Enc_File

Rust Crates.io Documentation Crates.io Crates.io

Encrypt / decrypt files or calculate the HASH from the command line. Written in Rust without use of unsafe code.

Uses XChaCha20Poly1305 (https://docs.rs/chacha20poly1305) or AES-256-GCM-SIV (https://docs.rs/aes-gcm-siv) for cryptography, bincode (https://docs.rs/bincode) for encoding and BLAKE3 (https://docs.rs/blake3) or SHA256 / SHA512 (https://docs.rs/sha2) for hashing.

XChaCha20Poly1305 and AES256-GCM-SIV offer higher protection against (accidental) nonce reuse as compared to ChaCha20Poly1305 or AES-GCM.

Encrypted files are (and have to be) stored as .crpt.

Both encrypt and decrypt override existing files!

Panics at errors making safe execution impossible but functions mostly return results.

To install: clone the repository and build from source, download windows-executable (see "releases") or use cargo install enc_file.

Warning: Don't use for anything important, use VeraCrypt or similar instead.

This crate hasn't been audited or reviewed in any sense. I created it to easily encrypt und decrypt non-important files which won't cause harm if known by third parties.

Usage:

Main menu (if started without any command line arguments)

Please enter the corresponding number to continue: 1 Add new key 2 Remove key 3 Encrypt file using XChaCha20Poly1305 4 Decrypt file using XChaCha20Poly1305 5 Encrypt file using AES-256-GCM-SIV 6 Decrypt file using AES-256-GCM-SIV 7 Calculate Hash

Option to generate a new key.file provided at first run or if no keyfile is detected. Keyfile needs to reside in program directory.

Directly calculate hash

Use enc_file hash file_name to calculate BLAKE3-Hash, enc_file hash_sha256 file_name to calculate SHA256-Hash, enc_file hash_sha512 file_name to calculate SHA512-Hash.

Example: enc_file hash ./cargo.toml -> Hash(65c3342975adeb00ec05dcfab6ccb6af877d3f996957742ec6365541546812e4)

Breaking changes:

Breaking change in Version 0.3: Changed input of some functions. To encrypt/decrypt and hash use e.g. "encrypt_chacha(readfile(example.file).unwrap(), key).unwrap()". Change to keymap to conveniently work with several keys. You can import your old keys using "Add key" -> "manually".

Breaking change in Version 0.2: Using XChaCha20Poly1305 as default encryption/decryption. AES is still available using encryptaes or decryptaes to maintain backwards compability.

Examples

Encrypt/decrypt using XChaCha20Poly1305 and random nonce ```rust use encfile::{encryptchacha, decrypt_chacha};

let text = b"This is a test"; //Plaintext to encrypt let key: &str = "an example very very secret key."; //Key will normally be chosen from keymap and provided to the encryptchacha() function let textvec = text.to_vec(); //Convert text to Vec

//Ciphertext stores the len() of encrypted content, the nonce and the actual ciphertext using bincode let ciphertext = encryptchacha(textvec, key).unwrap(); //encrypt vec, returns result(Vec) //let ciphertext = encryptchacha(readfile(example.file).unwrap(), key).unwrap(); //read a file as Vec and then encrypt assert_ne!(&ciphertext, &text); //Check that plaintext != ciphertext

let plaintext = decryptchacha(ciphertext, key).unwrap(); //Decrypt ciphertext to plaintext asserteq!(format!("{:?}", text), format!("{:?}", plaintext)); //Check that text == plaintext ```

Calculate Blake3 Hash ```rust use encfile::{getblake3_hash};

let test = b"Calculating the BLAKE3 Hash of this text"; let testvec = test.tovec(); //Convert text to Vec let hash1 = getblake3hash(testvec.clone()).unwrap(); let hash2 = getblake3hash(testvec).unwrap(); asserteq!(hash1, hash2); //Make sure hash1 == hash2 let test2 = b"Calculating the BLAKE3 Hash of this text."; //"." added at the end let test2vec = test2.tovec(); let hash3 = getblake3hash(test2vec).unwrap(); assert_ne!(hash1, hash3); //check that the added "." changes the hash ```

To do:

Issues and feedback are highly appreciated.