node-easy-crypto
Provides simple wrappers around Node's crypto implementation. The library provides two interfaces: simple and advanced. Simple mode is designed for ease-of-use and advanced mode provides some performance benefits in certain use-cases. See below for more details.
All the underlying crypto operations are the same.
Simple usage (Recommended)
To get started just require the lib and create an instance right away.
const crypto = require('crypto');
const easyCrypto = require('@emartech/easy-crypto');
const password = crypto.randomBytes(24).toString('hex');
const randomData = crypto.randomBytes(1024).toString('hex');
const ecrypto = easyCrypto(password);
async function exampleAsyncFunction() {
const encrypted = await ecrypto.encrypt(randomData);
const decrypted = await ecrypto.decrypt(encrypted);
randomData === decrypted; //true
}
Advanced usage (Use for performance)
Key derivation is a resource heavy process. The default settings recompute the key before each encryption/decryption process.
These options allow you to cache the result of the key derivation. This is required if you need to encrypt/decrypt multiple times with the same derived key. Caching the keys with node-cache saves you the time to have to recompute it before every encryption/decryption.
To get started just require the lib and create an instance right away.
const crypto = require('crypto');
const easyCrypto = require('@emartech/easy-crypto');
const password = crypto.randomBytes(24).toString('hex');
const randomData = [
crypto.randomBytes(1024).toString('hex'),
crypto.randomBytes(1024).toString('hex'),
crypto.randomBytes(1024).toString('hex')
];
const ecrypto = easyCrypto(password, {
encryptCacheTtl: 3600,
decryptCachePoolSize: 100,
});
async function exampleAsyncFunction() {
const encrypted = await Promise.all(
randomData.map(item => ecrypto.encrypt(item))
);
const decrypted = await Promise.all(
encrypted.map(item => ecrypto.decrypt(item))
);
return data.reduce((allValid, item, index) => {
return allValid && item === decrypted[index];
}, true);
}
Interface
Initialization
There aren't too many options you can change and that is on purpose. This small wrapper library is secure by default. You can change two configurations: encryptCacheTtl
, decryptCachePoolSize
by passing them to the initialization function as follows:
let ecrypto = require('@emartech/easy-crypto')('password', {
encryptCacheTtl: 3600,
decryptCachePoolSize: 100,
});
password
password
should be any normal string. It will be used to generate the encryption key.
encryptCacheTtl
Time in seconds while the same key is reused during encryption. Must be an integer.
decryptCachePoolSize
Maximum number of keys kept in the cache during decryption. Must be an integer.
plaintext
) -> ciphertext
encrypt(plaintext
must be utf-8
encoded string. It will be "converted" to bytes
and those will be used for the cryptographic operations. The output of this operations is base64
encoded buffers. This will be used as the input of the decrypt
operation. This return value is a Promise
.
ciphertext
) -> plaintext
decrypt(ciphertext
must be the output of the encrypt
method. The library is not compatible with any other encryption library out of the box! The output of this operation is the original utf-8
encoded string. This return value is a Promise
.
The crypto parts
The library is only a thin wrapper of node's own crypto
module. It uses well known and battle tested encryption techniques. It provides a convenient wrapper around these functions, taking away the details of using encryption correctly. Feel free to explore the source!
Encryption process
- It generates random bytes for later operations
-
passwordSaltSize
randombytes
are used to create the256 bit
long encryption key from thepassword
usingpbkdf2
and the giveniteration count
- The
plaintext
is encrypted usingaes-256-gcm
with the generated key and a12 bytes
long randominitialization vector
, this operation also yields a16 bytes
longauthentication tag
, which can be used to verify the encrypted data's integrity - It concatenates the following data to into a buffer:
passwordSalt bytes
,initialization vector bytes
,ciphertext bytes
,authentication tag bytes
- It encodes the whole buffer using
base64
and returns it
Decryption process
- It decodes the
base64
input to bytes - It slices this data into:
passwordSalt bytes
,initialization vector bytes
,ciphertext bytes
,authentication tag bytes
- The
passwordSalt bytes
and thepassword
are used to generate the256 bit
long encryption key usingpbkdf2
and the giveniteration count
- The
ciphertext bytes
are decrypted usingaes-256-gcm
with the generated key theinitialization vector bytes
. During encryption the integrity of the date is also verified using theauthentication tag bytes
- It encodes the decrypted buffer using
utf-8
and returns it
Found a bug? Have a comment?
Please find us, we would love your feedback!