Skip to content
Oeiuwq Faith Blog OpenSource Porfolio

hexpm/pbcs.json
{
"createdAt": "2018-08-12T17:11:46Z",
"defaultBranch": "main",
"description": null,
"fullName": "hexpm/pbcs",
"homepage": null,
"language": "Elixir",
"name": "pbcs",
"pushedAt": "2021-10-28T17:53:16Z",
"stargazersCount": 20,
"topics": [],
"updatedAt": "2024-02-06T18:37:33Z",
"url": "https://github.com/hexpm/pbcs"
}

Hex version CI

The PBCS library securely protects secrets using passwords by following the style and recommendations in PKCS #5 2.1. As in PKCS #5, this library uses a salt to protect against dictionary attacks and iterates the key derivation function to increase the computation cost of attacks. These parameters and the cryptographic algorithms used are configurable.

Key derivation algorithms include:

Content encryption algorithms include:

  • A256GCM, A192GCM, A128GCM - AES GCM. See RFC 7518 5.3
  • A256CBC-HS512, A192CBC-HS384, A128CBC-HS256 - AES_CBC_HMAC_SHA2. See RFC 7518 5.2.6

Add pbcs to the deps section of your mix.exs file:

def deps do
[
{:pbcs, "~> 0.1.0"}
]
end
protected = %{
alg: "PBES2-HS512",
enc: "A256GCM",
p2c: 4096,
p2s: :crypto.strong_rand_bytes(32)
}
tag = "ARBITRARY_TAG"
cipher_text = PBCS.encrypt({tag, "Text to encrypt"}, protected, password: "12345")
{:ok, "Text to encrypt"} = PBCS.decrypt({tag, cipher_text}, password: "12345")