blob: 2021356c3be8bed2ef08427a78b54c2768887015 [file] [log] [blame]
Alex Gaynorf6c47e92013-08-08 07:16:01 -07001Symmetric Encryption
2====================
3
Donald Stufft173de982013-08-12 07:34:39 -04004.. testsetup::
5
6 import binascii
7 key = binascii.unhexlify(b"0" * 32)
8 iv = binascii.unhexlify(b"0" * 32)
9
10
Alex Gaynorf6c47e92013-08-08 07:16:01 -070011Symmetric encryption is a way to encrypt (hide the plaintext value) material
12where the encrypter and decrypter both use the same key.
13
Alex Gaynor65678d02013-08-08 15:19:19 -070014.. class:: cryptography.primitives.block.BlockCipher(cipher, mode)
Alex Gaynorf6c47e92013-08-08 07:16:01 -070015
Alex Gaynor65678d02013-08-08 15:19:19 -070016 Block ciphers work by encrypting content in chunks, often 64- or 128-bits.
Alex Gaynorb12f76e2013-08-08 19:05:18 -070017 They combine an underlying algorithm (such as AES), with a mode (such as
Paul Kehrer5399fd02013-10-21 23:48:25 -050018 CBC, CTR, or GCM).A simple example of encrypting (and then decrypting)
Paul Kehrer653463f2013-10-21 17:55:01 -050019 content with AES is:
Alex Gaynorf6c47e92013-08-08 07:16:01 -070020
Donald Stufft173de982013-08-12 07:34:39 -040021 .. doctest::
Alex Gaynorf6c47e92013-08-08 07:16:01 -070022
Alex Gaynor641a3a02013-08-10 15:46:07 -040023 >>> from cryptography.primitives.block import BlockCipher, ciphers, modes
Alex Gaynoracc787a2013-08-10 15:52:40 -040024 >>> cipher = BlockCipher(ciphers.AES(key), modes.CBC(iv))
Paul Kehrer3e0895c2013-10-21 22:19:29 -050025 >>> encryptor = cipher.encryptor()
26 >>> ct = encryptor.update(b"a secret message") + encryptor.finalize()
27 >>> decryptor = cipher.decryptor()
28 >>> decryptor.update(ct) + decryptor.finalize()
Donald Stufft173de982013-08-12 07:34:39 -040029 '...'
Alex Gaynorf6c47e92013-08-08 07:16:01 -070030
Alex Gaynore62aa402013-08-08 15:23:11 -070031 :param cipher: One of the ciphers described below.
32 :param mode: One of the modes described below.
Alex Gaynor0ca7fdb2013-08-08 07:35:26 -070033
Paul Kehrer5399fd02013-10-21 23:48:25 -050034 .. method:: encryptor()
Alex Gaynor09515f02013-08-08 15:26:55 -070035
Paul Kehrer5399fd02013-10-21 23:48:25 -050036 :return :ref:`CipherContext <ciphercontext>`: encryption instance
Alex Gaynore62aa402013-08-08 15:23:11 -070037
Paul Kehrer5399fd02013-10-21 23:48:25 -050038 .. method:: decryptor()
39
40 :return :ref:`CipherContext <ciphercontext>`: decryption instance
41
42.. _ciphercontext:
43.. class:: cryptography.primitives.interfaces.CipherContext()
44
45 When calling ``encryptor()`` or ``decryptor()`` on a BlockCipher object you
46 will receive a return object conforming to the CipherContext interface. You
47 can then call ``update(data)`` with data until you have fed everything into
48 the context. Once that is done call ``finalize()`` to finish the operation and
49 obtain the remainder of the data.
50
51
52 .. method:: update(data)
53
54 :param bytes data: The text you wish to pass into the context.
55 :return bytes: Returns the data that was encrypted or decrypted.
Alex Gaynore62aa402013-08-08 15:23:11 -070056
57 .. method:: finalize()
58
Paul Kehrer5399fd02013-10-21 23:48:25 -050059 :return bytes: Returns the remainder of the data.
Alex Gaynord96d1002013-08-08 07:37:26 -070060
61Ciphers
62~~~~~~~
63
Alex Gaynor641a3a02013-08-10 15:46:07 -040064.. class:: cryptography.primitives.block.ciphers.AES(key)
Alex Gaynor5ba2dfa2013-08-08 11:04:44 -070065
Alex Gaynor1e3f81f2013-08-08 11:31:43 -070066 AES (Advanced Encryption Standard) is a block cipher standardized by NIST.
Alex Gaynor5ba2dfa2013-08-08 11:04:44 -070067 AES is both fast, and cryptographically strong. It is a good default
68 choice for encryption.
69
70 :param bytes key: The secret key, either ``128``, ``192``, or ``256`` bits.
