Crypto.Cipher package contains algorithms for protecting the confidentiality
There are three types of encryption algorithms:
- Symmetric ciphers: all parties use the same key, for both decrypting and encrypting data. Symmetric ciphers are typically very fast and can process very large amount of data.
- Asymmetric ciphers: senders and receivers use different keys. Senders encrypt with public keys (non-secret) whereas receivers decrypt with private keys (secret). Asymmetric ciphers are typically very slow and can process only very small payloads. Example: PKCS#1 OAEP (RSA).
- Hybrid ciphers: the two types of ciphers above can be combined in a construction that inherits the benefits of both. An asymmetric cipher is used to protect a short-lived symmetric key, and a symmetric cipher (under that key) encrypts the actual message.
The base API of a cipher is fairly simple:
You instantiate a cipher object by calling the
new()function from the relevant cipher module (e.g.
Crypto.Cipher.AES.new()). The first parameter is always the cryptographic key; its length depends on the particular cipher. You can (and sometimes must) pass additional cipher- or mode-specific parameters to
new()(such as a nonce or a mode of operation).
For encrypting data, you call the
encrypt()method of the cipher object with the plaintext. The method returns the piece of ciphertext. Alternatively, with the
outputparameter you can specify a pre-allocated buffer for the result.
For most algorithms, you may call
encrypt()multiple times (i.e. once for each piece of plaintext).
For decrypting data, you call the
decrypt()method of the cipher object with the ciphertext. The method returns the piece of plaintext. The
outputparameter can be passed here too.
- For most algorithms, you may call
- (i.e. once for each piece of ciphertext).
Plaintexts and ciphertexts (input/output) can only be
In Python 3, you cannot pass strings.
In Python 2, you cannot pass Unicode strings.
Often, the sender has to deliver to the receiver other data in addition to ciphertext alone (e.g. initialization vectors or nonces, MAC tags, etc).
This is a basic example:
>>> from Crypto.Cipher import Salsa20 >>> >>> key = b'0123456789012345' >>> cipher = Salsa20.new(key) >>> ciphertext = cipher.encrypt(b'The secret I want to send.') >>> ciphertext += cipher.encrypt(b'The second part of the secret.') >>> print cipher.nonce # A byte string you must send to the receiver too
There are two types of symmetric ciphers:
Block ciphers: ciphers that can only operate on a fixed amount of data. The most important block cipher is AES, which has a block size of 128 bits (16 bytes).
In general, a block cipher is mostly useful only together with a mode of operation, which allows one to encrypt a variable amount of data. Some modes (like CTR) effectively turn a block cipher into a stream cipher.
The widespread consensus is that ciphers that provide only confidentiality, without any form of authentication, are undesireable. Instead, primitives have been defined to integrate symmetric encryption and authentication (MAC). For instance:
- Modern modes of operation for block ciphers (like GCM).
- Stream ciphers paired with a MAC function, like ChaCha20-Poly1305.
A number of ciphers are implemented in this library purely for backward compatibility purposes. They are deprecated or even fully broken and should not be used in new designs.