[PSEC](https://github.com/hardcore-sushi/PSEC) (Peer-to-peer Secure Ephemeral Communications) is a simplification/adaptation of TLS 1.3 for P2P networks which provides an encrypted and authenticated secure transport layer for ephemeral communications. PSEC ensures deniability, forward secrecy, future secrecy, and optional plaintext length obfuscation. This crate is an implementation of this protocol built in [rust](https://www.rust-lang.org) with the [tokio](https://tokio.rs) framework. # Disclaimer Neither the code of this crate or the PSEC protocol received any security audit and therefore shouldn't be considered fully secure. This software is provided "as is", without any warranty of any kind. # Example ```rust use rand::rngs::OsRng; use tokio::net::TcpStream; use async_psec::{Session, Identity, PsecReader, PsecWriter, PsecError}; #[tokio::main] async fn main() -> Result<(), PsecError> { let identity = Identity::generate(&mut OsRng); //generate a new PSEC identity //connect to another PSEC node listening on 10.152.152.10:7530 let stream = TcpStream::connect("10.152.152.10:7530").await.unwrap(); let mut psec_session = Session::from(stream); //wrap the TcpStream into a PSEC session psec_session.do_handshake(&identity).await?; //perform the PSEC handshake //encrypt a message, obfuscate its length with padding then send it psec_session.encrypt_and_send(b"Hello I'm Alice", true).await?; //receive then decrypt a message println!("Received: {:?}", psec_session.receive_and_decrypt().await?); } ``` # Intstallation To add this crate to your project, add the following to your project's Cargo.toml: ```toml [dependencies] async-psec = "0.3" ``` # Documentation The API documentation can be found [here](https://docs.rs/async-psec). # Authenticity If you want to use this crate in a critical project, I don't recommend to use [crates.io](https://crates.io). Instead, download the code from the repository: ``` git clone https://forge.chapril.org/hardcoresushi/async-psec ``` And add this to your Cargo.toml: ```toml [patch.crates-io] async-psec = { path = "" } ``` All commits should be signed with my PGP key. __Don't use this crate if the verification fails !__ You can import my key from keyservers with: ``` gpg --keyserver hkp://pool.sks-keyservers.net --recv-keys 007F84120107191E ``` Fingerprint: `BD56 2147 9E7B 74D3 6A40 5BE8 007F 8412 0107 191E` \ Email: `Hardcore Sushi ` Once imported, verify the latest commit: ``` cd async-psec git verify-commit HEAD ``` This should show you something like: ``` gpg: Signature made gpg: using RSA key BD5621479E7B74D36A405BE8007F84120107191E gpg: Good signature from "Hardcore Sushi " [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: BD56 2147 9E7B 74D3 6A40 5BE8 007F 8412 0107 191E ```