tiny-encrypt-rs
IMPORTANT: To use tiny-encrypt, a Yubikey(https://www.yubico.com/products/) is required, the key MUST support PIV or OpenPGP.
Tiny encrypt for Rust
Specification: Tiny Encrypt Spec V1.1
Tiny encrypt rs is a Rust implementation of Tiny encrypt java https://git.hatter.ink/hatter/tiny-encrypt-java
Tiny encrypt spec see: https://github.com/OpenWebStandard/tiny-encrypt-format-spec
Repository address: https://git.hatter.ink/hatter/tiny-encrypt-rs mirror https://github.com/jht5945/tiny-encrypt-rs
Set default encryption algorithm:
export TINY_ENCRYPT_DEFAULT_ALGORITHM='AES' # or CHACHA20
Compile only encrypt:
cargo build --release --no-default-features
Edit encrypted file:
tiny-encrypt decrypt --edit-file sample.txt.tinyenc
Read environment EDITOR or SECURE_EDITOR to edit file, SECURE_EDITOR write encrypted file to temp file.
Secure editor command format:
$SECURE_EDITOR <temp-file-name> "aes-256-gcm" <temp-key-hex> <temp-nonce-hex>
Encrypt config ~/.tinyencrypt/config-rs.json:
{
"envelops": [
{
"type": "pgp",
"kid": "KID-1",
"desc": "this is key 001",
"publicPart": "----- BEGIN PUBLIC KEY ..."
},
{
"type": "ecdh",
"kid": "KID-2",
"desc": "this is key 002",
"publicPart": "04..."
}
],
"profiles": {
"default": [
"KID-1",
"KID-2"
],
"l2,leve2": [
"KID-2"
]
}
}
Supported PKI encryption types:
| Type | Algorithm | Description |
|---|---|---|
| pgp-rsa | PKCS1-v1.5 | OpenPGP Encryption Key (Previous pgp) |
| pgp-x25519 | ECDH(X25519) | OpenPGP Encryption Key |
| static-x25519 | ECDH(X25519) | Key Stored in KeyChain |
| piv-p256 | ECDH(secp256r1) | PIV Slot (Previous ecdh) |
| piv-p384 | ECDH(secp384r1) | PIV Slot (Previous ecdh-p384) |
| key-p256 | ECDH(secp256r1) | Key Stored in Secure Enclave |
| piv-rsa | PKCS1-v1.5 | PIV Slot |
Smart Card(Yubikey) protected ECDH Encryption description:
┌───────────────────┐ ┌───────────────────────────┐
│Tiny Encrypt │ │Smart Card (Yubikey) │
│ │ Get Public Key(P) │ │
│ │ ◄───────────────────┤ Private Key(d) │
│ │ │ P = dG │
│ │ Temp Private Key(k) │ │
└───────────────────┘ Q = kG └───────────────────────────┘
Shared Secret = kP = kdG
Store Q, Encrypt using derived key from Shared Secret
Send Q to Smart Card
───────────────────►
Shared Secret = dQ = kdG
Decrypt using derived key from restored Shared Secret
