NAME
Crypt::Sodium::XS::OO::secretbox - Secret key authenticated encryption
SYNOPSIS
use Crypt::Sodium::XS::OO::secretbox;
my $sbox = Crypt::Sodium::XS::OO::secretbox->new;
# or use the shortcut
# use Crypt::Sodium::XS;
# my $sbox = Crypt::Sodium::XS->secretbox;
use Crypt::Sodium::XS "sodium_increment";
my $sk = $sbox->keygen;
my $nonce = $sbox->nonce;
my $ct = $sbox->encrypt("hello", $nonce, $sk);
my $pt = $sbox->decrypt($ct, $nonce, $sk);
# $pt is now "hello" (MemVault)
$nonce = sodium_increment($nonce);
($ct, my $mac) = $sbox->encrypt_detached("world", $nonce, $sk);
$pt = $sbox->decrypt_detached($ct, $mac, $nonce, $sk);
# $pt is now "world" (MemVault)
DESCRIPTION
Encrypts a message with a key and a nonce to keep it confidential.
Computes an authentication tag. This tag is used to make sure that the message hasn't been tampered with before decrypting it.
A single key is used both to encrypt/authenticate and verify/decrypt messages. For this reason, it is critical to keep the key confidential.
The nonce doesn't have to be confidential, but it should never ever be reused with the same key. The easiest way to generate a nonce is to use "nonce".
Messages encrypted are assumed to be independent. If multiple messages are sent using this API and random nonces, there will be no way to detect if a message has been received twice, or if messages have been reordered. If this is a requirement, see Crypt::Sodium::XS::secretstream.
CONSTRUCTOR
new
my $sbox = Crypt::Sodium::XS::OO::secretbox->new;
my $sbox
= Crypt::Sodium::XS::OO::secretbox->new(primitive => 'xsalsa20poly1305');
my $sbox = Crypt::Sodium::XS->secretbox;
Returns a new secretbox object for the given primitive. If not given, the default primitive is default
.
METHODS
PRIMITIVE
my $default_primitive = $sbox->PRIMITIVE;
NONCEBYTES
my $nonce_length = $sbox->NONCEBYTES;
KEYBYTES
my $key_length = $sbox->KEYBYTES;
MACBYTES
my $mac_length = $sbox->MACBYTES;
primitives
my @primitives = $pwhash->primitives;
Returns a list of all supported primitive names (including 'default').
decrypt
my $plaintext = $sbox->decrypt($ciphertext, $nonce, $key);
Croaks on decryption failure.
decrypt_detached
my $plaintext = $sbox->decrypt_detached($ciphertext, $mac, $nonce, $key);
Croaks on decryption failure.
encrypt
my $ciphertext = $sbox->encrypt($message, $nonce, $key);
encrypt_detached
my ($ciphertext, $mac) = $sbox->encrypt($message, $nonce, $key);
keygen
my $key = $sbox->keygen;
nonce
my $nonce = $sbox->nonce;
my $nonce = $sbox->nonce($base);
SEE ALSO
- Crypt::Sodium::XS
- Crypt::Sodium::XS::secretbox
- https://doc.libsodium.org/secret-key_cryptography/secretbox
FEEDBACK
For reporting bugs, giving feedback, submitting patches, etc. please use the following:
RT queue at https://rt.cpan.org/Dist/Display.html?Name=Crypt-Sodium-XS
IRC channel
#sodium
onirc.perl.org
.Email the author directly.
For any security sensitive reports, please email the author directly or contact privately via IRC.
AUTHOR
Brad Barden <perlmodules@5c30.org>
COPYRIGHT & LICENSE
Copyright (c) 2022 Brad Barden. All rights reserved.
This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself.