Xoodyak is a lightweight, versatile, cryptographic scheme suitable in constrained environments. It can be used for hashing, encryption, MAC computation and authenticated encryption.
Xoodyak builds upon the Xoodoo permutations and the duplex construction.
Usage of xoodyak:
xoodyak [-d] -p "pass" [-i N] [-s "salt"] -f <file.ext>
-d Decrypt instead Encrypt.
-f string
Target file. ('-' for STDIN)
-i int
Iterations. (for PBKDF2) (default 1024)
-k string
128-bit key to Encrypt/Decrypt.
-p string
PBKDF2.
-r Generate random 128-bit cryptographic key.
-s string
Salt. (for PBKDF2)
Xoodyak Recursive Hasher
Usage of xoodyaksum:
xoodyaksum [-c <hash.ext>] [-r] <file.ext>
-c string
Check hashsum file.
-r Process directories recursively.
Xoodyak MAC
Usage of xoodyakmac:
xoodyakmac [-k <secret>] -f <file.ext>
-f string
Target file. ('-' for STDIN)
-k string
Secret key.
License
This project is licensed under the ISC License.
Industrial-Grade Reliability. Copyright (c) 2020-2023 ALBANESE Research Lab.