Skip to content

seebees/aws-encryption-sdk-javascript

 
 

Repository files navigation

AWS Encryption SDK for Javascript

The AWS Encryption SDK for Javascript provides a fully compliant, native Javascript implementation of the AWS Encryption SDK

This library is currently under public preview. Feel free to check out the code and give it a spin, but be aware that the APIs are still in flux. We'd love to hear your feedback on the APIs before they're fully nailed down.

Client Packages

Package Description
@aws-crypto/client-browser Client SDK for Web applications
@aws-crypto/client-node Client SDK for Node.js client applications

These client packages have everything you need to encrypt/decrypt. They are the primary starting point. The AWS Encryption SDK for Javascript is built from a group of modularized packages. You can also compose the functional packages you need.

Functional Packages

Package Description
@aws-crypto/encrypt-browser Encrypt function for Web applications
@aws-crypto/encrypt-node Encrypt function for Node.js client applications
@aws-crypto/decrypt-browser Decrypt function for Web applications
@aws-crypto/decrypt-node Decrypt function for Node.js client applications
@aws-crypto/kms-keyring-browser Kms keyring for Web applications
@aws-crypto/kms-keyring-node Kms keyring for Node.js client applications
@aws-crypto/raw-rsa-keyring-browser Raw RSA keyring for Web applications
@aws-crypto/raw-rsa-keyring-node Raw RSA keyring for Node.js client applications
@aws-crypto/raw-aes-keyring-browser Raw AES keyring for Web applications
@aws-crypto/raw-aes-keyring-node Raw AES keyring for Node.js client applications
@aws-crypto/caching-materials-manager-browser Caching Materials Manager for Web applications
@aws-crypto/caching-materials-manager-node Caching Materials Manager for Node.js client applications

Concepts

There are four main concepts that you need to understand to use this library:

Cryptographic Materials Managers

Cryptographic materials managers (CMMs) are resources that collect cryptographic materials and prepare them for use by the Encryption SDK core logic.

An example of a CMM is the default CMM, which is automatically generated anywhere a caller provides a keyring. The default CMM collects encrypted data keys from it's keyrings.

An example of a more advanced CMM is the caching CMM, which caches cryptographic materials provided by another CMM.

Keyrings

Keyrings use wrapping keys to to generate, encrypt, and decrypt data keys. The keyring that you use determines the source of the unique data keys that protect each message, and the wrapping keys that encrypt that data key. An example of a keyring is the KmsKeyringNode.

An example of a more advanced keyring is the multi keyring. A multi keyring can be used to compose keyrings together.

Wrapping Keys

Wrapping keys are used to protect data keys. An example of a wrapping key is a KMS customer master key (CMK)_.

Data Keys

Data keys are the encryption keys that are used to encrypt your data. If your algorithm suite uses a key derivation function, the data key is used to generate the key that directly encrypts the data.

test

npm test

License

This SDK is distributed under the Apache License, Version 2.0, see LICENSE.txt and NOTICE.txt for more information.

About

AWS Encryption SDK for Javascript and Node.js

Resources

License

Code of conduct

Stars

Watchers

Forks

Packages

No packages published

Languages

  • TypeScript 95.9%
  • JavaScript 4.0%
  • HTML 0.1%