Pandatech.Crypto
3.0.0
dotnet add package Pandatech.Crypto --version 3.0.0
NuGet\Install-Package Pandatech.Crypto -Version 3.0.0
<PackageReference Include="Pandatech.Crypto" Version="3.0.0" />
paket add Pandatech.Crypto --version 3.0.0
#r "nuget: Pandatech.Crypto, 3.0.0"
// Install Pandatech.Crypto as a Cake Addin #addin nuget:?package=Pandatech.Crypto&version=3.0.0 // Install Pandatech.Crypto as a Cake Tool #tool nuget:?package=Pandatech.Crypto&version=3.0.0
PandaTech.Crypto
Introduction
PandaTech.Crypto is a wrapper library that consolidates several widely used cryptographic libraries and tools into
one
simple-to-use package. It eliminates the need for multiple dependencies, excessive using
directives, and
duplicated
code, offering an intuitive API to streamline most popular cryptographic tasks.
Whether you need to encrypt data, hash passwords, or generate secure random tokens, PandaTech.Crypto provides lightweight abstractions over popular cryptographic solutions, ensuring simplicity and usability without sacrificing performance.
The Argon2Id password hashing is optimized to run efficiently even in resource-constrained environments (e.g., hash generation under 500ms on a container with 1 vCore and 1GB of RAM). Other operations such as AES encryption, SHA hashing, and GZip compression are lightweight enough for almost any environment.
Installation
Install the NuGet package via the Package Manager Console:
Install-Package Pandatech.Crypto
How to Use
Configuring in Program.cs
Use the following code to configure AES256 and Argon2Id in your Program.cs
:
using Pandatech.Crypto.Helpers;
using Pandatech.Crypto.Extensions;
var builder = WebApplication.CreateBuilder(args);
var app = builder.Build();
// Register AES key
app.AddAes256Key("YourBase64EncodedAes256KeyHere");
// Optional - Change default Argon2Id configurations. If below method is not called, default configurations will be used.
app.ConfigureArgon2Id(options =>
{
options.SaltSize = 16;
options.DegreeOfParallelism = 8;
options.Iterations = 5;
options.MemorySize = 128 * 1024;
});
app.Run();
AES256 Class
Encryption/Decryption methods with hashing
using Pandatech.Crypto.Helpers;
// Encrypt using AES256
var encryptedBytes = Aes256.Encrypt("your-plaintext");
// Decrypt AES256-encrypted data
var decryptedText = Aes256.Decrypt(encryptedBytes);
Encryption/Decryption methods without hashing
byte[] cipherText = aes256.EncryptWithoutHash("your-plaintext");
string plainText = aes256.DecryptWithoutHash(cipherText);
Encryption/Decryption methods with custom key (overriding options for one time)
string customKey = "your-custom-base64-encoded-key";
// Encrypt with a custom key
var encrypted = Aes256.Encrypt("your-plaintext", customKey);
// Decrypt with the same key
var decrypted = Aes256.Decrypt(encrypted, customKey);
Stream-based Encryption/Decryption methods
using var inputStream = new MemoryStream(Encoding.UTF8.GetBytes("your-plaintext"));
using var outputStream = new MemoryStream();
// Encrypt stream
Aes256.Encrypt(inputStream, outputStream, "your-base64-key");
// Decrypt stream
using var decryptedStream = new MemoryStream(outputStream.ToArray());
Aes256.Decrypt(decryptedStream, outputStream, "your-base64-key");
string decryptedText = Encoding.UTF8.GetString(outputStream.ToArray());
Notes
- IV: A random IV is generated for each Encryption, enhancing security.
- PaddingMode: PKCS7
- Hashing: The AES256 class by defaults also uses SHA3 512 hash before encryption and stores it in front of byte array in order to be able to do unique cheques and other operations on encrypted fields. For example imagine you are encrypting emails in your software and also want that emails to be unique. With our Aes256 class by default your emails will be unique as in front will be the unique hash.