Alex Gaynor48ec9a32013-08-08 11:13:46 -070071 This must be kept secret.
Alex Gaynor5ba2dfa2013-08-08 11:04:44 -070072
Paul Kehrerdff22d42013-09-27 13:43:06 -050073.. class:: cryptography.primitives.block.ciphers.Camellia(key)
74
75 Camellia is a block cipher approved for use by CRYPTREC and ISO/IEC.
76 It is considered to have comparable security and performance to AES, but
77 is not as widely studied or deployed.
78
79 :param bytes key: The secret key, either ``128``, ``192``, or ``256`` bits.
80 This must be kept secret.
81
Alex Gaynord96d1002013-08-08 07:37:26 -070082
83Modes
84~~~~~
85
Alex Gaynor641a3a02013-08-10 15:46:07 -040086.. class:: cryptography.primitives.block.modes.CBC(initialization_vector)
Alex Gaynor48ec9a32013-08-08 11:13:46 -070087
88 CBC (Cipher block chaining) is a mode of operation for block ciphers. It is
89 considered cryptographically strong.
90
91 :param bytes initialization_vector: Must be random bytes. They do not need
92 to be kept secret (they can be included
Alex Gaynor2dc2b862013-08-08 11:58:04 -070093 in a transmitted message). Must be the
94 same number of bytes as the
Alex Gaynor6badd9b2013-08-08 14:59:53 -070095 ``block_size`` of the cipher. Do not
96 reuse an ``initialization_vector`` with
97 a given ``key``.
Paul Kehrer13f108f2013-09-09 21:41:03 -050098
Paul Kehrer45064282013-10-17 13:41:53 -050099
Paul Kehrerd0ec60e2013-10-16 08:46:50 -0500100.. class:: cryptography.primitives.block.modes.CTR(nonce)
101
Paul Kehrer45064282013-10-17 13:41:53 -0500102 .. warning::
103
104 Counter mode is not recommended for use with block ciphers that have a
105 block size of less than 128-bits.
106
Paul Kehrerd0ec60e2013-10-16 08:46:50 -0500107 CTR (Counter) is a mode of operation for block ciphers. It is considered
108 cryptographically strong.
109
Paul Kehrer89b3dd32013-10-17 14:02:45 -0500110 :param bytes nonce: Should be random bytes. It is critical to never reuse a
111 ``nonce`` with a given key. Any reuse of a nonce
112 with the same key compromises the security of every
113 message encrypted with that key. Must be the same
114 number of bytes as the ``block_size`` of the cipher
115 with a given key. The nonce does not need to be kept
116 secret and may be included alongside the ciphertext.
Paul Kehrerd0ec60e2013-10-16 08:46:50 -0500117
David Reidf1a39bd2013-09-11 16:28:42 -0700118.. class:: cryptography.primitives.block.modes.OFB(initialization_vector)
Paul Kehrer6f412a02013-09-10 21:30:50 -0500119
120 OFB (Output Feedback) is a mode of operation for block ciphers. It
121 transforms a block cipher into a stream cipher.
122
David Reidf1a39bd2013-09-11 16:28:42 -0700123 :param bytes initialization_vector: Must be random bytes. They do not need
124 to be kept secret (they can be included
125 in a transmitted message). Must be the
126 same number of bytes as the
127 ``block_size`` of the cipher. Do not
128 reuse an ``initialization_vector`` with
129 a given ``key``.
Paul Kehrer6f412a02013-09-10 21:30:50 -0500130
Paul Kehrer4223df72013-09-11 09:48:04 -0500131.. class:: cryptography.primitives.block.modes.CFB(initialization_vector)
132
133 CFB (Cipher Feedback) is a mode of operation for block ciphers. It
134 transforms a block cipher into a stream cipher.
135
136 :param bytes initialization_vector: Must be random bytes. They do not need
137 to be kept secret (they can be included
138 in a transmitted message). Must be the
139 same number of bytes as the
140 ``block_size`` of the cipher. Do not
141 reuse an ``initialization_vector`` with
142 a given ``key``.
143
Paul Kehrer13f108f2013-09-09 21:41:03 -0500144
145Insecure Modes
146--------------
147
Alex Gaynorcd413a32013-09-10 18:59:43 -0700148.. warning::
149
150 These modes are insecure. New applications should never make use of them,
151 and existing applications should strongly consider migrating away.
152
153
Paul Kehrer13f108f2013-09-09 21:41:03 -0500154.. class:: cryptography.primitives.block.modes.ECB()
155
156 ECB (Electronic Code Book) is the simplest mode of operation for block
Alex Gaynorcd413a32013-09-10 18:59:43 -0700157 ciphers. Each block of data is encrypted in the same way. This means
158 identical plaintext blocks will always result in identical ciphertext
159 blocks, and thus result in information leakage