Skip to main content

Library to Simplify Encryption and Data Protection

Project description

alt text workflow Static Badge Python Versions Static Badge

Welcome to Litecrypt

Litecrypt is a minimal cryptography library that provides a simple yet robust solution for encrypting and decrypting data and files. Prioritizing both security and ease of use, Litecrypt seamlessly employs AES-256 encryption in CBC mode. The library offers the added benefit of secure storage, ensuring the protection of sensitive information. For those seeking a user-friendly experience, an accompanying app is also available.

Key Features

  • Efficient Powerhouse: Don't let its simplicity fool you. Litecrypt packs a punch with robust data protection that's easy to wield.
  • Minimalism: Complexity? Nah, it's all about simplicity. No convoluted code, no more wrestling with complex and unintuitive libraries. You can achieve more with less code.
  • User-Friendly App: Even if you don't want to write code, an app is available.
  • Built on Proven Security Foundations: By using well established cryptographic primitives sourced from the renowned 'cryptography' library, ensuring a foundation of rock-solid security.
  • Great Editor Support: Navigating through Litecrypt is a breeze with intuitive code completion, instant contextual documentation, and interactive examples.

Example Usage

Encrypting data

from litecrypt import Crypt , gen_key

key = gen_key()

data = b'some random data'
message = 'some random message'

encrypted_data = Crypt(data,key).encrypt()
encrypted_message = Crypt(message,key).encrypt()

message_again = Crypt(encrypted_message,key).decrypt()
print(message_again)

Encrypting Files

from litecrypt import CryptFile, gen_key

# Create a file to see how it works
CryptFile.make_file(filename='notes.txt',content='hello there')

key = gen_key()
CryptFile('notes.txt',key=key).encrypt(echo=True)
CryptFile('notes.txt.crypt',key=key).decrypt(echo=True)
# echo, to display progress in the console

Database usage

from litecrypt import Crypt, CryptFile, Database, gen_key, gen_ref

# Create connections to the main and keys databases
main_conn = Database('vault.db')
keys_conn = Database('vaultKeys.db')

# Specify the filename you want to store in the database
filename = 'notes.csv'

# Get the binary data content of the specified file
file_data = CryptFile.get_binary(filename)

# Generate an encryption key and a reference value
encryption_key = gen_key()
reference_value = gen_ref()

# Encrypt the file data using the encryption key
encrypted_file_data = Crypt(data=file_data, key=encryption_key).encrypt()

# Insert the encrypted file data, content reference, and encryption key into the main database
main_conn.insert(filename=filename + '.crypt',
                 content=encrypted_file_data,
                 ref=reference_value)

# Insert the encryption key and reference into the keys database
keys_conn.insert(filename=filename + '.crypt',
                 content=encryption_key,
                 ref=reference_value)

The reference value, such as #8jX?7c, remains independent of both the encrypted data and the encryption keys. It does not reveal any information about the keys used or the encrypted data itself. Instead, its purpose is to establish a connection between the two databases, consistently linking each file to its corresponding key.

The primary database holds the filenames and their encrypted data, while the keys database stores the filenames and the keys used to encrypt them. To recover files, both databases need to be simultaneously accessible. However, a crucial point to note is that robust security for the keys database is necessary only when BOTH databases are accessible together.

If someone gets hold of the main database, they'll only get some encrypted content and file names. Trying to break this content would be really hard. On the other hand, if someone only accesses the keys database, they'll only find keys and filenames. It won't help them much.

You have two options: keep the databases separate (though that might be hard and impractical) or make copies of your main database—regardless of your level of trust in the system you place them in.

In this situation, the keys database should be kept safe, preferably encrypted. When you want your files back, get your main database from wherever you stored it. Then, use the keys database to unlock the files you need.

I've made the process of getting files back really simple, actually it's just one function called spawn().

Here's a complete workflow on how Litecrypt might be used, check this out:

Demo

import os

from litecrypt import Crypt, CryptFile, Database, gen_key, gen_ref, spawn

# Create a directory for testing
os.mkdir("test")

# Create sample files
files = ["test/file", "test/image.png", "test/notes.txt"]
file_contents = [b"some data", b"binary data of some image", b"some notes"]

for file, content in zip(files, file_contents):
    CryptFile.make_file(filename=file, content=content)

# The files now exist in the directory test/

# Collect each file's content
file_contents = []
for file in files:
    file_content = CryptFile.get_binary(file)
    file_contents.append(file_content)

# Encrypt each file's content one by one
key = gen_key()
encrypted_contents = []
for content in file_contents:
    encrypted_content = Crypt(content, key).encrypt(get_bytes=True)
    encrypted_contents.append(encrypted_content)


# Initialize the main & the associated keys database
main_db = Database("secure_vault.db")
keys_db = Database("secure_vaultKeys.db")  # to hold the keys

# Generate a key reference value to link up the two databases with
key_ref = gen_ref()

# Insert encrypted content and keys into databases
for file, encrypted_content in zip(files, encrypted_contents):
    main_db.insert(
        filename=f"does-not-matter/{file}.crypt", content=encrypted_content, ref=key_ref
    )
    keys_db.insert(filename=f"does-not-matter/{file}.crypt", content=key, ref=key_ref)
# Add .crypt to indicate they're encrypted

# Create another directory
os.mkdir("spawned")

# The files will now pop into existence in this new directory
spawned = spawn(
    main_connection=main_db,
    keys_connection=keys_db,
    key_reference=key_ref,
    directory="spawned",
    get_all=True,
    echo=True,
)

# Decrypt them
for file, key in zip(spawned["filenames"], spawned["keys"]):
    CryptFile(file, key).decrypt(echo=True)

The demonstration highlights a practical use case of Litecrypt. The process of securing and recovering encrypted files becomes incredibly straightforward. The demo outlines how to extract and encrypt data from files, establish connections between two databases by associating files and their respective keys using reference values to securely manage keys and file data. It briefly illustrates how significantly simple the task of safeguarding data is.
Feel free to copy this demo and observe the output in your terminal.

If you don't want to deal with code here's an

All In One App

Wait... Install the library first

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

litecrypt-0.0.0.tar.gz (31.7 kB view details)

Uploaded Source

Built Distribution

litecrypt-0.0.0-py3-none-any.whl (33.0 kB view details)

Uploaded Python 3

File details

Details for the file litecrypt-0.0.0.tar.gz.

File metadata

  • Download URL: litecrypt-0.0.0.tar.gz
  • Upload date:
  • Size: 31.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.7.17

File hashes

Hashes for litecrypt-0.0.0.tar.gz
Algorithm Hash digest
SHA256 68e7eff92c26c17dcb0c87498cafa24a918ed058b04bb4255870a780db64dbb3
MD5 5e4dc190522e4b8b8858cc2728c2e28b
BLAKE2b-256 769ae3d8a0ed9294a05ad77292fe74ac543a208474dd7a2ddcac86d66613ae6a

See more details on using hashes here.

File details

Details for the file litecrypt-0.0.0-py3-none-any.whl.

File metadata

  • Download URL: litecrypt-0.0.0-py3-none-any.whl
  • Upload date:
  • Size: 33.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.7.17

File hashes

Hashes for litecrypt-0.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 a3d9fcc45840f554edbe7cd4c4d0059d40a8b771ea9fb021cdade8845a5e4201
MD5 69c38adf98a9d31f74b74ccacc4e855f
BLAKE2b-256 b1640fff74970e20e7709058272e646beb885c07d0bcc4baf1b67052538a3a23

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page