Libgcrypt
Developer(s) | Werner Koch |
---|---|
Stable release |
1.6.3 (February 27, 2015[1]) [±] |
Written in | C |
Operating system | Multi-platform |
Type | Cryptographic library |
License | GNU Lesser General Public License GNU General Public License |
Website | http://directory.fsf.org/project/libgcrypt/ |
Libgcrypt is a cryptographic library developed as a separated module of GnuPG.[3] It can also be used independently of GnuPG, although it requires its error-reporting library.
It provides functions for all cryptographic building blocks:
- symmetric ciphers:[4] IDEA, 3DES, CAST5, Blowfish, AES (128, 192, 256 bits), Twofish (256, 128 bits), Arcfour, DES, Serpent (128, 192, 256 bits), Ron's Cipher 2 (40, 128 bits), SEED, Camellia (128, 192, 256 bits), Salsa20, Salsa20/12, GOST 28147-89
- cipher modes:[5] ECB, CFB, CBC, OFB, CTR, AES-Wrap algorithm (RFC 3394), CCM, GCM, Stream
- public key algorithms:[6][7] RSA, DSA, ElGamal, ECDSA, EdDSA (Ed25519)
- hash algorithms:[8] SHA-1, RIPEMD-160, MD5, MD4, TIGER/192 (used by GnuPG <= 1.3.2), TIGER, TIGER2, SHA-224, SHA-256, SHA-384, SHA-512, CRC32 (ISO 3309, RFC 1510, RFC 1510), CRC24 (RFC 2440), Whirlpool, GOST R 34.11-94, GOST R 34.11-2012 (256, 512 bits),
- MACs:[9] HMAC, CMAC, GMAC
- key derivation:[10] S2K (RFC 4880: simple, salted, iterated+salted), PBKDF2, SCRYPT
Libgcrypt features its own multiple precision arithmetic implementation, with assembler implementations for a variety of processors, including alpha, amd64, HP PA-RISC, i386, i586, m68k, mips3, powerpc, and sparc. It also features an entropy gathering utility, coming in different versions for Unix-like and Windows machines.
References
- ↑ Koch, Werner (2015-02-27). "[Announce] Libgcrypt 1.6.3 released (with SCA fix)" (Mailing list). gnupg-announce. Retrieved 2015-02-28.
- ↑ Koch, Werner (2014-08-07). "[Announce] Libgcrypt 1.5.4 released" (Mailing list). gnupg-announce. Retrieved 2014-08-08.
- ↑ Werner Koch (4 December 1998). "libgcrypt". Retrieved 3 December 2010.
- ↑ "Available ciphers - The Libgcrypt Reference Manual". Retrieved 2014-08-08.
- ↑ "Available cipher modes - The Libgcrypt Reference Manual". Retrieved 2014-08-08.
- ↑ "Available algorithms - The Libgcrypt Reference Manual". Retrieved 2014-08-08.
- ↑ "Cryptographic Functions - The Libgcrypt Reference Manual". Retrieved 2014-08-08.
- ↑ "Available hash algorithms - The Libgcrypt Reference Manual". Retrieved 2014-08-08.
- ↑ "Available MAC algorithms - The Libgcrypt Reference Manual". Retrieved 2014-08-08.
- ↑ "Key Derivation - The Libgcrypt Reference Manual". Retrieved 2014-08-08.
|