Minimalistic Javascript library required to perform basic operations with Universa smart contracts and other objects. WASM version
Supports:
For usage in an existing Node.js project, add it to your dependencies:
$ npm install universa-wasm
or with yarn:
$ yarn add universa-wasm
And use it with the following line wherever you need it.
const Minicrypto = require('universa-minicrypto');
In root folder of package run
npm install
npm run build
In folder dist
there will be minicrypto.min.js
, crypto.js
, crypto.wasm
. Also there will be *.LICENSE files.
Copy files to your scripts folder and set them in order. Also, wait for initalization:
<script src="path/to/crypto.js"></script>
<script src="path/to/minicrypto.min.js"></script>
<script>
async function main() {
// Example of key generation
const options = { strength: 2048 };
const priv = await Minicrypto.PrivateKey.generate(options);
console.log(priv);
}
main();
</script>
Pack data to signed record (Uint8Array) with key:
const { SignedRecord, decode64, PrivateKey } = Minicrypto;
const payload = { ab: "cd" };
const nonce = decode64("abc");
const key = await PrivateKey.unpack(privateKeyPacked);
const recordBinary = await SignedRecord.packWithKey(key, payload, nonce); // Uint8Array
Unpack signed record:
const { SignedRecord, decode64, PrivateKey } = Minicrypto;
const payload = { ab: "cd" };
const nonce = decode64("abc");
const key = await PrivateKey.unpack(privateKeyPacked);
const recordBinary = await SignedRecord.packWithKey(key, payload, nonce); // Uint8Array
const record = await SignedRecord.unpack(recordBinary);
record.recordType === SignedRecord.RECORD_WITH_KEY; // true
record.nonce // nonce
record.payload // payload
record.key // PublicKey
Random byte array for given length
const { randomBytes } = Minicrypto;
const bytes16 = randomBytes(16); // Uint8Array
HashId for binary data
const { hashId } = Minicrypto;
const id = await hashId(decode64("abc")); // Uint8Array
CRC32
const { crc32 } = Minicrypto;
const digest = crc32(decode64("abc")); // Uint8Array
Convert byte array to hex string and back
const { bytesToHex, hexToBytes } = Minicrypto;
const hexString = bytesToHex(uint8arr); // String
const bytesArray = hexToBytes(hexString); // Uint8Array
Convert plain text to bytes and back
const { textToBytes, bytesToText } = Minicrypto;
const bytes = textToBytes("one two three"); // Uint8Array
const text = bytesToText(bytes); // "one two three"
Convert bytes to base64 and back
const { encode64, encode64Short, decode64 } = Minicrypto;
const bytes = decode64("abc"); // Uint8Array
const base64str = encode64(bytes); // String
// short representation of base64 string
const base64ShortString = encode64Short(bytes);
Convert bytes to base58 and back
const { encode58, decode58 } = Minicrypto;
const bytes = decode58("abc"); // Uint8Array
const base58str = encode58(bytes); // String
Supports SHA256, SHA512, SHA1, SHA3(256, 384, 512)
Get instant hash value for given byte array
const { SHA } = Minicrypto;
const resultBytes1 = await SHA.getDigest('sha256', textToBytes('somevalue')); // Uint8Array
Get hash value for large data
const { SHA } = Minicrypto;
const sha512 = new SHA(512);
await sha512.put(dataPart1); // dataPart1 is Uint8Array
await sha512.put(dataPart2);
// .....
