enc
🔑🔒 A modern and friendly CLI alternative to GnuPG: generate and download keys, encrypt, decrypt, and sign text and files, and more.
-
-
-
-
-
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
Go Cryptography related posts
- Kyber
- iMessage with PQ3 Cryptographic Protocol
- Terrapin SSH Attack: An Overview
- KCP: UDP Implementation over TCP
- Ask HN: Best practices for safeguarding master password in organization?
- acra: NEW Data - star count:1212.0
- acra: NEW Data - star count:1212.0
-
A note from our sponsor - WorkOS
workos.com | 19 Mar 2024
Index
What are some of the best open-source Cryptography projects in Go? This list will help you:
Project | Stars | |
---|---|---|
1 | kcptun | 13,638 |
2 | lnd | 7,421 |
3 | upspin | 6,208 |
4 | tendermint | 5,623 |
5 | kcp-go | 3,897 |
6 | cli | 3,442 |
7 | yubikey-agent | 2,540 |
8 | memguard | 2,469 |
9 | Picocrypt | 2,180 |
10 | iotex-core | 1,518 |
11 | acra | 1,279 |
12 | CIRCL | 1,143 |
13 | keys | 904 |
14 | Terrapin-Scanner | 870 |
15 | fscrypt | 844 |
16 | drand | 691 |
17 | openpubkey | 537 |
18 | enc | 469 |
19 | kes | 439 |
20 | cothority | 421 |
21 | iavl | 404 |
22 | lightning-onion | 390 |
23 | multi-party-sig | 275 |