All Projects → weavejester → Crypto Password

weavejester / Crypto Password

Library for securely hashing passwords

Programming Languages

clojure
4091 projects

Projects that are alternatives of or similar to Crypto Password

Password4j
Password4j is a user-friendly cryptographic library that supports Argon2, Bcrypt, Scrypt, PBKDF2 and various cryptographic hash functions.
Stars: ✭ 124 (-32.97%)
Mutual labels:  cryptography, bcrypt, scrypt
Armadillo
A shared preference implementation for confidential data in Android. Per default uses AES-GCM, BCrypt and HKDF as cryptographic primitives. Uses the concept of device fingerprinting combined with optional user provided passwords and strong password hashes.
Stars: ✭ 226 (+22.16%)
Mutual labels:  cryptography, bcrypt
CryptoKnight
CryptoKnight is a general purpose cryptography desktop app
Stars: ✭ 18 (-90.27%)
Mutual labels:  scrypt, bcrypt
Scrypt
A .NET implementation of scrypt password hash algorithm.
Stars: ✭ 90 (-51.35%)
Mutual labels:  scrypt, bcrypt
CppSecurity
C++ Security Library
Stars: ✭ 24 (-87.03%)
Mutual labels:  scrypt, bcrypt
phc-crypto
Hashing algorithms simplified (supports Argon2, Bcrypt, Scrypt, and PBKDF2)
Stars: ✭ 22 (-88.11%)
Mutual labels:  scrypt, bcrypt
hash-wasm
Lightning fast hash functions using hand-tuned WebAssembly binaries
Stars: ✭ 382 (+106.49%)
Mutual labels:  scrypt, bcrypt
Masterpassword
Project moved to https://gitlab.com/spectre.app
Stars: ✭ 1,122 (+506.49%)
Mutual labels:  cryptography, scrypt
Js Ethereum Cryptography
Every cryptographic primitive needed to work on Ethereum, for the browser and Node.js
Stars: ✭ 83 (-55.14%)
Mutual labels:  cryptography, scrypt
Pkcs11interop
Managed .NET wrapper for unmanaged PKCS#11 libraries
Stars: ✭ 170 (-8.11%)
Mutual labels:  cryptography
Cryptag
Encrypted, taggable, searchable cloud storage
Stars: ✭ 178 (-3.78%)
Mutual labels:  cryptography
Solcrypto
Solidity crypto libraries, ring signatures, proof of knowledge, packed signatures etc. with matching Python implementations for secp256k1 and (alt)BN-256
Stars: ✭ 170 (-8.11%)
Mutual labels:  cryptography
Kcptun
A Stable & Secure Tunnel based on KCP with N:M multiplexing and FEC. Available for ARM, MIPS, 386 and AMD64。KCPプロトコルに基づく安全なトンネル。KCP 프로토콜을 기반으로 하는 보안 터널입니다。
Stars: ✭ 12,714 (+6772.43%)
Mutual labels:  cryptography
X25519 Dalek
X25519 elliptic curve Diffie-Hellman key exchange in pure-Rust, using curve25519-dalek.
Stars: ✭ 179 (-3.24%)
Mutual labels:  cryptography
Lol
Λ ⚬ λ: Functional Lattice Cryptography
Stars: ✭ 169 (-8.65%)
Mutual labels:  cryptography
Javasecurity
Java web and command line applications demonstrating various security topics
Stars: ✭ 182 (-1.62%)
Mutual labels:  cryptography
Bitcoinecdsa.php
PHP library to generate BTC addresses and signatures from private keys.
Stars: ✭ 169 (-8.65%)
Mutual labels:  cryptography
Simple Scrypt
A convenience library for generating, comparing and inspecting password hashes using the scrypt KDF in Go 🔑
Stars: ✭ 168 (-9.19%)
Mutual labels:  scrypt
Rsactftool
RSA attack tool (mainly for ctf) - retreive private key from weak public key and/or uncipher data
Stars: ✭ 3,163 (+1609.73%)
Mutual labels:  cryptography
Seal
Microsoft SEAL is an easy-to-use and powerful homomorphic encryption library.
Stars: ✭ 2,424 (+1210.27%)
Mutual labels:  cryptography

crypto-password

Build Status

A Clojure library for securing user passwords using a key derivation function. Supports the following algorithms:

Installation

Add the following dependency to your project.clj file:

[crypto-password "0.2.1"]

Usage

Pick an encryption algorithm, either pbkdf2, bcrypt or scrypt:

(require '[crypto.password.<algorithm> :as password])

Then use the encrypt function to apply a secure, one-way encryption algorithm to a password:

(def encrypted (password/encrypt "foobar"))

And the check function to check the encrypted password against a plaintext password:

(password/check "foobar" encrypted) ;; => true

Defaults

The default options for the key derivation algorithms were chosen based on benchmarks carried on on a AWS t1.micro server running Ubuntu 13.10 (ami-35dbde5c), in March 2014.

On this hardware, the key derivation functions take approximately 200ms to complete with their default options. This is a short enough time to not be an inconvenience for a human being, but long enough to make brute forcing encrypted passwords very costly.

Documentation

License

Copyright © 2019 James Reeves

Distributed under the Eclipse Public License, the same as Clojure.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].