blob: e2586aafe6d3bc80b04e29e8e1d8991c5e6177bb [file] [log] [blame]
Alex Gaynorf6c47e92013-08-08 07:16:01 -07001Symmetric Encryption
2====================
3
Donald Stufftf04317a2013-10-27 16:44:30 -04004.. currentmodule:: cryptography.hazmat.primitives.block
David Reid1f3d7182013-10-22 16:55:18 -07005
Donald Stufft173de982013-08-12 07:34:39 -04006.. testsetup::
7
8 import binascii
9 key = binascii.unhexlify(b"0" * 32)
10 iv = binascii.unhexlify(b"0" * 32)
11
12
Alex Gaynorf6c47e92013-08-08 07:16:01 -070013Symmetric encryption is a way to encrypt (hide the plaintext value) material
14where the encrypter and decrypter both use the same key.
15
David Reid1f3d7182013-10-22 16:55:18 -070016.. class:: BlockCipher(cipher, mode)
Alex Gaynorf6c47e92013-08-08 07:16:01 -070017
Alex Gaynor65678d02013-08-08 15:19:19 -070018 Block ciphers work by encrypting content in chunks, often 64- or 128-bits.
Alex Gaynorb12f76e2013-08-08 19:05:18 -070019 They combine an underlying algorithm (such as AES), with a mode (such as
Paul Kehrerd1afe392013-10-22 08:24:44 -050020 CBC, CTR, or GCM). A simple example of encrypting (and then decrypting)
Paul Kehrer653463f2013-10-21 17:55:01 -050021 content with AES is:
Alex Gaynorf6c47e92013-08-08 07:16:01 -070022
Donald Stufft173de982013-08-12 07:34:39 -040023 .. doctest::
Alex Gaynorf6c47e92013-08-08 07:16:01 -070024
Donald Stufftf04317a2013-10-27 16:44:30 -040025 >>> from cryptography.hazmat.primitives.block import BlockCipher, ciphers, modes
Alex Gaynoracc787a2013-08-10 15:52:40 -040026 >>> cipher = BlockCipher(ciphers.AES(key), modes.CBC(iv))
Paul Kehrer3e0895c2013-10-21 22:19:29 -050027 >>> encryptor = cipher.encryptor()
28 >>> ct = encryptor.update(b"a secret message") + encryptor.finalize()
29 >>> decryptor = cipher.decryptor()
30 >>> decryptor.update(ct) + decryptor.finalize()
Paul Kehrerf6cf9562013-10-22 10:36:00 -050031 'a secret message'
Alex Gaynorf6c47e92013-08-08 07:16:01 -070032
Alex Gaynore62aa402013-08-08 15:23:11 -070033 :param cipher: One of the ciphers described below.
34 :param mode: One of the modes described below.
Alex Gaynor0ca7fdb2013-08-08 07:35:26 -070035
Paul Kehrer5399fd02013-10-21 23:48:25 -050036 .. method:: encryptor()
Alex Gaynor09515f02013-08-08 15:26:55 -070037
David Reid63ba6652013-10-22 14:09:19 -070038 :return: An encrypting
Donald Stufftf04317a2013-10-27 16:44:30 -040039 :class:`~cryptography.hazmat.primitives.interfaces.CipherContext`
David Reid63ba6652013-10-22 14:09:19 -070040 provider.
Alex Gaynore62aa402013-08-08 15:23:11 -070041
Paul Kehrer5399fd02013-10-21 23:48:25 -050042 .. method:: decryptor()
43
David Reid63ba6652013-10-22 14:09:19 -070044 :return: A decrypting
Donald Stufftf04317a2013-10-27 16:44:30 -040045 :class:`~cryptography.hazmat.primitives.interfaces.CipherContext`
David Reid63ba6652013-10-22 14:09:19 -070046 provider.
