Menu
Home Explore People Places Arts History Plants & Animals Science Life & Culture Technology
On this page
Libgcrypt
Cryptographic software library

Libgcrypt is a cryptography library developed as a separated module of GnuPG. It can also be used independently of GnuPG, but depends on its error-reporting library Libgpg-error.

It provides functions for all fundamental cryptographic building blocks:

Primitive or OperationAlgorithms or Implementation
symmetric ciphers:AES (128, 192, 256 bits), DES, 3DES, IDEA, CAST5, Blowfish, Twofish (128, 256 bits), Ron's Cipher 2 / RC2 (40, 128 bits), ARCfour / RC4, SEED (RFC 4269), Serpent (128, 192, 256 bits), Camellia (128, 192, 256 bits), Salsa20, Salsa20/12, ChaCha20, GOST 28147-89 (RFC 5830) / GOST R 34.12-2015 (Magma: RFC 8891 & Kuznyechik: RFC 7801), SM4, ARIA
cipher modes:ECB, CFB, CBC, OFB, CTR, CCM, GCM, OCB, EAX, XTS, Stream, AES Key Wrap (RFC 3394), AES Key Wrap with padding (RFC 5649), SIV (RFC 5297) and GCM-SIV (RFC 8452)
public key algorithms:RSA, ElGamal, DSA, ECDSA, EdDSA, Ed448, DH, EDH, ECDH
hash algorithms:MD2, MD4, MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256, RIPEMD-160, TIGER/192, TIGER1, TIGER2, Whirlpool, CRC-24 (as in RFC 2440), CRC-32 (as in ISO 3309), CRC-32 (as in RFC 1510), GOST R 34.11-94 / GOST 34.311-95, GOST R 34.11-2012 (Stribog) / RFC 6986, BLAKE2b (128, 160, 224, 256 Bits), BLAKE2s (160, 256, 384, 512 Bits), SM3
message authentication codes (MACs):HMAC for all hash algorithms, CMAC for all cipher algorithms, GMAC for some cipher algorithms, Poly1305
key derivation functions (KDFs):S2K (as in RFC 4880: simple, salted, iterated+salted), PBKDF2, SCRYPT, Argon2d, Argon2i, Argon2id, Balloon
elliptic curves:NIST (P-256, P-384, P-521), SECG (secp256k1), ECC Brainpool / RFC 5639 (P256r1, P384r1, P512r1), Bernstein (Curve25519, Curve448), GOST R 34.10-2012 (RFC 7091), SM2

Libgcrypt features its own multiple precision arithmetic implementation, with assembler implementations for a variety of processors, including Alpha, AMD64, HP PA-RISC, i386, i586, M68K, MIPS 3, PowerPC, and SPARC. It also features an entropy gathering utility, coming in different versions for Unix-like and Windows machines.

Usually multiple, stable branches of Libgcrypt are maintained in parallel; since 2022-03-28 this is the Libgrypt 1.10 branch as stable branch, plus the 1.8 branch as LTS ("long-term support") branch, which will be maintained at least until 2024-12-31.

We don't have any images related to Libgcrypt yet.
We don't have any YouTube videos related to Libgcrypt yet.
We don't have any PDF documents related to Libgcrypt yet.
We don't have any Books related to Libgcrypt yet.
We don't have any archived web articles related to Libgcrypt yet.

See also

  • Free and open-source software portal

References

  1. Koch, Werner (1998-12-04). "libgcrypt" (Mailing list). gnupg-devel. Retrieved 2017-08-30. https://lists.gnupg.org/pipermail/gnupg-devel/1998-December/015041.html

  2. "Libgpg-error". GnuPG software. 2017-03-22. Retrieved 2017-12-13. https://gnupg.org/software/libgpg-error/index.html

  3. "src/cipher.h". 2017-06-16. Retrieved 2017-08-30. https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=src/cipher.h;hb=HEAD

  4. "Available ciphers". The Libgcrypt Reference Manual. 2017-08-27. Retrieved 2017-08-30. https://www.gnupg.org/documentation/manuals/gcrypt/Available-ciphers.html

  5. "Available cipher modes". The Libgcrypt Reference Manual. 2017-08-27. Retrieved 2017-08-30. https://www.gnupg.org/documentation/manuals/gcrypt/Available-cipher-modes.html

  6. "Available algorithms". The Libgcrypt Reference Manual. 2017-08-27. Retrieved 2017-08-30. https://www.gnupg.org/documentation/manuals/gcrypt/Available-algorithms.html

  7. "Cryptographic Functions". The Libgcrypt Reference Manual. 2017-08-27. Retrieved 2017-08-30. https://www.gnupg.org/documentation/manuals/gcrypt/Cryptographic-Functions.html

  8. "Available hash algorithms". The Libgcrypt Reference Manual. 2017-08-27. Retrieved 2017-08-30. https://www.gnupg.org/documentation/manuals/gcrypt/Available-hash-algorithms.html

  9. Shen, Sean; Lee, Xiaodong; Tse, Ronald Henry; Kit, Wong Wai; Yang, Paul (2018-01-08). "The SM3 Cryptographic Hash Function". Internet Engineering Task Force. Retrieved 2023-11-16. https://datatracker.ietf.org/doc/html/draft-sca-cfrg-sm3

  10. "Available MAC algorithms". The Libgcrypt Reference Manual. 2017-08-27. Retrieved 2017-08-30. https://www.gnupg.org/documentation/manuals/gcrypt/Available-MAC-algorithms.html

  11. "Key Derivation". The Libgcrypt Reference Manual. 2017-08-27. Retrieved 2017-08-30. https://www.gnupg.org/documentation/manuals/gcrypt/Key-Derivation.html

  12. Shen, Sean; Lee, Xiaodong (2014-02-14). "SM2 Digital Signature Algorithm". Internet Engineering Task Force. Retrieved 2023-11-16. https://datatracker.ietf.org/doc/html/draft-shen-sm2-ecdsa

  13. "End-of-life dates for GnuPG and Libgcrypt". GnuPG software. 2021-02-04. Retrieved 2021-02-07. https://gnupg.org/download/#end-of-life