Rust asynchronous PSEC implementation built with the tokio framework.
Go to file
Matéo Duparc eacd948236
Add unit test for compute_max_recv_size
2021-07-25 15:41:09 +02:00
src Add unit test for compute_max_recv_size 2021-07-25 15:41:09 +02:00
tests Use into_split() in test 2021-06-18 19:33:54 +02:00
.gitignore Genesis 2021-05-18 13:28:36 +02:00
Cargo.toml Use into_split() in test 2021-06-18 19:33:54 +02:00
LICENSE Genesis 2021-05-18 13:28:36 +02:00 Add authenticity section in README 2021-05-31 14:47:59 +02:00

PSEC (Peer-to-peer Secure Ephemeral Communications) is a simplification/adaptation of TLS 1.3 for P2P networks which provides an encrypted and authenticated secure transport layer for ephemeral communications. PSEC ensures deniability, forward secrecy, future secrecy, and optional plaintext length obfuscation. This crate is an implementation of this protocol built in rust with the tokio framework.


Neither the code of this crate or the PSEC protocol received any security audit and therefore shouldn't be considered fully secure. This software is provided "as is", without any warranty of any kind.


use rand::rngs::OsRng;
use tokio::net::TcpStream;
use async_psec::{Session, Identity, PsecReader, PsecWriter, PsecError};

async fn main() -> Result<(), PsecError> {
    let identity = Identity::generate(&mut OsRng); //generate a new PSEC identity

    //connect to another PSEC node listening on
    let stream = TcpStream::connect("").await.unwrap();

    let mut psec_session = Session::from(stream); //wrap the TcpStream into a PSEC session
    psec_session.do_handshake(&identity).await?; //perform the PSEC handshake
    //encrypt a message, obfuscate its length with padding then send it
    psec_session.encrypt_and_send(b"Hello I'm Alice", true).await?;
    //receive then decrypt a message
    println!("Received: {:?}", psec_session.receive_and_decrypt().await?);


To add this crate to your project, add the following to your project's Cargo.toml:

async-psec = "0.3"


The API documentation can be found here.


If you want to use this crate in a critical project, I don't recommend to use Instead, download the code from the repository:

git clone

And add this to your Cargo.toml:

async-psec = { path = "<path to the async-psec folder>" }

All commits should be signed with my PGP key. Don't use this crate if the verification fails !

You can import my key from keyservers with:

gpg --keyserver hkp:// --recv-keys 007F84120107191E

Fingerprint: BD56 2147 9E7B 74D3 6A40 5BE8 007F 8412 0107 191E
Email: Hardcore Sushi <>

Once imported, verify the latest commit:

cd async-psec
git verify-commit HEAD

This should show you something like:

gpg: Signature made <date>
gpg:                using RSA key BD5621479E7B74D36A405BE8007F84120107191E
gpg: Good signature from "Hardcore Sushi <>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: BD56 2147 9E7B 74D3 6A40  5BE8 007F 8412 0107 191E