mirror of
https://github.com/vlang/v.git
synced 2025-09-13 14:32:26 +03:00
.. | ||
chacha.v | ||
chacha_64bitctr_test.v | ||
chacha_test.v | ||
README.md | ||
xchacha.v | ||
xchacha_test.v |
module chacha20
chacha20
Chacha20 (and XChacha20) stream cipher encryption algorithm in pure V. Its mostly based on RFC 8439 and inspired by Go version of the same library.
Status
This module already supports a 32-bit counter mode, and recently expanded to support a 64-bit counter mode. The implemented features at the time of writing (2025/03/27) are:
- Support for standard IETF ChaCha20 with 32-bit counter, and 12 bytes nonce
- Support for extended ChaCha20 (XChaCha20) constructions with 24 bytes nonce
- Support for original ChaCha20 with 8 bytes nonce and 64-bit counter.
Example
import crypto.rand
import x.crypto.chacha20
fn main() {
// Simplified examples to create cipher's with 64-bit counter
key := rand.read(32)!
nonce := rand.read(8)!
// just pass 32-bytes key and 8-bytes nonce to build cipher with 64-bit counter
mut c := chacha20.new_cipher(key, nonce)!
// do with yours cipher
}
Complete example
module main
import encoding.hex
import x.crypto.chacha20
fn main() {
// example of random key
// you should make sure the key (and nonce) are random enough.
// The security guarantees of the ChaCha20 require that the same nonce
// value is never used twice with the same key.
key := hex.decode('bf32a829ebf86d23f6a32a74ef0333401e54a6b2900d35bfadef82c5d49da15f')!
nonce := hex.decode('a7d7cf3405631f25cc1054bd')!
input := 'Good of gambler'.bytes()
// encrypt and the decrypt back
output := chacha20.encrypt(key, nonce, input)!
input_back := chacha20.decrypt(key, nonce, output)!
// should true
assert input == input_back
}