JSON Work Proof (JWP) - proof-of-work algorithm
Project description
JSON Work Proof
JSON Work Proof is a proof-of-work algorithm that creates a token after doing some workload. This token contains certain claims defined by you and verifies that you did this work at this time and for these claims.
It packs the security of the Hashcash algorithm (used for Bitcoin in a similar way) into a modern JWT-like token.
Structure of Token
A token looks like this: eyJ0eXAiOiJKV1AiLCJhbGciOiJTSEEyNTYiLCJkaWYiOjIwfQ.eyJleHAiOjE2MTY4NTA1NzAuNjU1MTQ3MSwiaGVsbG8iOiJ3b3JsZCJ9.VE6YYxIQ46lPzxyNuRYAmAMkEM
. It has the same structure as a JWT token and can therefore also be inspected on the Debugger on jwt.io.
It contains three elements which are each base64url encoded. The header contains the type of the token (JWP), the hash algorithm used for the challenge (currently only SHA256 supported) and the difficulty at which the token was mined. The payload consists of the claims you specified and optionally an expiration date. The last part contains a salt and a big number (named counter in Hashcash). The work needed to generate a token is actually to find this number. It's hard to find this number, but easy to verify it's correct. (Read more about how it works on Wikipedia)
Possible Applications
Can be used to prevent DDOS attacks or as an alternative to rate limiting or captchas.
E.g. you can use this to prevent brute forcing user logins: The client generates a token with the claims including username and password and sends it along with the login request. The server then first checks if the token is valid before it does any lookup. The scale of bruteforcing can therefore be massively reduced.
Usage
General
To generate and validate tokens you need to use a JWP
-object. On creation you can specify the difficulty
, which determines how hard the challenge should be. It defaults to 20
, which takes about a second to compute on an average computer. Each increment by one, doubles the difficulty and therefore the time it takes to generate.
from json_work_proof import JWP
jwp = JWP() # defaults to difficulty=20
jwp_harder = JWP(difficulty=25)
Generation
To generate a token, that proves you did work, create a JWP
-object and call it with your dictionary of claims like this:
jwp = JWP()
token = jwp.generate({ 'hello': 'world', 'count': 88 })
Note: A token expires 5 minutes after creation on default. You can change this by giving a custom expiration date:
expiration = datetime.utcnow() + timedelta(hours=1) # 1 hour from now
token = jwp.generate(claims, expiration=expiration)
token = jwp.generate(claims, expiration=None) # no expiration
Validation
To check if a token is valid for a certain difficulty and to read the claims:
jwp = JWP()
try:
claims = jwp.decode(token)
except JWP.DecodeError.InvalidFormat:
print("The token is formatted incorrectly")
except JWP.DecodeError.InvalidProof:
print("The difficulty this token was created at is lower than what is specified in your JWP object")
except JWP.DecodeError.Expired:
print("The token expiration is too old or too new")
If you just want to read the claims without verifying the proof and expiration date, you can use this instead:
claims = jwp.decode(token, verify=False)
By default it expects the expiration date to be between now and 30 minutes in the future. You can also specify your own range of valid expiration dates like this:
claims = jwp.decode(token, expiration_range=JWP.DateRange(start_date, end_date)) # must be in [start_date, end_date]
claims = jwp.decode(token, expiration_range=JWP.DateRange.from_now(3600)) # must be in [now(), now()+3600]
claims = jwp.decode(token, expiration_range=JWP.DateRange.unlimited)) # all expirations are accepted
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for json_work_proof-0.1.2-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | e0afad39c380769d0e718ba9a187ae4a990e566e5df9bcd1c85c036c6e2340d6 |
|
MD5 | 085a76ec02527394a103de73b40b2e0a |
|
BLAKE2b-256 | 0ec2e2bdaa7c95328826ffc539c9b71ab69d246ec6c20ae471660f16554d73b8 |