Paul Kehrer5399fd02013-10-21 23:48:25 -050047
Donald Stufftf04317a2013-10-27 16:44:30 -040048.. currentmodule:: cryptography.hazmat.primitives.interfaces
David Reid1f3d7182013-10-22 16:55:18 -070049
50.. class:: CipherContext()
Paul Kehrer5399fd02013-10-21 23:48:25 -050051
52 When calling ``encryptor()`` or ``decryptor()`` on a BlockCipher object you
53 will receive a return object conforming to the CipherContext interface. You
54 can then call ``update(data)`` with data until you have fed everything into
55 the context. Once that is done call ``finalize()`` to finish the operation and
56 obtain the remainder of the data.
57
58
59 .. method:: update(data)
60
61 :param bytes data: The text you wish to pass into the context.
62 :return bytes: Returns the data that was encrypted or decrypted.
Alex Gaynore62aa402013-08-08 15:23:11 -070063
64 .. method:: finalize()
65
Paul Kehrer5399fd02013-10-21 23:48:25 -050066 :return bytes: Returns the remainder of the data.
Alex Gaynord96d1002013-08-08 07:37:26 -070067
68Ciphers
69~~~~~~~
70
Donald Stufftf04317a2013-10-27 16:44:30 -040071.. currentmodule:: cryptography.hazmat.primitives.block.ciphers
David Reid1f3d7182013-10-22 16:55:18 -070072
73.. class:: AES(key)
Alex Gaynor5ba2dfa2013-08-08 11:04:44 -070074
Alex Gaynor1e3f81f2013-08-08 11:31:43 -070075 AES (Advanced Encryption Standard) is a block cipher standardized by NIST.
Alex Gaynor5ba2dfa2013-08-08 11:04:44 -070076 AES is both fast, and cryptographically strong. It is a good default
77 choice for encryption.
78
79 :param bytes key: The secret key, either ``128``, ``192``, or ``256`` bits.
Alex Gaynor48ec9a32013-08-08 11:13:46 -070080 This must be kept secret.
Alex Gaynor5ba2dfa2013-08-08 11:04:44 -070081
David Reid1f3d7182013-10-22 16:55:18 -070082.. class:: Camellia(key)
Paul Kehrerdff22d42013-09-27 13:43:06 -050083
84 Camellia is a block cipher approved for use by CRYPTREC and ISO/IEC.
85 It is considered to have comparable security and performance to AES, but
86 is not as widely studied or deployed.
87
88 :param bytes key: The secret key, either ``128``, ``192``, or ``256`` bits.
89 This must be kept secret.
90
Alex Gaynord96d1002013-08-08 07:37:26 -070091
David Reid1f3d7182013-10-22 16:55:18 -070092.. class:: TripleDES(key)
Alex Gaynoraeb714c2013-09-09 18:06:14 -070093
Alex Gaynor2f355d12013-09-09 18:09:26 -070094 Triple DES (Data Encryption Standard), sometimes refered to as 3DES, is a
Alex Gaynor17adce62013-10-16 17:04:40 -070095 block cipher standardized by NIST. Triple DES has known cryptoanalytic
96 flaws, however none of them currently enable a practical attack.
97 Nonetheless, Triples DES is not reccomended for new applications because it
Alex Gaynorfbcc5642013-10-22 08:26:00 -070098 is incredibly slow; old applications should consider moving away from it.
Alex Gaynoraeb714c2013-09-09 18:06:14 -070099
100 :param bytes key: The secret key, either ``64``, ``128``, or ``192`` bits
101 (note that DES functionally uses ``56``, ``112``, or
102 ``168`` bits of the key, there is a parity byte in each
103 component of the key), in some materials these are
104 referred to as being up to three separate keys (each
105 ``56`` bits long), they can simply be concatenated to
106 produce the full key. This must be kept secret.
107
108
Alex Gaynord96d1002013-08-08 07:37:26 -0700109Modes
110~~~~~
111
Donald Stufftf04317a2013-10-27 16:44:30 -0400112.. currentmodule:: cryptography.hazmat.primitives.block.modes
David Reid1f3d7182013-10-22 16:55:18 -0700113
114.. class:: CBC(initialization_vector)
Alex Gaynor48ec9a32013-08-08 11:13:46 -0700115
116 CBC (Cipher block chaining) is a mode of operation for block ciphers. It is
117 considered cryptographically strong.
