43 Resources
Golang cryptography Libraries
mercuryPQCrypto is a go post quantum cryptography (PQC) algorithms lib for studying the pqc migration and application adaptation.
mercuryPQCrypto-README 1 mercuryPQCrypto: Mercury Cryptography Project mercuryPQCrypto is a cryptography project conducted by Chongqing University, Ch
Easy to use crypto library with multiple algorithms
crypka Crypka is library, which abstracts away crypto, so one can easily do: Swap cryptosystems by swapping algorithm object in one place Easily and s
Steve - A peer-to-peer (p2p) decentralized network
Steve Steve is a peer-to-peer (p2p) decentralized network that enables people to
QR secrets is a cryptographically secure mechanism to store secret data with the highest levels of security and store it on physical paper.
QR Secrets QR secrets is a cryptographically secure mechanism to store secret data with the highest levels of security. Incorporating; AES256-GCM-HKDF
Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
Tink A multi-language, cross-platform library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse. https:/
Colonies is a generic framework for implementing next-generation distributed applications and systems
Colonies is a generic framework for implementing next-generation distributed applications and systems. It can be used as a building block for grid computing or edge computing, e.g. implement a meta operating system or cloud-of-cloud platform that combines many execution environments into a new virtual computing environment that can be controlled using an single unified API.
CIRCL: Cloudflare Interoperable Reusable Cryptographic Library
CIRCL (Cloudflare Interoperable, Reusable Cryptographic Library) is a collection of cryptographic primitives written in Go. The goal of this lib
Monero: the secure, private, untraceable cryptocurrency
Monero Copyright (c) 2014-2021 The Monero Project. Portions Copyright (c) 2012-2013 The Cryptonote developers. Table of Contents Development resources
Bitcoin Core integration/staging tree
Bitcoin Core integration/staging tree https://bitcoincore.org For an immediately usable, binary version of the Bitcoin Core software, see https://bitc
A tool to generate hashes on command line
genhash genhash is a tool to generate hashes on the commandline from stdio. It can be used to generate single or multiple hashes for usage in password
A very small, very simple, yet very secure encryption tool.
English | Français | Español | Deutsch | Português | Türkçe | 中文 | русский Picocrypt is a very small (hence Pico), very simple, yet very secure encryp
Go supplementary cryptography libraries
Go Cryptography This repository holds supplementary Go cryptography libraries. Download/Install The easiest way to install is to run go get -u golang.
Coinbase's advanced cryptography library
Kryptology Coinbase's advanced cryptography library Quickstart Use the latest version of this library: go
This repository holds supplementary Go cryptography libraries
Go Cryptography This repository holds supplementary Go cryptography libraries. Download/Install The easiest way to install is to run go get -u golang.
minimal implementation of secured encrypted tcp/ip connection without tls / ssl.
go-secure-transport Demo implementation of secured encrypted TCP connection without TLS / SSL. See ./example for server & client using the transport t
Easy to use CLI for cryptography
EDH (Encryption, Decryption, Hashing) Utility that aims to improve efficiency of encryption, decryption and hashing by making a simple to use CLI Writ
An improvement on the PoC for the privacy-preserving contact discovery scheme I implemented as part of my UCL masters degree
Privacy-Preserving Contact Discovery / ARKE - PoC This is an improved version of the work I submitted as part of my masters degree dissertation at UCL
Map ssh-ed25519 keys into x25519 keys
ssh-x22519 ========== The twisted Edwards curve used for ed25519 signatures is birationally equivalent to the Montgomery curve used for x25519: it is
did:ar | multi-chain DIDs backed by Arweave
did:ar | multi-chain DIDs backed by Arweave - THIS IS A WIP ABSOLUTELY SHOULD NOT BE USED IN PRODUCTION ___ ___
Data structure,Algorithms implemented in Go (for education)
Data structure,Algorithms implemented in Go (for education) List of Content : 1. Math - 2. String - 3. Conversions - 4. Sort - 5. Search - 6. Data str
Encrypt embedded go files using age.
encembed Encrypt embedded resource in compiled binary using age. Meant for usage with go generate. This tool will generate a go source file that embed
extension of SMx crypto support for go standard lib
Crypto Extension support of China crypto standards for go lib. You can simply copy and replace them to [your_go_src_path]/crypto Use as vendor is alte
Secure software enclave for storage of sensitive information in memory.
