keybase / Triplesec
Licence: other
Triple Security for the browser and Node.js
Stars: ✭ 384
Programming Languages
javascript
184084 projects - #8 most used programming language
node-triplesec
A CommonJS module for symmetric key encryption of smallish secrets
How to install
npm install triplesec
How to Use
One-shot Mode
{encrypt, decrypt} = require 'triplesec'
key = new Buffer 'top-secret-pw'
pt0 = new Buffer 'the secret!'
pt1 = new Buffer pt0
encrypt { key, data : pt1 }, (err, ciphertext) ->
decrypt { key, data : ciphertext }, (err, pt2) ->
console.log "Right back the start! #{pt0} is #{pt2}"
Reusable Derived Keys
The most expensive part of TripleSec is to derive keys from your given passphrase. This is intentionally so to make it more expensive to crack your password in the case that your ciphertext is stolen. However, you can spread this expense over multiple encryptions if you plan to be encrypting more than once:
{Encryptor, Decryptor} = require 'triplesec'
key = new Buffer 'top-secret-pw'
enc = new Encryptor { key }
dec = new Decryptor { key }
pt0 = new Buffer 'the secret!'
pt1 = new Buffer pt0
pt2 = new Buffer pt0
enc.run { data : pt1 }, (err, ct1) ->
enc.run { data : pt2 }, (err, ct2) ->
dec.run { data : ct1 }, (err, pt3) ->
dec.run { data : ct2 }, (err, pt4) ->
console.log "Right back the start! #{pt0} is #{pt3} is #{pt4}"
If you want to resalt derived keys with every encryption, you should explicitly ask for that. Otherwise, salt will be reused to speed up encryption (and decryption).
enc.run { data : pt1 }, (err, ct1) ->
enc.resalt {}, () ->
enc.run { data : pt2 }, (err, ct2) ->
Full API Documentation
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].