SecureCommunications simplifies CryptoKit tasks using Secure Enclave and AES and ChaChaPoly Ciphers and HMAC Message Authentication Codes.
let salt = "This is our salt"
let message = "This is a top secret message"
let encryptedMessage = message.sealAES(
recipientPublicKey: recipientPublicKey,
salt: salt)
let myPublicKey = try KeyStore().publicKey()
This library requires Secure Enclave on device: iPhone 5s (or later), iPad Air (or later), Mac computers that contain the T1 chip or the Apple T2 Security Chip, Apple TV 4th generation (or later), Apple Watch Series 1 (or later), HomePod
Minimum requirements: iOS 13.0, OSX 10.15, watchOS 6.0 or tvOS 13.0
On MacOS don't forget to enable keychain sharing entitlement
Add the SecureCommunicationsVapor
package to the dependencies within your appliction's Package.swift
file:
.package(url: "https://github.com/supakonoha/SecureCommunications", from: "1.0.0")
Add SecureCommunicationsVapor
to your target's dependencies:
.target(name: "example", dependencies: ["SecureCommunications"]),
import SecureCommunications
Declare the use of encryption in your app to streamline the app submission process.
When you submit your app to TestFlight or the App Store, you upload your app to a server in the United States. If you distribute your app outside the U.S. or Canada, your app is subject to U.S. export laws, regardless of where your legal entity is based. If your app uses, accesses, contains, implements, or incorporates encryption, this is considered an export of encryption software, which means your app is subject to U.S. export compliance requirements, as well as the import compliance requirements of the countries where you distribute your app.
Every time you submit a new version of your app, App Store Connect asks you questions to guide you through a compliance review. You can bypass these questions and streamline the submission process by providing the required information in your app’s Information Property List file.
Add the ITSAppUsesNonExemptEncryption
key to your app’s Info.plist file with a Boolean value that indicates whether your app uses encryption. Set the value to NO if your app—including any third-party libraries it links against—doesn’t use encryption, or if it only uses forms of encryption that are exempt from export compliance documentation requirements. Otherwise, set it to YES.
Typically, the use of encryption that’s built into the operating system—for example, when your app makes HTTPS connections using URLSession
—is exempt from export documentation upload requirements, whereas the use of proprietary encryption is not. To determine whether your use of encryption is considered exempt, see Determine your export compliance requirements.
Important
If your app uses exempt forms of encryption, you might alternatively be required to submit a year-end self-classification report to the U.S. government. (If you use non-exempt encryption and provide documentation to Apple, the self-classification report isn’t necessary.) To learn more, see How to file an Annual Self Classification Report.
If your app requires export compliance documentation, upload the required items to App Store Connect, as described in Upload export compliance documentation. After successfully reviewing the documents, Apple provides you with a code. Add this string as the value for the ITSEncryptionExportComplianceCode
key in your app’s Info.plist file.
The KeyStore
struct manages a P-256 private key used for key agreement. You don't have to worry about your key. It's totally secure using the Secure Enclave of the device and using KeyChain to reference to the right key. With that system, it creates internally a shared secret between two users by performing NIST P-256 elliptic curve Diffie Hellman (ECDH) key exchange.
If you want to send an encrypted message you will need to share your Public Key. For that you can use:
let myPublicKey = try KeyStore().publicKey()
This method will return a P256.KeyAgreement.PublicKey
instance of the public key.
let myPublicKey = try KeyStore().publicKeyInX963Representation()
This method will return an ANSI x9.63 representation of the public key as Data
.
