libsodium-signcryption

Signcryption using libsodium. (by jedisct1)

Libsodium-signcryption Alternatives

Similar projects and alternatives to libsodium-signcryption

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better libsodium-signcryption alternative or higher similarity.

libsodium-signcryption reviews and mentions

Posts with mentions or reviews of libsodium-signcryption. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-31.
  • Macaroons Escalated Quickly
    4 projects | news.ycombinator.com | 31 Jan 2024
    I like the "solve the now" perspective here, and having code examples is very helpful to understand some of the rational behind the approach. Having read your previous "tedious survey"[0] post on various token formats, I generally agree with a lot of your conclusions. Curious though about your thought process wrt macaroons vs biscuits.

    To me the one major downside of macaroons has always been the single shared root symmetric key. Many use cases are addressed by third party attenuation, but then there are the problems like key rotation, having to do online verification, no built in encryption, no peer-to-peer support through an "untrusted" fly.io, and no third party token verification without decryption like in signcryption[1] schemes. Of course this is traded off by having to do PK issuance and management so I can see the simplicity of it.

    Is fly.io scoping this pretty hard to just auth tokens with third party attenuation, or do you see further development and maybe moving to other token systems like biscuit when/if the need arises to address those known issues?

    fwiw I've done a bit of research work myself on a token format using signcryption [2] where I explored addressing some of these ideas (but not the attenuation side of it yet, which I get is a big deal here).

    [0] https://fly.io/blog/api-tokens-a-tedious-survey/

    [1] https://github.com/jedisct1/libsodium-signcryption

    [2] https://github.com/michelp/pgsodium/blob/feat/signcryption-t...

  • Supabase secrets management available in beta
    6 projects | news.ycombinator.com | 16 Dec 2022
    You've hit the nail right on the head with this question on how hard group encryption is, and we don't have all the answers yet as we are still working the use cases around it. We are hoping to reach a level of security that you mention in your SE question using something similar to the excellent accepted answer, distributed private key sharing among trusted participants.

    The basis we are exploring is using an algorithm called Signcryption (https://github.com/jedisct1/libsodium-signcryption) that is already included in pgsodium. This doesn't solve any of the shared private key issues you mention above, but it is a useful foundation for distributing encrypted messages that separate out sender and receiver identifiers from their keys, a sort of lower level foundation on top of which distributed key sharing can occur.

    I also think signcryption is a great foundation for a better token format than JWT or PASETO, as it covers all of their use cases without algorithm confusion attacks (despite PASETO's insistence on "Algorithm Lucidity") and supports more features such as third party verification and streaming shared key generation from any token without having to exchange the key, we hope to use these tokens so that end-to-end peers can exchange tokens, derive streaming shared keys, and then do direct point-to-point message exchange using libsodium crypto_secretstream API which supports key ratcheting for forward secrecy.

    Would love to discuss more about your research with you and include it with attribution into our future work, send me an intro at [email protected] when any other ideas or resources you'd like us to see!

  • Age and Authenticated Encryption
    2 projects | news.ycombinator.com | 12 Oct 2022
    Another signcryption scheme as described in the article is also implemented by the libsodium author as an extension:

    https://github.com/jedisct1/libsodium-signcryption

    It's unclear from the article if this is the same algorithm age uses.

    Signcryption schemes are also a good candidate algorithm for replacing JWTs and PASETO as they suffer from no algorithm confusion, and don't need what PASETO calls "Algorithm Lucidity" and serve both plaintext authentication, authenticated encryption, sender receiver verification, and shared key generation that can be used for unlimited encrypted streaming, for example with libsodium's crypto_secretstream API.

    https://doc.libsodium.org/secret-key_cryptography/secretstre...

    https://github.com/paseto-standard/paseto-spec/blob/master/d...

  • Show HN: Pgsodium – A Crytographic PostgreSQL Extension
    4 projects | news.ycombinator.com | 10 Jan 2022
    * Support for [SignCryption](https://github.com/jedisct1/libsodium-signcryption) Sign & Encrypt identity verification. Signcryption goes beyond public key verification to provide identity verification, and negotiating a shared-secret key between two parties to use fast streaming encryption of the payload.
  • Pgsodium 2.0.0: Modern cryptography for PostgreSQL
    3 projects | news.ycombinator.com | 9 Jan 2022
    From Mike's comments on Reddit[0]

    pgsodium 2.0.0 is a postgres extension that uses the libsodium library to provide high-performance, modern cryptography support for PostgreSQL 10+.

    2.0.0 includes a ton of new feature and a few bug-fixes:

    * Support for XChaCha20-SIV[2] deterministic nonce-free encryption

    * Support for SignCryption[3] Sign & Encrypt identity verification

    * Key id support for HMACSHA 512/256, generichash, and shorthash

    * Support for low level XChaCha20 streaming[4]

    * More tests, docs, and small bug fixes in argument parsing

    * In-memory key now protected with sodium_malloc[5]

    [0] https://www.reddit.com/r/PostgreSQL/comments/s0b6o2/pgsodium...

    [1] https://doc.libsodium.org/

    [2] https://github.com/jedisct1/libsodium-xchacha20-siv

    [3] https://github.com/jedisct1/libsodium-signcryption

    [4] https://libsodium.gitbook.io/doc/advanced/stream_ciphers/xch...

    [5] https://libsodium.gitbook.io/doc/memory_management

  • pgsodium 2.0.0: Modern cryptography for PostgreSQL
    3 projects | /r/PostgreSQL | 9 Jan 2022
    Support for SignCryption Sign & Encrypt identity verification
  • Libsodium-Signcryption: Encrypt, Authenticate, and Sign with One Keypair
    1 project | news.ycombinator.com | 22 Dec 2021
  • A note from our sponsor - WorkOS
    workos.com | 25 Apr 2024
    The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning. Learn more →

Stats

Basic libsodium-signcryption repo stats
7
57
0.0
2 months ago

Sponsored
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com