await sha512.put(dataPartFinal);
const resultBytes = await sha512.get(); // Uint8Array
Get hash value in HEX
const { SHA } = Minicrypto;
const sha256 = new SHA(256);
const hexResult = await sha256.get(textToBytes("one two three"), 'hex'); // String
const { SHA, HMAC } = Minicrypto;
const data = textToBytes('a quick brown for his done something disgusting');
const key = textToBytes('1234567890abcdef1234567890abcdef');
const hmac = new HMAC('sha256', key);
const result = await hmac.get(data) // Uint8Array
const { hexToBytes, pbkdf2, SHA } = Minicrypto;
const derivedKey = await pbkdf2('sha256', {
rounds: 1, // number of iterations
keyLength: 20, // bytes length
password: 'password',
salt: hexToBytes('abc123')
}); // Uint8Array
Private key unpack
const { PrivateKey, decode64, BigInteger } = Minicrypto;
const bossEncodedKey = decode64(keyPacked64);
const privateKey2 = await PrivateKey.unpack(bossEncodedKey);
// Read password-protected key
const privateKey4 = await PrivateKey.unpack({
bin: bossEncodedKey,
password: "qwerty"
});
Public key unpack
const { PublicKey, PrivateKey, decode64, BigInteger } = Minicrypto;
const bossEncodedKey = decode64(keyPacked64);
const privateKey1 = await PrivateKey.unpack(bossEncodedKey);
const publicKey1 = privateKey1.publicKey;
const publicKey2 = await PublicKey.unpack(bossEncodedPublicKey);
Public key fingerprint
publicKey.fingerprint; // fingerprint (Uint8Array)
Public key bit strength
publicKey.getBitStrength(); // number
Public key address
publicKey.shortAddress; // short address (Uint8Array)
publicKey.shortAddress58; // short address (base58)
publicKey.longAddress; // long address (Uint8Array)
publicKey.longAddress58; // long address (base58)
Check if given address is valid
const { PublicKey } = Minicrypto;
PublicKey.isValidAddress(publicKey.shortAddress) // true
// accepts base58 representation of address too
PublicKey.isValidAddress(publicKey.shortAddress58) // true
Generate private key
const { PrivateKey } = Minicrypto;
const options = { strength: 2048 };
const priv = await PrivateKey.generate(options); // instance of PrivateKey
Private(public) key - export
const { PrivateKey } = Minicrypto;
const bossEncodedKey = decode64(keyPacked64);
const key = await PrivateKey.unpack(bossEncodedKey);
const keyPacked = await key.pack(); // Uint8Array
const keyPackedProtected = await key.pack("somepassword"); // Uint8Array
const keyPackedProtected1000 = await key.pack({ password: "qwerty", rounds: 1000 });
const bossEncodedPublic = await key.publicKey.packed();
Get type of key package. There are 4 types of what key binary package may contain.
AbstractKey.TYPE_PRIVATE - binary package of private key without password AbstractKey.TYPE_PUBLIC - binary package of public key without password AbstractKey.TYPE_PRIVATE_PASSWORD_V2 - binary package of private key with password (actual version) AbstractKey.TYPE_PRIVATE_PASSWORD_V1 - binary package of private key with password (deprecated version)
const { AbstractKey } = Minicrypto;
const bossEncoded = await privateKey.pack("somepassword");
AbstractKey.typeOf(bossEncoded) === AbstractKey.TYPE_PRIVATE_PASSWORD_V2 // true
Contains information about Key and helper to match keys compatibility
Supported algorithms: RSAPublic, RSAPrivate, AES256
Supported PRF: HMAC_SHA1, HMAC_SHA256, HMAC_SHA512
const { KeyInfo} = Minicrypto;
const keyInfo = new KeyInfo({
algorithm: KeyInfo.Algorithm.AES256,
tag: decode64("abc"), // Uint8Array
keyLength: 32, // Int
prf: KeyInfo.PRF.HMAC_SHA256,
rounds: 16000, // number of iterations
salt: decode64("bcd") // Uint8Array
});
Pack to BOSS
const packed = keyInfo.pack(); // Uint8Array
Read from BOSS
// bossEncoded is Uint8Array
const keyInfo = KeyInfo.unpack(bossEncoded); // KeyInfo
Check that this key can decrypt other key
const canDecrypt = keyInfo.matchType(otherKeyInfo); // boolean
Derived key from password
const derivedKey = await keyInfo.derivePassword("somepassword"); // Uint8Array
Symmetric key: main interface to the symmetric cipher. This implementation uses AES256 in CTR mode with IV to encrypt / decrypt.
