Skip to content
/ aenker Public

authenticated encryption on the commandline using a chunked construction similar to intermaclib

License

Notifications You must be signed in to change notification settings

ansemjo/aenker

Repository files navigation

aenker

codebeat badge

aenker is a simple commandline utility to encrypt files to a public key (Curve25519) with an authenticated encryption scheme (ChaCha20Poly1305). This is basically an ECIES.

The input is split into smaller chunks internally and is encrypted & authenticated individually. Padding and concatenation is done similarly to InterMAC. The key used for encryption is derived with HKDF using Blake2b after performing anonymous Diffie-Hellman with a given public and a random ephemeral private key. All this is further described in the specification.

Authenticated encryption authenticates the ciphertext upon decryption and combined with the above construction any chunk reordering, bit-flips or even truncation can be detected and are shown as errors. Only ciphertext that has been successfully decrypted and authenticated is ever written to the output. The chunking still alleviates the need to fit the entire file into memory at once or do two passes over all data. Thus you can also encrypt files of many gigabytes.

ALTERNATIVE

See the disclaimer below. Even though I took a number of courses on information security and cryptography, I would not call myself a cryptographer.
If you're looking for a modern and well-vetted encryption tool, you should take a look at age instead.

I believe aenker was started before age existed but the latter has seen much more development.

INSTALLATION

Install directly with go:

go get -u github.com/ansemjo/aenker

Install a binary release / package

Download a release from GitHub (replace $VERSION with the desired release):

curl -Lo aenker https://github.com/ansemjo/aenker/releases/download/$VERSION/aenker-linux-amd64
chmod +x aenker
./aenker --help

Compile from sources:

Download a tarball from GitHub and use the included makefile to build a static binary and embed proper version information:

cd aenker-master/
make
make install PREFIX=~/.local

USAGE

Key Generation

First, you need a keypair. To generate a new random keypair use the builtin keygenerator:

aenker keygen [-f where/to/store/seckey]

Without any arguments, this will store the key in the default location ~/.local/share/aenker/aenkerkey and your public key will be printed to the terminal. Send your public key to anyone who wants to encrypt data for you and keep your private key .. well, private.

If you want to display your public key later or calculate the public key to a given private key, you can use the subcommand show:

aenker show [-k path/to/seckey]

Note: aenker only performs anonymous Diffie-Hellman and the keys are not signed or certified. To protect against man-in-the-middle attacks you should transfer the key over a secure channel or verify the integrity on a different channel.

Encryption / Decryption

Encrypt a simple message using the public key with the subcommand seal:

echo 'Hello, World!' | aenker seal -p lGLD...AFBo= > message.ae

Decrypt messages with the open subcommand. If your key is stored at the default location you can decrypt a message by simply piping the encrypted message into aenker:

aenker open [-k path/to/seckey] < message.ae

Input and output files can be specified with the -i and -o flags respectively. The terms seal and open are commonly used in the context of AEADs but you can also use their aliases encrypt and decrypt if you prefer:

aenker decrypt -i documents.tar.ae -k mykey | tar -xf -

The key flags -p/--peer and -k/--key accept the base64-encoded keys on the commandline or the name of a file which contains the key alone on one line. Specifically, the first match to the regular expression /^[A-Za-z0-9+/]{43}=$/ is used, so you can add as many comments as you like to your key files.

Specifying the key on the commandline is convenient for public keys but should be avoided for private keys:

... | aenker seal -p lGLDUgFvp8TSwJ17VC9k0/T9mNWvfGoJ42zauMkAFBo= > message.ae

Advanced Key Generation

Generally, Curve25519 - and thus aenker - accepts any 32 byte value as a key. You could generate a private key by any other means and then only calculate the public key to distribute it. Possibilities include:

  • reading 32 bytes of system randomness from /dev/urandom
  • use an implementation of Argon2i to derive a key from a password, i.e. ansemjo/stdkdf
  • ...

DOCUMENTATION

All of the commands output a nicely formatted help message, so you can use help at any time:

aenker help

If you prefer, you can instead install and read manpages with:

aenker docs man -d ~/.local/share/man/
man aenker

Completion scripts for your shell can be generated and sourced with:

 . <(aenker docs completion)

File Detection

Append this piece to your ~/.magic file:

0 string aenker\xe7\x9e aenker encrypted file
!:mime application/octet-stream

And file(1) should detect encrypted files as aenker encrypted file.

DISCLAIMER

Please be advised that I am not a professional cryptographer. This is merely a hobby of mine which I hope can be useful to you.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.