CryptoNet 2.4.0

Requires NuGet 1.0.0 or higher.

dotnet add package CryptoNet --version 2.4.0
NuGet\Install-Package CryptoNet -Version 2.4.0
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="CryptoNet" Version="2.4.0" />
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add CryptoNet --version 2.4.0
#r "nuget: CryptoNet, 2.4.0"
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install CryptoNet as a Cake Addin
#addin nuget:?package=CryptoNet&version=2.4.0

// Install CryptoNet as a Cake Tool
#tool nuget:?package=CryptoNet&version=2.4.0

Cryptonet

GitHub CryptoNet NuGet version Passing build workflow Generic badge

Introduction

🚀 CryptoNet is simple, fast, and a lightweight asymmetric and symmetric encryption NuGet library supporting .NET Standard 2.0 and C# 8.0 for cross platforms Windows, Linux, and iOS. It is a 100% native C# implementation based on Microsoft cryptography. It does not depend on other libraries.

Installation

You can download CryptoNet via NuGet.

Website

https://maythamfahmi.github.io/CryptoNet

Versions

Nuget is latest version and are maintained.

List of features:

  • RSA asymmetric encryption.
  • AES symmetric encryption.
  • RSA PEM exporting and importing.
  • Support for X509Certificate2.
  • Ability to encrypt and decrypt text, files like images, word, excel, etc.
  • Cross-platform compatible with Windows, Linux, and iOS.

Issues

Please report issues here.

How to use

Short intro

The library can be used in 2 ways:

  • Symmetrically encryption
  • Asymmetrically encryption (public key encryption)
Symmetric encryption

You use the same key (any secret key) for encryption and decryption.

Asymmetric encryption

In an asymmetric way, the library can use its own self-generated RSA key pairs (Private/Public key) to encrypt and decrypt content.

You can store the private key on one or more machines. The public key can easily distribute to all clients.

Note: Please be aware not to distribute private key publicly and keep it in a safe place. If a private key mistakenly gets exposed, you need to reissue new keys. The content that is already encrypted with the private key, can not be decrypted back with the newly generated private key. So before updating the private key or deleting the old key ensure all your content is decrypted, otherwise, you lose the content.

It is also possible to use asymmetric keys of the X509 Certificate instead of generating your own keys.

The main concept with asymmetric encryption is that you have a Private and Public key. You use the Public key to encrypt the content and use the Private key to decrypt the content back again.

Read more about asymmetric or public key encryption here

You find the complete and all examples for:

  • RSA encryption here
  • AES encryption here

Here are some examples:

Examples

Example: Encrypt and Decrypt Content With Symmetric Key

In this example CryptoNetAes generate a random key and IV, hence we use the same instance we can both encrypt and decrypt.

ICryptoNet cryptoNet = new CryptoNetAes();
var key = cryptoNet.ExportKey();

ICryptoNet encryptClient = new CryptoNetAes(key);
var encrypt = encryptClient.EncryptFromString(ConfidentialDummyData);

ICryptoNet decryptClient = new CryptoNetAes(key);
var decrypt = decryptClient.DecryptToString(encrypt);

Debug.Assert(ConfidentialDummyData == decrypt);

Example: Encrypt and Decrypt Content With Export and Import Self-Generated Symmetric Key

ICryptoNet cryptoNet = new CryptoNetAes();
var file = new FileInfo(SymmetricKeyFile);
cryptoNet.ExportKeyAndSave(file);

Debug.Assert(File.Exists(file.FullName));

var encrypt = cryptoNet.EncryptFromString(ConfidentialDummyData);
        
ICryptoNet cryptoNetKeyImport = new CryptoNetAes(file);
var decrypt = cryptoNetKeyImport.DecryptToString(encrypt);

Debug.Assert(ConfidentialDummyData == decrypt);

Example: Generate Asymmetric RSA key pair, Export Private and Public, use Public key to encrypt with and Use Private key to decrypt with

ICryptoNet cryptoNet = new CryptoNetRsa();

cryptoNet.ExportKeyAndSave(new FileInfo(PrivateKeyFile), true);
cryptoNet.ExportKeyAndSave(new FileInfo(PublicKeyFile), false);

Debug.Assert(File.Exists(new FileInfo(PrivateKeyFile).FullName));
Debug.Assert(File.Exists(new FileInfo(PublicKeyFile).FullName));

ICryptoNet cryptoNetPubKey = new CryptoNetRsa(new FileInfo(PublicKeyFile));
var encrypt = cryptoNetPubKey.EncryptFromString(ConfidentialDummyData);

ICryptoNet cryptoNetPriKey = new CryptoNetRsa(new FileInfo(PrivateKeyFile));
var decrypt = cryptoNetPriKey.DecryptToString(encrypt);

Debug.Assert(ConfidentialDummyData == decrypt);

Example: Use X509 certificate to Encrypt with Public Key and later Decrypt with Private Key

// Find and replace CN=Maytham with your own certificate
X509Certificate2? certificate = CryptoNetUtils.GetCertificateFromStore("CN=Maytham");

ICryptoNet cryptoNetWithPublicKey = new CryptoNetRsa(certificate, KeyType.PublicKey);
var encryptWithPublicKey = cryptoNetWithPublicKey.EncryptFromString(ConfidentialDummyData);

ICryptoNet cryptoNetWithPrivateKey = new CryptoNetRsa(certificate, KeyType.PrivateKey);
var decryptWithPrivateKey = cryptoNetWithPrivateKey.DecryptToString(encryptWithPublicKey);

Debug.Assert(ConfidentialDummyData == decryptWithPrivateKey);

Build and Testing

You have different options to build and run the unit tests from:

  1. Visual Studio 2019/2022.
  2. dotnet command line.
  3. start Powershell, and run build.ps1 from solution folder.
  4. Docker, run the following command from the solution folder:
docker build . --file .\Dockerfile --tag cryptonet-service:latest

Contributing

You are more than welcome to contribute in one of the following ways:

  1. Basic: Give input, and suggestions for improvement by creating an issue and labeling it https://github.com/maythamfahmi/CryptoNet/issues
  2. Advance: if you have good knowledge of C# and Cryptography just grab one of the issues, or features, or create a new one and refactor and add a pull request.
  3. Documentation: Add, update, or improve documentation, by making a pull request.

How to contribute:

Here is a link to learn how to contribute if you are not aware of how to do it.

Product Compatible and additional computed target framework versions.
.NET net5.0 was computed.  net5.0-windows was computed.  net6.0 was computed.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 was computed.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed. 
.NET Core netcoreapp2.0 was computed.  netcoreapp2.1 was computed.  netcoreapp2.2 was computed.  netcoreapp3.0 was computed.  netcoreapp3.1 was computed. 
.NET Standard netstandard2.0 is compatible.  netstandard2.1 was computed. 
.NET Framework net461 was computed.  net462 was computed.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 was computed.  net481 was computed. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen40 was computed.  tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.
  • .NETStandard 2.0

    • No dependencies.

NuGet packages

This package is not used by any NuGet packages.

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
2.4.0 2,132 9/27/2023
2.3.0 581 8/15/2023
2.2.0 6,134 10/28/2022
2.2.0-preview001 117 7/12/2022
2.1.0 1,732 5/21/2022
1.6.0 432 2/3/2022
1.5.0 217 1/9/2022
1.2.0 209 1/1/2022
1.0.0 210 12/24/2021