const { SymmetricKey } = Universa;
// Creates random key (AES256, CTR)
const symmetricKey = new SymmetricKey();
// Creates key by derived key (Uint8Array) and it's info (KeyInfo)
const symmetricKey2 = new SymmetricKey({
keyBytes: derivedKey,
keyInfo: keyInfo
});
// Creates key by derived key (Uint8Array)
const symmetricKey2 = new SymmetricKey({
keyBytes: derivedKey
});
// Creates key by password (String) and number of rounds (Int). Salt is optional
// Uint8Array, null by default
const symmetricKey3 = await SymmetricKey.fromPassword(password, rounds, salt);
Pack symmetric key (get derived key bytes)
const { SymmetricKey } = Universa;
// Creates random key (AES256, CTR)
const symmetricKey = new SymmetricKey();
const derivedKey = symmetricKey.pack(); // Uint8Array
Encrypt / decrypt data with AES256 in CRT mode with IV
// data is Uint8Array
const encrypted = symmetricKey.encrypt(data); // Uint8Array
const decrypted = symmetricKey.decrypt(encrypted); // Uint8Array
Encrypt / decrypt data with EtA using Sha256-based HMAC
// data is Uint8Array
const encrypted = await symmetricKey.etaEncrypt(data); // Uint8Array
const decrypted = await symmetricKey.etaDecrypt(encrypted); // Uint8Array
OAEP encrypt/decrypt
You can pass hash types with instances or with string types. Supported types for SHA: sha1 sha256 sha384 sha512 sha512/256 sha3_256 sha3_384 sha3_512
const privateKey; // some PrivateKey instance
const publicKey = privateKey.publicKey;
// encrypt data
const data = decode64("abc123");
const options = {
seed: decode64("abcabc"), // optional, default none
mgf1Hash: 'sha512', // optional, default SHA(256)
oaepHash: 'sha512' // optional, default SHA(256)
};
const encrypted = await publicKey.encrypt(data, options);
const decrypted = await privateKey.decrypt(encrypted, options);
encode64(data) === encode64(decrypted); // true
OAEP max encryption message length
const privateKey; // some PrivateKey instance
const publicKey = privateKey.publicKey;
// encrypt data
const options = {
seed: decode64("abcabc"), // optional, default none
mgf1Hash: 'SHA512', // optional, default SHA(256)
oaepHash: 'SHA512' // optional, default SHA(256)
};
const maxLength = publicKey.encryptionMaxLength(options);
OAEP default hash
publicKey.DEFAULT_OAEP_HASH // SHA1 instance
MGF1 default hash
publicKey.DEFAULT_MGF1_HASH // SHA1 instance
PSS sign/verify
You can pass hash types with instances or with string types. Supported types for SHA: sha1 sha256 sha384 sha512 sha512/256 sha3_256 sha3_384 sha3_512
const privateKey; // some PrivateKey instance
const publicKey = privateKey.publicKey;
const options = {
salt: decode64("abcabc"), // optional
saltLength: null, // optional, numeric
mgf1Hash: 'sha512', // optional, default SHA(256)
pssHash: 'sha512' // optional, default SHA(256)
};
const message = 'abc123';
const signature = await privateKey.sign(message, options);
const isCorrect = await publicKey.verify(message, signature, options);
console.log(isCorrect); // true
Sign/verify
const { ExtendedSignature } = Minicrypto;
const data = decode64("abcde12345");
const privateKey; // some PrivateKey instance
const publicKey = privateKey.publicKey;
const signature = await privateKey.signExtended(data);
const es = await publicKey.verifyExtended(signature, data);
const isCorrect = !!es;
console.log(es.created_at); // Date - signature created at
console.log(es.key); // Uint8Array - PublicKey fingerprint
console.log(ExtendedSignature.extractPublicKey(signature)); // PublicKey instance
Encode/decode
const { Boss } = Minicrypto;
const boss = new Boss();
const data = {
a: decode64("abc")
b: new Date(),
c: [1, 2, 'test'],
d: { a: 1 }
};
const encoded = boss.dump(data); // Uint8Array
const decoded = boss.load(encoded); // original data
Encode stream
const writer = new Boss.writer();
writer.write(0);
writer.write(1);
writer.write(2);
writer.write(3);
const dump = writer.get(); // Uint8Array
Decode stream
const reader = new Boss.reader(hexToBytes('00081018'));
const arg1 = reader.read(); // 0
const arg2 = reader.read(); // 1
const arg3 = reader.read(); // 2
const arg4 = reader.read(); // 3
const arg5 = reader.read(); // undefined
Encrypt/decrypt
const { AES } = Minicrypto;
const key = decode64("abc"); // 16 bytes for aes128, 32 bytes for aes256
const message = textToBytes('some text');
const aes256 = new AES(key);
const encrypted = aes256.encrypt(message); // Uint8Array
const decrypted = aes256.decrypt(encrypted); // Uint8Array
Run in package root folder
npm install
npm run build
In folder dist
there will be universa.min.js
, crypto.js
, crypto.wasm
. Also there will be *.LICENSE files.
npm test