copy and paste this google map to your website or blog!
Press copy button and paste into your blog or website.
(Please switch to 'HTML' mode when posting into your blog. Examples: WordPress Example, Blogger Example)
Welcome to PyCryptodome’s documentation PyCryptodome Features Installation Compiling in Linux Ubuntu Compiling in Linux Fedora Windows (from sources) Documentation PGP verification Compatibility with PyCrypto API documentation Examples Encrypt data with AES Encrypt and authenticate data in one step Generate an RSA key Generate public key and private key Encrypt data with RSA
PyCryptodome — PyCryptodome 3. 240b0 documentation The installation procedure depends on the package you want the library to be in PyCryptodome can be used as: an almost drop-in replacement for the old PyCrypto library
Installation — PyCryptodome 3. 240b0 documentation If you want to install under the Crypto package, replace below pycryptodomex with pycryptodome That being the case and if you want to run the test, instead of Cryptodome SelfTest, run Crypto SelfTest
API documentation — PyCryptodome 3. 240b0 documentation PyCryptodome strives to maintain strong backward compatibility with the old PyCrypto ’s API (except for those few cases where that is harmful to security) so a few modules don’t appear where they should (example: the ASN 1 module is under Crypto Util as opposed to Crypto IO)
Examples — PyCryptodome 3. 240b0 documentation Examples Encrypt data with AES The following code generates a new AES-128 key and encrypts a piece of data into a file We use the CTR mode (which is a classic mode of operation, simple but not recommended anymore) With CTR alone, the receiver is not able to detect if the ciphertext (i e , the encrypted data) was modified while in transit To address that risk, we also attach a MAC
AES — PyCryptodome 3. 240b0 documentation AES AES (Advanced Encryption Standard) is a symmetric block cipher standardized by NIST It has a fixed data block size of 16 bytes Its keys can be 128, 192, or 256 bits long AES is very fast and secure, and it is the de facto standard for symmetric encryption As an example, encryption can be done as follows:
Crypto. Cipher package — PyCryptodome 3. 240b0 documentation Crypto Cipher package Introduction The Crypto Cipher package contains algorithms for protecting the confidentiality of data There are three types of encryption algorithms: Symmetric ciphers: all parties use the same key, for both decrypting and encrypting data Symmetric ciphers are typically very fast and can process very large amount of data Asymmetric ciphers: senders and receivers use
Features — PyCryptodome 3. 240b0 documentation This page lists the low-level primitives that PyCryptodome provides You are expected to have a solid understanding of cryptography and security engineering to successfully use them
Frequently Asked Questions — PyCryptodome 3. 240b0 documentation When you subsequently install pycryptodome, pip finds that a directory named with the target namespace already exists (under the rules of the underlying filesystem), and therefore installs all the sub-packages of pycryptodome in it
Diffie-Hellman Key Agreement — PyCryptodome 3. 240b0 documentation Diffie-Hellman Key Agreement Diffie-Hellman (DH) is a key agreement scheme based on asymmetric cryptography It enables two parties (below referred to as U and V) to jointly compute a shared secret across an untrusted communication channel, without explicitly transmitting the secret itself or parts of it In other words, an adversary can monitor the channel, see all exchanged messages, and