Enc-File

Encrypt / decrypt files or calculate the HASH from the command line. Written in Rust without use of unsafe code.

Uses XChaCha20Poly1305 (https://docs.rs/chacha20poly1305) or AES-GCM-SIV (https://docs.rs/aes-gcm-siv) for cryptography, bincode (https://docs.rs/bincode) for encoding and BLAKE3 (https://docs.rs/blake3) or SHA256 / SHA512 (https://docs.rs/sha2) for hashing.

Encrypted files are (and have to be) stored as .crpt.

Both encrypt and decrypt override existing files!

Panics at errors making safe execution impossible but functions mostly return results.

To install: clone the repository and build from source or use cargo install enc_file.

Warning: Don't use for anything important, use VeraCrypt or similar instead.

This crate hasn't been audited or reviewed in any sense. I created it to easily encrypt und decrypt non-important files which won't cause harm if known by third parties.

Main menu:

Please enter the corresponding number to continue: 1 Add new key 2 Remove key 3 Encrypt file using ChaCha20Poly1305 4 Decrypt file using ChaCha20Poly1305 5 Encrypt file using AES256-GCM-SIV 6 Decrypt file using AES256-GCM-SIV 7 Calculate Hash

Option to generate a new key.file provided at first run or if no keyfile is detected. Keyfile needs to reside in program directory.

Breaking changes:

Breaking change in Version 0.3: Changed input of some functions. To encrypt/decrypt and hash use e.g. "encrypt_chacha(readfile(example.file).unwrap(), key).unwrap()". Change to keymap to conveniently work with several keys. You can import your old keys using "Add key" -> "manually".

Breaking change in Version 0.2: Using XChaCha20Poly1305 as default encryption/decryption. AES is still available using encryptaes or decryptaes to maintain backwards compability.

Examples

Encrypt/decrypt using XChaCha20Poly1305 and random nonce ```rust use encfile::{encryptchacha, decrypt_chacha};

let text = b"This a test"; //Plaintext to encrypt let key: &str = "an example very very secret key."; //Key will normally be chosen from keymap and provided to the encryptchacha() function let textvec = text.to_vec(); //Convert text to Vec

//Ciphertext stores the len() of encrypted content, the nonce and the actual ciphertext using bincode let ciphertext = encryptchacha(textvec, key).unwrap(); //encrypt vec, returns result(Vec) //let ciphertext = encryptchacha(readfile(example.file).unwrap(), key).unwrap(); //read a file as Vec and then encrypt assert_ne!(&ciphertext, &text); //Check that plaintext != ciphertext

let plaintext = decryptchacha(ciphertext, key).unwrap(); //Decrypt ciphertext to plaintext asserteq!(format!("{:?}", text), format!("{:?}", plaintext)); //Check that text == plaintext ```

Calculate Blake3 Hash ```rust use encfile::{getblake3_hash};

let test = b"Calculating the BLAKE3 Hash of this text"; let testvec = test.tovec(); //Convert text to Vec let hash1 = getblake3hash(testvec.clone()).unwrap(); let hash2 = getblake3hash(testvec).unwrap(); assert_eq!(hash1, hash2); //Make sure hash1 == hash2 ```

To do:

Issues and feedback are highly appreciated.