Argon2id Class
Default Configurations
- Salt: A random salt is generated for each password hash, enhancing security.
- DegreeOfParallelism: 8
- Iterations: 5
- MemorySize: 128 MB
Examples on usage
using Pandatech.Crypto.Helpers;
// Hash a password using Argon2Id
var hashedPassword = Argon2Id.HashPassword("yourPassword");
// Verify a hashed password
bool isValid = Argon2Id.VerifyHash("yourPassword", hashedPassword);
Random Class
var randomBytes = Random.GenerateBytes(16);
var aesKey = Random.GenerateAes256KeyString();
var unimaginableUniqueAndRandomToken = Random.GenerateSecureToken() //256-bit token in string format
Password Class
var includeUppercase = true;
var includeLowercase = true;
var includeDigits = true;
var includeSpecialChars = true;
//Method for generating random password
string password = Password.GenerateRandom(16, includeUppercase, includeLowercase, includeDigits, includeSpecialChars);
//Method for validation of password
bool isValid = Password.Validate(password, 16, includeUppercase, includeLowercase, includeDigits, includeSpecialChars);
Sha2 Class
The Sha2
class simplifies HMAC-SHA256 operations by offering byte array, hex, and Base64 outputs. It also hat params
string[] where the method automatically concatenates all strings and then computes the hash.
// Prepare the key and message
var key = Encoding.UTF8.GetBytes("secret");
var message1 = "Hello";
var message2 = "World";
// Compute HMAC-SHA256 as a byte array
byte[] hashBytes = Sha2.ComputeHmacSha256(key, message1, message2);
// Get HMAC-SHA256 as a hex string
string hexHash = Sha2.GetHmacSha256Hex(key, message1, message2);
// Output: 2e91612bb72b29d82f32789d063de62d5897a4ee5d3b5d34459801b94397b099
// Get HMAC-SHA256 as a Base64 string
string base64Hash = Sha2.GetHmacSha256Base64(key, message1, message2);
// Output: LpFhK7crKdgvMnidBj3mLViXpO5dO100RZgBuUOXsJk=
Sha3 Class
// Example usage for generating hash
var sha3Hash = Sha3.Hash("yourPlainText");
// Example usage for verifying a hash
var isHashValid = Sha3.VerifyHash("yourPlainText", sha3Hash);
GZip Class
Compression and Decompression
The GZip
class provides methods for compressing and decompressing data using GZip. It supports operations on strings,
byte arrays, and streams.
Example usage for compressing and decompressing a string:
using Pandatech.Crypto;
// Compress a string
string data = "Sample Data";
byte[] compressedData = GZip.Compress(data);
// Decompress back to string
string decompressedData = Encoding.UTF8.GetString(GZip.Decompress(compressedData));
Example usage for compressing and decompressing with streams:
using var inputStream = new MemoryStream(Encoding.UTF8.GetBytes("Sample Data"));
using var compressedStream = new MemoryStream();
GZip.Compress(inputStream, compressedStream);
byte[] compressedData = compressedStream.ToArray();
using var inputStream = new MemoryStream(compressedData);
using var decompressedStream = new MemoryStream();
GZip.Decompress(inputStream, decompressedStream);
string decompressedData = Encoding.UTF8.GetString(decompressedStream.ToArray());
Mask Class
The Mask
class in the PandaTech.Crypto library provides methods to mask sensitive information like email addresses and
phone numbers, ensuring that they are partially hidden and thus safeguarded.
Masking Email Addresses
The MaskEmail
method masks the local part of an email address, showing only the first two characters and replacing the
rest with asterisks (*), keeping the domain part intact.