let myPublicKey = try KeyStore().publicKeyInRawRepresentation()
This method will return a RAW representation of your public key as Data
This function is available only starting on iOS 14.0, macOS 11.0, watchOS 7.0 and tvOS 14.0
let myPublicKey = try KeyStore().publicKeyInPemRepresentation()
This method will return a PEM representation of your public key as String
This function is available only starting on iOS 14.0, macOS 11.0, watchOS 7.0 and tvOS 14.0
let myPublicKey = try KeyStore().publicKeyInDerRepresentation()
This method will return a DER representation of your public key as Data
If you want to encrypt a message and send it to a recipient you can use AES and ChaChaPoly. The recipient of the encrypted message will use same cipher and will need your public key and the salt used for creating the symmetic key. For the full process you will need:
- The message: Original message if you want to encrypt, or encrypted message if you want to decrypt it
- Public key of the other part: A
P256.KeyAgreement.PublicKey
instance of the public key of other part. You will need it to encrypt the message. In case the recipient is a server, please, share the server public key in a secure way like usingCloudKit
. Please, don't hard-code the public key on the source code or abfuscate it, don't store it on Xcode Configuration or Info.plist files and never stores it on device once you have received it. - Your public key: You will need to pass to the other part, so it can encrypt or decrypt.
- Salt: The salt to use for key derivation. This salt can be shared between sender and recipient.
The Advanced Encryption Standard (AES) Galois Counter Mode (GCM) cipher suite.
To encrypt a message the library has added some extensions to String
and Data
classes
If you want to encrypt some Data
you will need to use sealAES(recipientPublicKey: P256.KeyAgreement.PublicKey, salt: Data)
function on the original message. It requieres the other part public key and the salt. You will receive the encrypted message that you can send to the other part with your public key and the salt.
let salt = "This is our salt".data(using: .utf8)!
let message = "This is a top secret message".data(using: .utf8)!
let encryptedMessage = message.sealAES(
recipientPublicKey: recipientPublicKey,
salt: salt)
If you want to encrypt some String
you will need to use sealAES(recipientPublicKey: P256.KeyAgreement.PublicKey, salt: String)
function on the original message. It requieres the other part public key and the salt. You will receive the encrypted message encoded on Base64 that you can send to the other part with your public key and the salt.
let salt = "This is our salt"
let message = "This is a top secret message"
let encryptedMessage = message.sealAES(
recipientPublicKey: recipientPublicKey,
salt: salt)
To decrypt a message the library has added some extensions to String
and Data
classes
If you want to decrypt some Data
you will need to use openAES(senderPublicKey: P256.KeyAgreement.PublicKey, salt:Data)
function on the encrypted message. It requieres the other part public key and the salt. You will receive the original message.
let salt = "This is our salt".data(using: .utf8)!
let message = encryptedMessage.openAES(
senderPublicKey: senderPublicKey,
salt: salt)
If you want to decrypt some String
you will need to use openAES(senderPublicKey: P256.KeyAgreement.PublicKey, salt: String)
function on the encrypted message encoded on Base64. It requieres the other part public key and the salt. You will receive the original message.
let salt = "This is our salt"
let message = encryptedMessage.openAES(
senderPublicKey: senderPublicKey,
salt: salt)
ChaCha20-Poly1305 cipher.
To encrypt a message the library has added some extensions to String
and Data
classes
If you want to encrypt some Data
you will need to use sealChaChaPoly(recipientPublicKey: P256.KeyAgreement.PublicKey, salt: Data)
function on the original message. It requieres the other part public key and the salt. You will receive the encrypted message that you can send to the other part with your public key and the salt.
let salt = "This is our salt".data(using: .utf8)!
let message = "This is a top secret message".data(using: .utf8)!
let encryptedMessage = message.sealChaChaPoly(
recipientPublicKey: recipientPublicKey,
salt: salt)
If you want to encrypt some String
you will need to use sealChaChaPoly(recipientPublicKey: P256.KeyAgreement.PublicKey, salt: String)
function on the original message. It requieres the other part public key and the salt. You will receive the encrypted message encoded on Base64 that you can send to the other part with your public key and the salt.
let salt = "This is our salt"
let message = "This is a top secret message"
let encryptedMessage = message.sealChaChaPoly(
recipientPublicKey: recipientPublicKey,
salt: salt)
To decypt a message the library has added some extensions to String
and Data
classes
If you want to decrypt some Data
you will need to use openChaChaPoly(senderPublicKey: P256.KeyAgreement.PublicKey, salt:Data)
function on the encrypted message. It requieres the other part public key and the salt. You will receive the original message.
let salt = "This is our salt".data(using: .utf8)!
let message = encryptedMessage.openChaChaPoly(
senderPublicKey: senderPublicKey,
salt: salt)
If you want to decrypt some String
you will need to use openChaChaPoly(senderPublicKey: P256.KeyAgreement.PublicKey, salt: String)
function on the encrypted message encoded on Base64. It requieres the other part public key and the salt. You will receive the original message.
let salt = "This is our salt"
let message = encryptedMessage.openChaChaPoly(
senderPublicKey: senderPublicKey,
salt: salt)
Use hash-based message authentication to create a code with a value that’s dependent on both a block of data and a symmetric cryptographic key. Another party with access to the data and the same secret key can compute the code again and compare it to the original to detect whether the data changed. This serves a purpose similar to digital signing and verification, but depends on a shared symmetric key instead of public-key cryptography.
As with digital signing, the data isn’t hidden by this process.
If you want to compute or validate a message authentication code you can use HMAC. The recipient of the message authentication code will use same HMAC configuration and will need your public key and the salt used for creating the symmetic key. For the full process you will need:
- The message.
- The message authentication code. If you are computing it, you will send it to the other part so it can validate it. If you are receiving it, you can validate it.
- Public key of the other part: A
P256.KeyAgreement.PublicKey
instance of the public key of other part. You will need it to compute the authentication code for the message or validate it. In case the recipient is a server, please, share the server public key in a secure way like usingCloudKit
. Please, don't hard-code the public key on the source code or abfuscate it, don't store it on Xcode Configuration or Info.plist files and never stores it on device once you have received it. - Your public key: If you are a client you can share it with the recipient. The recipient will need it to validate the message authentication code.
- Salt: The salt to use for key derivation. This salt can be shared between sender and recipient.
A hash-based message authentication algorithm.
To compute a message authentication code the library has added some extensions to String
and Data
classes
If you want to compute some Data
you will need to use authenticationCodeHMAC(recipientPublicKey: P256.KeyAgreement.PublicKey, salt: Data)
function on the message. It requieres the other part public key and the salt. You will receive the message authentication code that you can send to the other part with the original message, your public key and the salt.
let salt = "This is our salt".data(using: .utf8)!
let message = "This is a public message".data(using: .utf8)!
let messageAuthenticationCode = message.authenticationCodeHMAC(
recipientPublicKey: recipientPublicKey,
salt: salt)
If you want to compute some String
you will need to use authenticationCodeHMAC(recipientPublicKey: P256.KeyAgreement.PublicKey, salt: String)
function on the message. It requieres the other part public key and the salt. You will receive the message authentication code encoded on Base64 that you can send to the other part with the original message, your public key and the salt.
let salt = "This is our salt"
let message = "This is a public message"
let messageAuthenticationCode = message.authenticationCodeHMAC(
recipientPublicKey: recipientPublicKey,
salt: salt)
To validate a message authentication code the library has added some extensions to String
and Data
classes
If you want to validate some Data
you will need to use isValidAuthenticationCodeHMAC(authenticationCode: Data, senderPublicKey: P256.KeyAgreement.PublicKey, salt:Data)
function on the original message. It requieres the message authentication code, the other part public key and the salt. You will receive true
if the original message has not been modified.
let salt = "This is our salt".data(using: .utf8)!
let message = "This is a public message".data(using: .utf8)!
let isValid = message.isValidAuthenticationCodeHMAC(
authenticationCode: authenticationCode,
senderPublicKey: senderPublicKey,
salt: salt)
If you want to validate some String
you will need to use isValidAuthenticationCodeHMAC(authenticationCode: String, senderPublicKey: P256.KeyAgreement.PublicKey, salt: String)
function on the original message. It requieres the message authentication code encoded on Base64, the other part public key and the salt. You will receive true
if the original message has not been modified.
let salt = "This is our salt"
let message = "This is a public message"
let isValid = message.isValidAuthenticationCodeHMAC(
authenticationCode: authenticationCode,
senderPublicKey: senderPublicKey,
salt: salt)
You can check API Reference on documentation site