Security Advisories (3)
CVE-2018-25099 (2018-10-26)

A user can pass anything as the tag into gcm_decrypt_verify() and it will return decrypted plaintext.

CVE-2025-40912 (2025-06-11)

CryptX for Perl before version 0.065 contains a dependency that may be susceptible to malformed unicode. CryptX embeds the tomcrypt library. The versions of that library in CryptX before 0.065 may be susceptible to CVE-2019-17362.

CVE-2025-40914 (2025-06-11)

Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow. CryptX embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.

NAME

Crypt::AuthEnc::CCM - Authenticated encryption in CCM mode

SYNOPSIS

use Crypt::AuthEnc::CCM qw(ccm_encrypt_authenticate ccm_decrypt_verify);

my ($ciphertext, $tag) = ccm_encrypt_authenticate('AES', $key, $nonce, $header, $tag_len, $plaintext);

#### send ($ciphertext, $tag, $nonce, $header) to other party

my $plaintext = ccm_decrypt_verify('AES', $key, $nonce, $header, $ciphertext, $tag);

DESCRIPTION

CCM is a encrypt+authenticate mode that is centered around using AES (or any 16-byte cipher) as aprimitive. Unlike EAX and OCB mode, it is only meant for packet mode where the length of the input is known in advance.

EXPORT

Nothing is exported by default.

You can export selected functions:

use Crypt::AuthEnc::CCM qw(ccm_encrypt_authenticate ccm_decrypt_verify);

FUNCTIONS

ccm_encrypt_authenticate

my ($ciphertext, $tag) = ccm_encrypt_authenticate($cipher, $key, $nonce, $header, $tag_len, $plaintext);

# $cipher .. 'AES' or name of any other cipher with 16-byte block len
# $key ..... AES key of proper length (128/192/256bits)
# $nonce ... unique nonce/salt (no need to keep it secret)
# $header .. meta-data you want to send with the message but not have encrypted

ccm_decrypt_verify

my $plaintext = ccm_decrypt_verify($cipher, $key, $nonce, $header, $ciphertext, $tag);

# on error returns undef

SEE ALSO