MemGuard Software enclave for storage of sensitive information in memory. This package attempts to reduce the likelihood of sensitive data being expos
Hashing algorithms simplified (supports Argon2, Bcrypt, Scrypt, PBKDF2, Chacha20poly1305 and more in the future)
PHC Crypto Inspired by Upash, also implementing PHC string format Usage Currently there are two options of using this package: Import all Import speci
A super easy file encryption utility written in go and under 800kb
filecrypt A super easy to use file encryption utility written in golang ⚠ Help Wanted on porting filecrypt to other programing languages NOTE: if you
Free, secure communications for everyone, powered by decentralized private identity.
Ubikom Project Encrypted email service based on decentralized private identity. The Project With Ubikom project, you can communicate via email in a se
A decentralized P2P networking stack written in Go.
noise noise is an opinionated, easy-to-use P2P network stack for decentralized applications, and cryptographic protocols written in Go. noise is made
EarlyBird is a sensitive data detection tool capable of scanning source code repositories for clear text password violations, PII, outdated cryptography methods, key files and more.
EarlyBird is a sensitive data detection tool capable of scanning source code repositories for clear text password violations, PII, outdated cryptograp
A dead simple tool to sign files and verify digital signatures.
minisign minisign is a dead simple tool to sign files and verify signatures. $ minisign -G
⟁ Tendermint Core (BFT Consensus) in Go
Tendermint Byzantine-Fault Tolerant State Machines. Or Blockchain, for short. Branch Tests Coverage Linting master Tendermint Core is Byzantine Fault
Easy to use cryptographic framework for data protection: secure messaging with forward secrecy and secure data storage. Has unified APIs across 14 platforms.
Themis provides strong, usable cryptography for busy people General purpose cryptographic library for storage and messaging for iOS (Swift, Obj-C), An
🌰 encrypt/decrypt using ssh keys
ssh-vault 🌰 encrypt/decrypt using ssh private keys Documentation https://ssh-vault.com Usage $ ssh-vault -h Example: $ echo "secret" | ssh-vault -u
Secure software enclave for storage of sensitive information in memory.
MemGuard Software enclave for storage of sensitive information in memory. This package attempts to reduce the likelihood of sensitive data being expos
Argon2 password hashing package for go with constant time hash comparison
argon2pw Argon2 password hashing package with constant time hash comparison Preface: Argon2 was selected as the winner of the Password Hashing Competi
A light package for generating and comparing password hashing with argon2 in Go
argon2-hashing argon2-hashing provides a light wrapper around Go's argon2 package. Argon2 was the winner of the Password Hashing Competition that make
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Database protection suite with field level encryption and intrusion detection. | Acra Engineering Examples | Documentation | Installation | Examples a
A Stable & Secure Tunnel based on KCP with N:M multiplexing and FEC. Available for ARM, MIPS, 386 and AMD64。KCPプロトコルに基づく安全なトンネル。KCP 프로토콜을 기반으로 하는 보안 터널입니다。
Disclaimer: kcptun maintains a single website — github.com/xtaci/kcptun. Any websites other than github.com/xtaci/kcptun are not endorsed by xtaci. Re
A Crypto-Secure, Production-Grade Reliable-UDP Library for golang with FEC
Introduction kcp-go is a Production-Grade Reliable-UDP library for golang. This library intents to provide a smooth, resilient, ordered, error-checked
⟁ Tendermint Core (BFT Consensus) in Go
Tendermint Byzantine-Fault Tolerant State Machines. Or Blockchain, for short. Branch Tests Coverage Linting master Tendermint Core is Byzantine Fault
Easy to use cryptographic framework for data protection: secure messaging with forward secrecy and secure data storage. Has unified APIs across 14 platforms.
Themis provides strong, usable cryptography for busy people General purpose cryptographic library for storage and messaging for iOS (Swift, Obj-C), An
🌰 encrypt/decrypt using ssh keys
ssh-vault 🌰 encrypt/decrypt using ssh private keys Documentation https://ssh-vault.com Usage $ ssh-vault -h Example: $ echo "secret" | ssh-vault -u
Port of Google's Keyczar cryptography library to Go
Important note: Keyczar is deprecated. The Keyczar developers recommend Tink. This is a port of Google's Keyczar library to Go. Copyright (c) 2011 Dam
:key: Secure alternative to JWT. Authenticated Encrypted API Tokens for Go.
branca branca is a secure alternative to JWT, This implementation is written in pure Go (no cgo dependencies) and implements the branca token specific