lyhiving / easyrsa
Simple and secure asymmetric encryption powered by PHPSecLib
Requires
- defuse/php-encryption: ^2.0
- paragonie/constant_time_encoding: ^1|^2
- paragonie/random_compat: ^1|^2
- phpseclib/phpseclib: ^3.0.12
- sarciszewski/php-future: ^0
Requires (Dev)
- phpunit/phpunit: 4.*|5.*
Suggests
- ext-libsodium: Libsodium offers far better cryptography than RSA can ever offer. Use libsodium instead of EasyRSA.
- paragonie/halite: A simple and secure libsodium wrapper. Consider using Halite instead of EasyRSA.
This package is auto-updated.
Last update: 2024-10-18 07:19:43 UTC
README
Simple and Secure Wrapper for phpseclib.
Base on paragonie/EasyRSA.
What change
- Limit 2048 bit to 1024 bit.
- Compatible with Wechat RSA.
Important!
For better security, you want to use libsodium, not EasyRSA.
Motivation
Although the long-term security of RSA is questionable (at best) given the advances in index calculus attacks, there are many issues with how RSA is implemented in popular PHP cryptography libraries that make it vulnerable to attacks today.
Thanks to the folks who developed phpseclib, it's possible to use secure RSA in PHP. However, it's not user-friendly enough for the average PHP developer to use to its full potential. So we took it upon ourselves to offer a user-friendly interface instead.
EasyRSA is MIT licensed and brought to you by the secure PHP development team at Paragon Initiative Enterprises.
How to use this library?
composer require lyhiving/easyrsa
Generating RSA key pairs
You can generate 2048-bit keys (or larger) using EasyRSA. The default size is 2048.
<?php use Lyhiving\EasyRSA\KeyPair; $keyPair = KeyPair::generateKeyPair(4096); $secretKey = $keyPair->getPrivateKey(); $publicKey = $keyPair->getPublicKey();
Getting the Raw Key
<?php /** @var \Lyhiving\EasyRSA\PublicKey $publicKey */ var_dump($publicKey->getKey());
Encrypting/Decrypting a Message
<?php use Lyhiving\EasyRSA\EasyRSA; $message = "test"; /** @var \Lyhiving\EasyRSA\PublicKey $publicKey */ /** @var \Lyhiving\EasyRSA\PrivateKey $secretKey */ $ciphertext = EasyRSA::encrypt($message, $publicKey); $plaintext = EasyRSA::decrypt($ciphertext, $secretKey);
Signing/Verifying a Message
<?php use Lyhiving\EasyRSA\EasyRSA; $message = "test"; /** @var \Lyhiving\EasyRSA\PublicKey $publicKey */ /** @var \Lyhiving\EasyRSA\PrivateKey $secretKey */ $signature = EasyRSA::sign($message, $secretKey); if (EasyRSA::verify($message, $signature, $publicKey)) { // Signature is valid! }
Compatibility
EasyRSA is only compatible with itself. It is not compatible with OpenGPG (GnuPG, Mailvelope, etc.) You'll want GPG-Mailer instead.
What Does it Do Under the Hood?
- Encryption (KEM+DEM)
- Generates an random secret value
- Encrypts the random secret value with your RSA public key, using PHPSecLib (RSAES-OAEP + MGF1-SHA256)
- Derives an encryption key from the secret value and its RSA-encrypted ciphertext, using HMAC-SHA256.
- Encrypts your plaintext message using defuse/php-encryption (authenticated symmetric-key encryption)
- Calculates a checksum of both encrypted values (and a version tag)
- Authentication
- Signs a message using PHPSecLib (RSASS-PSS + MGF1-SHA256)
Support Contracts
If your company uses this library in their products or services, you may be interested in purchasing a support contract from Paragon Initiative Enterprises.