// Example usage for masking an email
string maskedEmail = Mask.MaskEmail("example@email.com");
// Output: "ex*****@email.com"
// Example usage for masking a phone number
string maskedPhone = Mask.MaskPhoneNumber("1234567890");
// Output: "******7890"
// You can also use the MaskEmail and MaskPhoneNumber methods as extension methods on strings
string maskedEmail = "example@email.com";
string maskedPhone = "1234567890";
string maskedEmail = maskedEmail.MaskEmail();
string maskedPhone = maskedPhone.MaskPhoneNumber();
License
PandaTech.Crypto is licensed under the MIT License.
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net8.0 is compatible. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
-
net8.0
- BouncyCastle.NetCore (>= 2.2.1)
- Konscious.Security.Cryptography.Argon2 (>= 1.3.1)
- Microsoft.AspNetCore.OpenApi (>= 8.0.10)
- Microsoft.Extensions.DependencyInjection (>= 8.0.1)
- Pandatech.RegexBox (>= 2.0.1)
NuGet packages (2)
Showing the top 2 NuGet packages that depend on Pandatech.Crypto:
Package | Downloads |
---|---|
PandaTech.IEnumerableFilters
This NuGet helps with filtering tables. |
|
Pandatech.EFCoreQueryMagic
Unlock the full potential of your Entity Framework Core applications with Pandatech.EFCoreQueryMagic. This innovative package empowers developers to seamlessly create dynamic, complex queries and filters for SQL tables without diving deep into the intricacies of LINQ or manual query construction. Designed to enhance productivity and maintainability, EFCoreQueryMagic automates the translation of front-end filter requests into optimized, ready-to-execute EF Core queries. Embrace the magic of streamlined data retrieval and manipulation, and elevate your applications to new heights of efficiency and performance. |
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
3.0.0 | 65 | 10/28/2024 |
2.6.1 | 93 | 10/19/2024 |
2.6.0 | 85 | 10/19/2024 |
2.5.1 | 100 | 10/18/2024 |
2.5.0 | 143 | 6/21/2024 |
2.4.1 | 106 | 6/14/2024 |
2.4.0 | 117 | 6/13/2024 |
2.3.2 | 234 | 5/9/2024 |
2.3.1 | 599 | 3/6/2024 |
2.3.0 | 122 | 3/6/2024 |
2.2.11 | 112 | 3/6/2024 |
2.2.10 | 114 | 3/1/2024 |
2.2.9 | 140 | 2/17/2024 |
2.2.8 | 99 | 2/17/2024 |
2.2.7 | 126 | 2/12/2024 |
2.2.6 | 138 | 1/23/2024 |
2.2.5 | 108 | 1/23/2024 |
2.2.4 | 119 | 1/19/2024 |
2.2.3 | 474 | 11/29/2023 |
2.2.2 | 117 | 11/29/2023 |
2.2.1 | 224 | 11/23/2023 |
2.2.0 | 150 | 11/21/2023 |
2.1.10 | 142 | 11/11/2023 |
2.1.9 | 130 | 11/9/2023 |
2.1.8 | 224 | 11/7/2023 |
2.1.7 | 202 | 11/6/2023 |
2.1.6 | 116 | 11/3/2023 |
2.1.5 | 140 | 11/2/2023 |
2.1.4 | 124 | 11/1/2023 |
2.1.3 | 132 | 11/1/2023 |
2.1.2 | 131 | 10/31/2023 |
2.1.1 | 132 | 10/31/2023 |
2.1.0 | 131 | 10/31/2023 |
2.0.0 | 321 | 10/30/2023 |
1.1.6 | 145 | 10/30/2023 |
1.1.5 | 138 | 10/27/2023 |
1.1.4 | 122 | 10/27/2023 |
1.1.3 | 148 | 10/27/2023 |
1.1.2 | 161 | 10/16/2023 |
1.1.1 | 158 | 10/14/2023 |
1.1.0 | 151 | 10/14/2023 |
1.0.0 | 148 | 10/13/2023 |
Argon2id and Aes256 migrated from singleton service to static class. There will be huge breaking change but luckily it will be very easy to fix.