JavaScript Elliptic curve cryptography library compatible with PyBitmessage
Go to file
Lee Miller c75d5e7cb2
Some checks failed
buildbot/multibuild_parent Build done.
buildbot/travis_bionic Build done.
Testing / default (push) Failing after 3m25s
Fix workflow file name
2024-06-11 03:05:59 +03:00
.buildbot/node Install browsers in the buildbot container and set CHROME_BIN for npm test 2024-03-01 02:06:09 +02:00
.gitea/workflows Install browsers and set CHROME_BIN in the gitea workflow 2024-02-29 16:01:40 +02:00
.gitignore 1.1 (#34) 2018-12-11 07:47:43 -07:00
.jshintignore Initial commit 2014-12-21 20:46:37 +03:00
.jshintrc Fix for jshint 2.6.3 2015-03-02 14:40:16 +03:00
.npmignore Update .npmignore 2023-01-03 18:44:12 +02:00
.travis.yml fix karma.conf 2019-09-25 16:25:32 -06:00
binding.gyp ECDH (Node) 2015-01-13 22:39:37 +03:00
browser.js Copy pubkey encoding/decoding from index to browser 2024-03-01 02:08:04 +02:00
COPYING Initial commit 2014-12-21 20:46:37 +03:00
docker-test.sh Try to run the existing tests in buildbot, 2023-01-03 18:00:34 +02:00
ecdh.cc update dependencies and secp256k1 api. fixes #42 2019-09-25 14:54:02 -06:00
index.js Add additional functions: 2023-01-03 18:00:44 +02:00
karma.conf.js Define a custom karma launcher - Chromium with --no-sandbox flag 2024-02-29 16:01:51 +02:00
package-lock.json Bump to 1.1.9 and update package 2024-03-08 02:37:57 +02:00
package.json Bump to 1.1.9 and update package 2024-03-08 02:37:57 +02:00
README.md Fix workflow file name 2024-06-11 03:05:59 +03:00
test.js Change tests: update some samples for encryption, comment a test for bad R: 2023-01-03 18:01:06 +02:00

eccrypto Testing Status

NPM

JavaScript Elliptic curve cryptography library for both browserify and node.

Motivation

There is currently not any isomorphic ECC library which provides ECDSA, ECDH and ECIES for both Node.js and Browser and uses the fastest implementation available (e.g. secp256k1-node is much faster than other libraries but can be used only on Node.js). So eccrypto is an attempt to create one.

Implementation details

With the help of browserify eccrypto provides different implementations for Browser and Node.js with the same API. Because WebCryptoAPI defines asynchronous promise-driven API, the implementation for Node needs to use promises too.

  • Use Node.js crypto module/library bindings where possible
  • Use WebCryptoAPI where possible
  • Promise-driven API
  • Only secp256k1 curve, only SHA-512 (KDF), HMAC-SHA-256 (HMAC) and AES-256-CBC for ECIES
  • Compressed key support

Native crypto API limitations

crypto

ECDH only works in Node 0.11+ (see https://github.com/joyent/node/pull/5854), ECDSA only supports keys in PEM format (see https://github.com/joyent/node/issues/6904) and ECIES is not supported at all.

WebCryptoAPI

ECDSA and ECDH are supported in Chrome only on Windows (see also bug 338883), aren't supported by Firefox (fixed only in 36.0+, see bug 1034854; see also feature matrix) and ECIES is not defined at all in WebCryptoAPI draft. Also WebCryptoAPI currently defines only curves recommended by NIST meaning that secp256k1 (K-256) curve is not supported (see also: [1], [2]).

So we use seck256k1 library in Node for ECDSA, elliptic in Browser for ECDSA and ECDH and implement ECIES manually with the help of native crypto API.

Possible future goals

  • Support other curves/KDF/MAC/symmetric encryption schemes

Usage

ECDSA

var crypto = require("crypto");
var eccrypto = require("eccrypto");

// A new random 32-byte private key.
var privateKey = eccrypto.generatePrivate();
// Corresponding uncompressed (65-byte) public key.
var publicKey = eccrypto.getPublic(privateKey);

var str = "message to sign";
// Always hash you message to sign!
var msg = crypto.createHash("sha256").update(str).digest();

eccrypto.sign(privateKey, msg).then(function(sig) {
  console.log("Signature in DER format:", sig);
  eccrypto.verify(publicKey, msg, sig).then(function() {
    console.log("Signature is OK");
  }).catch(function() {
    console.log("Signature is BAD");
  });
});

ECDH

var eccrypto = require("eccrypto");

var privateKeyA = eccrypto.generatePrivate();
var publicKeyA = eccrypto.getPublic(privateKeyA);
var privateKeyB = eccrypto.generatePrivate();
var publicKeyB = eccrypto.getPublic(privateKeyB);

eccrypto.derive(privateKeyA, publicKeyB).then(function(sharedKey1) {
  eccrypto.derive(privateKeyB, publicKeyA).then(function(sharedKey2) {
    console.log("Both shared keys are equal:", sharedKey1, sharedKey2);
  });
});

ECIES

var eccrypto = require("eccrypto");

var privateKeyA = eccrypto.generatePrivate();
var publicKeyA = eccrypto.getPublic(privateKeyA);
var privateKeyB = eccrypto.generatePrivate();
var publicKeyB = eccrypto.getPublic(privateKeyB);

// Encrypting the message for B.
eccrypto.encrypt(publicKeyB, Buffer.from("msg to b")).then(function(encrypted) {
  // B decrypting the message.
  eccrypto.decrypt(privateKeyB, encrypted).then(function(plaintext) {
    console.log("Message to part B:", plaintext.toString());
  });
});

// Encrypting the message for A.
eccrypto.encrypt(publicKeyA, Buffer.from("msg to a")).then(function(encrypted) {
  // A decrypting the message.
  eccrypto.decrypt(privateKeyA, encrypted).then(function(plaintext) {
    console.log("Message to part A:", plaintext.toString());
  });
});

License

eccrypto - JavaScript Elliptic curve cryptography library

Written in 2014-2015 by Kagami Hiiragi kagami@genshiken.org

To the extent possible under law, the author(s) have dedicated all copyright and related and neighboring rights to this software to the public domain worldwide. This software is distributed without any warranty.

You should have received a copy of the CC0 Public Domain Dedication along with this software. If not, see http://creativecommons.org/publicdomain/zero/1.0/.