Introducing asymmetric encryption, also known as public-key cryptography, with the SynEcc Open Source unit for Delphi 5 up to Delphi 10.1 Berlin!

Introducing asymmetric encryption, also known as public-key cryptography, with the SynEcc Open Source unit for Delphi 5 up to Delphi 10.1 Berlin!
Feature set complete public/private keys generation, ECDSA certificates and digital signature, and ECIES encryption. Also works under Linux with FPC.
http://blog.synopse.info/post/2016/09/24/Public-key-Asymmetric-Cryptography-via-SynECC

Comments

  1. awesome. been waiting for something like this for a while.
    thanks a.b.

    side question

    is RSA supported by Mormot?

    ReplyDelete
  2. How well has that been tested/mitigated against things like side-channel attacks?

    ReplyDelete
  3. You surely know about literally thousands of patents, related to ECC, don't you? And no, Wikipedia doesn't cover this topic in full.

    ReplyDelete
  4. Jeroen Wiert Pluimers We implemented ECIES in a paranoid way, to ensure that Eve won't read Alice message! 😀

    ReplyDelete
  5. Ugochukwu Mmaduekwe​​ RSA is not supported since it has not perfect forward secrecy. See e.g http://www.ietf.org/mail-archive/web/tls/current/msg12266.html But we may add it if it is worth it, not for key exchange but for asymmetric encryption as with TLS 1.3.

    ReplyDelete
  6. I vote for RSA. RSA is still needed for communication with other servers, but within Delphi still lacks good implementation.

    ReplyDelete
  7. How many eyeballs have worked on this and what's their publicly available security related track record like?

    ReplyDelete
  8. Can't find `download` link to have a look at.

    ReplyDelete
  9. Sergey Kasandrov In the documentation page, "Download" link is topmost right on the page. Direct download of the unit is https://github.com/synopse/mORMot/blob/master/SynEcc.pas
    Feedback is welcome, especially for code or documentation review.
    If you have any doubt about the current implementation, please provide some ideas to enhance it!

    ReplyDelete
  10. Jeroen Wiert Pluimers Only a few yet, but the algorithms, patterns and the implementation have been reviewed by some security experts of the (very big) company I currently work for - this review can be only unofficial, since the company is so big it won't afford making any warranty. SynEcc only implements a few algorithm, and has its own KISS storage layout so the risk assessment is much reduced than if more complex standard system was implemented. In short, it is fully featured (it has built-in PKI), but with a "one way to do it" approach. Jacek Laskowski This is why it didn't implement RSA, which is less secure than ECC (no perfect forward secrecy), slower and uses bigger keys. Anyway, we are willing to have as many reviewers as possible - this is why I posted the link in G+!

    ReplyDelete
  11. A. Bouchez Sorry, cannot review soon - spending my time now studying quantum informatics from MIT - https://courses.edx.org/courses/course-v1:MITx+8.371x+3T2016/ . Really mind-blowing. :)

    ReplyDelete
  12. Sergey Kasandrov Don't worry, I guess that SynEcc code would be a piece of cake for you - plain informatics here. ;)

    ReplyDelete
  13. Very nice!

    wrt security, the most vulnerable part in practice will likely be the certificate chain management (like for all asymmetric cryptographic), which is in the hands of users. mORMot being kinda "niche" should shield it from automated tools and exploits, but hey, if it's used by a very big company for something critical, who knows, it might draw some interest ;)

    ReplyDelete

Post a Comment