RustCrypto: RSA
A portable RSA implementation in pure Rust.
use rsa::{Pkcs1v15Encrypt, RsaPrivateKey, RsaPublicKey};
let mut rng = rand::thread_rng();
let bits = 2048;
let priv_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key");
let pub_key = RsaPublicKey::from(&priv_key);
// Encrypt
let data = b"hello world";
let enc_data = pub_key.encrypt(&mut rng, Pkcs1v15Encrypt, &data[..]).expect("failed to encrypt");
assert_ne!(&data[..], &enc_data[..]);
// Decrypt
let dec_data = priv_key.decrypt(Pkcs1v15Encrypt, &enc_data).expect("failed to decrypt");
assert_eq!(&data[..], &dec_data[..]);
Note: If you encounter unusually slow key generation time while using
RsaPrivateKey::new
you can try to compile in release mode or add the following to yourCargo.toml
. Key generation is much faster when building with higher optimization levels, but this will increase the compile time a bit.[profile.debug] opt-level = 3If you don't want to turn on optimizations for all dependencies, you can only optimize the
num-bigint-dig
dependency. This should give most of the speedups.[profile.dev.package.num-bigint-dig] opt-level = 3
Currently at Phase 1 (v) 🚧
There will be three phases before 1.0
🚢 can be released.
- 🚧 Make it work
- Prime generation ✅
- Key generation ✅
- PKCS1v1.5: Encryption & Decryption ✅
- PKCS1v1.5: Sign & Verify ✅
- PKCS1v1.5 (session key): Encryption & Decryption
- OAEP: Encryption & Decryption
- PSS: Sign & Verify
- Key import & export
- 🚀 Make it fast
- Benchmarks ✅
- compare to other implementations 🚧
- optimize 🚧
- 🔐 Make it secure
- Fuzz testing
- Security Audits
This crate has received one security audit by Include Security, with only one minor finding which has since been addressed.
See the open security issues on our issue tracker for other known problems.
Notably the implementation of modular exponentiation is not constant time,
but timing variability is masked using random blinding, a commonly used
technique. This crate is vulnerable to the Marvin Attack which could enable
private key recovery by a network attacker (see RUSTSEC-2023-0071).
You can follow our work on mitigating this issue in #390.
This crate supports Rust 1.72 or higher.
In the future MSRV can be changed, but it will be done with a minor version bump.
Licensed under either of
at your option.
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.