Software:Libgcrypt
Original author(s) | Werner Koch | ||||
---|---|---|---|---|---|
Developer(s) | GnuPG community[1] | ||||
Stable release(s) [±] | |||||
| |||||
Written in | C | ||||
Operating system | Cross-platform | ||||
Type | Cryptographic library | ||||
License | GNU Lesser General Public License (LGPLv2.1+) / GNU General Public License (GPLv2+)[4] | ||||
Website | gnupg |
Libgcrypt is a cryptography library developed as a separated module of GnuPG.[5] It can also be used independently of GnuPG, but depends on its error-reporting library Libgpg-error.[6]
It provides functions for all fundamental cryptographic building blocks:
Primitive or Operation | Algorithms or Implementation[7] |
---|---|
symmetric ciphers:[8] | AES (128, 192, 256 bits), DES, 3DES, IDEA, CAST5, Blowfish, Twofish (128, 256 bits), Ron's Cipher 2 / RC2 (40, 128 bits), ARCfour / RC4, SEED (RFC 4269), Serpent (128, 192, 256 bits), Camellia (128, 192, 256 bits), Salsa20, Salsa20/12, ChaCha20, GOST 28147-89 (RFC 5830) / GOST R 34.12-2015 (Magma: RFC 8891 & Kuznyechik: RFC 7801), SM4 |
cipher modes:[9] | ECB, CFB, CBC, OFB, CTR, CCM, GCM, OCB, EAX, XTS, Stream, AES Key Wrap (RFC 3394), SIV and GCM-SIV (RFC 5297), AES Key Wrap with padding (RFC 5649) |
public key algorithms:[10][11] | RSA, ElGamal, DSA, ECDSA, EdDSA, Ed448, DH, EDH, ECDH |
hash algorithms:[12] | MD2, MD4, MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256, RIPEMD-160, TIGER/192, TIGER1, TIGER2, Whirlpool, CRC-24 (as in RFC 2440), CRC-32 (as in ISO 3309), CRC-32 (as in RFC 1510), GOST R 34.11-94 / GOST 34.311-95, GOST R 34.11-2012 (Stribog) / RFC 6986, BLAKE2b (128, 160, 224, 256 Bits), BLAKE2s (160, 256, 384, 512 Bits), SM3[13] |
message authentication codes (MACs):[14] | HMAC for all hash algorithms, CMAC for all cipher algorithms, GMAC for some cipher algorithms, Poly1305 |
key derivation functions (KDFs):[15] | S2K (as in RFC 4880: simple, salted, iterated+salted), PBKDF2, SCRYPT, Argon2d, Argon2i, Argon2id, Balloon |
elliptic curves: | NIST (P-256, P-384, P-521), SECG (secp256k1), ECC Brainpool / RFC 5639 (P256r1, P384r1, P512r1), Bernstein (Curve25519, Curve448), GOST R 34.10-2012 (RFC 7091), SM2[16] |
Libgcrypt features its own multiple precision arithmetic implementation, with assembler implementations for a variety of processors, including Alpha, AMD64, HP PA-RISC, i386, i586, M68K, MIPS 3, PowerPC, and SPARC. It also features an entropy gathering utility, coming in different versions for Unix-like and Windows machines.
Usually multiple, stable branches of Libgcrypt are maintained in parallel; since 2022-03-28 this is the Libgrypt 1.10 branch as stable branch, plus the 1.8 branch as LTS ("long-term support") branch, which will be maintained at least until 2024-12-31.[17]
See also
References
- ↑ "AUTHORS". https://dev.gnupg.org/source/libgcrypt/browse/master/AUTHORS.
- ↑ "Libgcrypt 1.10.3 released". dev.gnupg.org. 2023-11-14. https://dev.gnupg.org/source/libgcrypt/browse/LIBGCRYPT-1.10-BRANCH/NEWS%3Blibgcrypt-1.10.3?view=raw.
- ↑ "Libgcrypt 1.8.11 released". dev.gnupg.org. 2023-11-16. https://dev.gnupg.org/source/libgcrypt/browse/LIBGCRYPT-1.8-BRANCH/NEWS%3Blibgcrypt-1.8.11?view=raw.
- ↑ "Copying". Libgcrypt. 2021-02-04. https://gnupg.org/software/libgcrypt/index.html#sec-1-2. Retrieved 2021-02-09.
- ↑ Koch, Werner (1998-12-04). "libgcrypt" (Mailing list). gnupg-devel. Retrieved 2017-08-30.
- ↑ "Libgpg-error". GnuPG software. 2017-03-22. https://gnupg.org/software/libgpg-error/index.html. Retrieved 2017-12-13.
- ↑ "src/cipher.h". 2017-06-16. https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=src/cipher.h;hb=HEAD. Retrieved 2017-08-30.
- ↑ "Available ciphers". The Libgcrypt Reference Manual. 2017-08-27. https://www.gnupg.org/documentation/manuals/gcrypt/Available-ciphers.html. Retrieved 2017-08-30.
- ↑ "Available cipher modes". The Libgcrypt Reference Manual. 2017-08-27. https://www.gnupg.org/documentation/manuals/gcrypt/Available-cipher-modes.html. Retrieved 2017-08-30.
- ↑ "Available algorithms". The Libgcrypt Reference Manual. 2017-08-27. https://www.gnupg.org/documentation/manuals/gcrypt/Available-algorithms.html. Retrieved 2017-08-30.
- ↑ "Cryptographic Functions". The Libgcrypt Reference Manual. 2017-08-27. https://www.gnupg.org/documentation/manuals/gcrypt/Cryptographic-Functions.html. Retrieved 2017-08-30.
- ↑ "Available hash algorithms". The Libgcrypt Reference Manual. 2017-08-27. https://www.gnupg.org/documentation/manuals/gcrypt/Available-hash-algorithms.html. Retrieved 2017-08-30.
- ↑ "The SM3 Cryptographic Hash Function". Internet Engineering Task Force. 2018-01-08. https://datatracker.ietf.org/doc/html/draft-sca-cfrg-sm3. Retrieved 2023-11-16.
- ↑ "Available MAC algorithms". The Libgcrypt Reference Manual. 2017-08-27. https://www.gnupg.org/documentation/manuals/gcrypt/Available-MAC-algorithms.html. Retrieved 2017-08-30.
- ↑ "Key Derivation". The Libgcrypt Reference Manual. 2017-08-27. https://www.gnupg.org/documentation/manuals/gcrypt/Key-Derivation.html. Retrieved 2017-08-30.
- ↑ "SM2 Digital Signature Algorithm". Internet Engineering Task Force. 2014-02-14. https://datatracker.ietf.org/doc/html/draft-shen-sm2-ecdsa. Retrieved 2023-11-16.
- ↑ "End-of-life dates for GnuPG and Libgcrypt". GnuPG software. 2021-02-04. https://gnupg.org/download/#end-of-life. Retrieved 2021-02-07.
Original source: https://en.wikipedia.org/wiki/Libgcrypt.
Read more |