-
Notifications
You must be signed in to change notification settings - Fork 145
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Asymmetric encryption and decryption support #633
Comments
There are the Will take a play though, it may make sense to expose some seal/open methods on the keypairs itself if sufficient compat. can be achieved. No promises atm. |
Thanks for the response. I have to admit that I don't have a deep understanding of cryptography, but what exactly is the difference between In our library I was able to successfully add encryption/decryption for I didn't see the
Also in the test, it seems that there is a step missing where the sender sends over his public key:
In my own implementation with libsodium I'm using my own publicKey and secretKey to open the box and that seems to work. So it's probably not necessary to send over the senders public key? If that's the case maybe you could rename the parameter in |
Not a cryptographer... however, sr/ed both use the same curves, but sr uses a different (more sane) clamped range. There is some compat, but you cannot use ed keys as sr (range difference), will ask around on the reverse. (And the availability of encrypt/decrypt on the schnorrkel library). So the answer on the compat - "No. It's the same curve but not the same subgroup of the curve, ristretto used the prime order subgroup, and not the same representation for that prime order subgroup. The point is ristretto only permits serializing and deserializing prime order points. " So cannot use the existing ed* functions. |
Thanks for clarifying that. Did they say why there is no encrypt/decrypt for sr*? It sounds like I will have to put this on hold until there is an implementation available :) |
schnorrkel does provide it via the aead module, https://github.com/w3f/schnorrkel/blob/master/src/aead.rs - not exposed in the wasm, but can be. The only caveat is that it is not deemed stable atm. |
Thanks, so we'll wait until that is deemed stable and is exposed in the wasm. |
This issue has been open for 21 days with no activity and is not labelled as an enhancement. It will be closed in 7 days. |
You are free to close this issue if it's not something that you are looking into, but we are still eagerly waiting for this feature to be available (and stable) so we can include it into AirGap Vault. |
This issue has been open for 21 days with no activity and is not labelled as an enhancement. It will be closed in 7 days. |
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue if you think you have a related problem or query. |
I can see that there is support for encryption and decryption for nacl using secretbox. But it looks like it is symmetric because the
encrypt
method needs the secret key.Are there plans to add asymmetric encryption (encrypt with public key, decrypt with public key) as well?
I'm specifically looking for support for a
sr25519
keypair. But I haven't found any other implementations that do this. Are there plans to do this, if even possible?The use case is basically that this would allow you to encrypt a message for a specific address owner.
The text was updated successfully, but these errors were encountered: