Hi Ben, We are interested in having more cryptographic recipes, however we have a number of things we want from a recipe:
* It should comprehensively address a common use case * It should reflect current (and anticipated future) best practices * It should be misuse-resistant * It should reflect an external standard so that we can interoperate with other libraries and ecosystems * It should be parameter-free Unfortunately there's been a real dearth of standardization of these types of recipes in the cryptographic world. I continue to hope that more will come into existence, and we'll add support for them though! Alex On Fri, Jun 21, 2024 at 9:56 AM Ben Portner via Cryptography-dev <cryptography-dev@python.org> wrote: > > Dear Cryptography Developers, > > First off, thank you for developing the Cryptography package! The Python > developer community is growing and robust cryptography is desperately needed > to have a safe fundament to build on. > > TL;DR: Are more cryptographic recipes (AES256, KDF incl. parameter storage) > going to come soon? > > In your package description you write that "cryptography is a package which > provides cryptographic recipes and primitives". As a developer and > cryptography noob, I am especially interested in the recipes. In your docs, > there are code snippets for the Fernet algorithm, which are very helpful. I > am wondering if you are planning to expand this section in the near future. > For example, I would be interested in learning how to store the key > derviation parameters (salt, length, rounds) with the encrypted cipher text > to facilitate decryption later on. Also, a version with 256 bit keys would be > interesting. I believe that such a "reference implementation" would also > benefit other developers. Ansible already uses Cryptography for its vault > implementation, however with "only" 10k rounds for the KDF. As a cryptography > noob, I am not sure if this is safe enough for my application (archive > encryption for offsite backups). Having a "first hand" implementation with > safe defaults would help to reduce developer uncertainty and also prevent us > from "reinventing the wheel". > > Thanks again and best regards. > > Ben > > _______________________________________________ > Cryptography-dev mailing list > Cryptography-dev@python.org > https://mail.python.org/mailman/listinfo/cryptography-dev -- All that is necessary for evil to succeed is for good people to do nothing. _______________________________________________ Cryptography-dev mailing list Cryptography-dev@python.org https://mail.python.org/mailman/listinfo/cryptography-dev