118
119 :param bytes initialization_vector: Must be random bytes. They do not need
120 to be kept secret (they can be included
Alex Gaynor2dc2b862013-08-08 11:58:04 -0700121 in a transmitted message). Must be the
122 same number of bytes as the
Alex Gaynor6badd9b2013-08-08 14:59:53 -0700123 ``block_size`` of the cipher. Do not
124 reuse an ``initialization_vector`` with
125 a given ``key``.
Paul Kehrer13f108f2013-09-09 21:41:03 -0500126
Paul Kehrer45064282013-10-17 13:41:53 -0500127
David Reid1f3d7182013-10-22 16:55:18 -0700128.. class:: CTR(nonce)
Paul Kehrerd0ec60e2013-10-16 08:46:50 -0500129
Paul Kehrer45064282013-10-17 13:41:53 -0500130 .. warning::
131
132 Counter mode is not recommended for use with block ciphers that have a
133 block size of less than 128-bits.
134
Paul Kehrerd0ec60e2013-10-16 08:46:50 -0500135 CTR (Counter) is a mode of operation for block ciphers. It is considered
136 cryptographically strong.
137
Paul Kehrer89b3dd32013-10-17 14:02:45 -0500138 :param bytes nonce: Should be random bytes. It is critical to never reuse a
139 ``nonce`` with a given key. Any reuse of a nonce
140 with the same key compromises the security of every
141 message encrypted with that key. Must be the same
142 number of bytes as the ``block_size`` of the cipher
143 with a given key. The nonce does not need to be kept
144 secret and may be included alongside the ciphertext.
Paul Kehrerd0ec60e2013-10-16 08:46:50 -0500145
David Reid1f3d7182013-10-22 16:55:18 -0700146.. class:: OFB(initialization_vector)
Paul Kehrer6f412a02013-09-10 21:30:50 -0500147
148 OFB (Output Feedback) is a mode of operation for block ciphers. It
149 transforms a block cipher into a stream cipher.
150
David Reidf1a39bd2013-09-11 16:28:42 -0700151 :param bytes initialization_vector: Must be random bytes. They do not need
152 to be kept secret (they can be included
153 in a transmitted message). Must be the
154 same number of bytes as the
155 ``block_size`` of the cipher. Do not
156 reuse an ``initialization_vector`` with
157 a given ``key``.
Paul Kehrer6f412a02013-09-10 21:30:50 -0500158
David Reid1f3d7182013-10-22 16:55:18 -0700159.. class:: CFB(initialization_vector)
Paul Kehrer4223df72013-09-11 09:48:04 -0500160
161 CFB (Cipher Feedback) is a mode of operation for block ciphers. It
162 transforms a block cipher into a stream cipher.
163
164 :param bytes initialization_vector: Must be random bytes. They do not need
165 to be kept secret (they can be included
166 in a transmitted message). Must be the
167 same number of bytes as the
168 ``block_size`` of the cipher. Do not
169 reuse an ``initialization_vector`` with
170 a given ``key``.
171
Paul Kehrer13f108f2013-09-09 21:41:03 -0500172
173Insecure Modes
174--------------
175
Alex Gaynorcd413a32013-09-10 18:59:43 -0700176.. warning::
177
178 These modes are insecure. New applications should never make use of them,
179 and existing applications should strongly consider migrating away.
180
181
David Reid1f3d7182013-10-22 16:55:18 -0700182.. class:: ECB()
Paul Kehrer13f108f2013-09-09 21:41:03 -0500183
184 ECB (Electronic Code Book) is the simplest mode of operation for block
Alex Gaynorcd413a32013-09-10 18:59:43 -0700185 ciphers. Each block of data is encrypted in the same way. This means
186 identical plaintext blocks will always result in identical ciphertext
187 blocks, and thus result in information leakage