Xoodyak is a lightweight, versatile, cryptographic scheme suitable in constrained environments. It can be used for hashing, encryption, MAC computation and authenticated encryption.
Xoodyak builds upon the Xoodoo permutations and the duplex construction.
Usage of xoodyak: xoodyak [-d] -p "pass" [-i N] [-s "salt"] -f <file.ext> -a string Additional Associated data. -d Decrypt instead of Encrypt. -f string Target file. ('-' for STDIN) -h HMAC-based key derivation function. -i int Iterations. (for PBKDF2) (default 1024) -k string 128-bit key to Encrypt/Decrypt. -p string Password-based key derivation function. -r Generate random 128-bit cryptographic key. -s string Salt. (for PBKDF2)
Usage of xoodyaksum: xoodyaksum [-c <hash.ext>] [-r] <file.ext> -c string Check hashsum file. -r Process directories recursively.
Usage of xoodyakmac: xoodyakmac [-k <secret>] -f <file.ext> -f string Target file. ('-' for STDIN) -k string Secret key.
This project is licensed under the ISC License.