Skip to content

Lightweight, versatile, cryptographic scheme suitable in constrained environments

License

Notifications You must be signed in to change notification settings

pedroalbanese/xoodyak

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

31 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Xoodyak Tools

ISC License GoDoc GitHub downloads GitHub release (latest by date)

Xoodyak is a lightweight, versatile, cryptographic scheme suitable in constrained environments. It can be used for hashing, encryption, MAC computation and authenticated encryption.

Xoodyak builds upon the Xoodoo permutations and the duplex construction.

Xoodyak AEAD Encryption Tool

Usage of xoodyak:
xoodyak [-d] -p "pass" [-i N] [-s "salt"] -f <file.ext>
  -a string
        Additional Associated data.
  -d    Decrypt instead of Encrypt.
  -f string
        Target file. ('-' for STDIN)
  -h    HMAC-based key derivation function.
  -i int
        Iterations. (for PBKDF2) (default 1024)
  -k string
        128-bit key to Encrypt/Decrypt.
  -p string
        Password-based key derivation function.
  -r    Generate random 128-bit cryptographic key.
  -s string
        Salt. (for PBKDF2)

Xoodyak Recursive Hasher

Usage of xoodyaksum:
xoodyaksum [-c <hash.ext>] [-r] <file.ext>
  -c string
        Check hashsum file.
  -r    Process directories recursively.

Xoodyak MAC

Usage of xoodyakmac:
xoodyakmac [-k <secret>] -f <file.ext>
  -f string
        Target file. ('-' for STDIN)
  -k string
        Secret key.

License

This project is licensed under the ISC License.

Industrial-Grade Reliability. Copyright (c) 2020-2023 ALBANESE Research Lab.