circl
CIRCL: Cloudflare Interoperable Reusable Cryptographic Library
Science Score: 67.0%
This score indicates how likely this project is to be science-related based on various indicators:
-
✓CITATION.cff file
Found CITATION.cff file -
✓codemeta.json file
Found codemeta.json file -
✓.zenodo.json file
Found .zenodo.json file -
✓DOI references
Found 26 DOI reference(s) in README -
○Academic publication links
-
✓Committers with academic emails
1 of 27 committers (3.7%) from academic institutions -
○Institutional organization owner
-
○JOSS paper metadata
-
○Scientific vocabulary similarity
Low similarity (11.7%) to scientific vocabulary
Keywords
Keywords from Contributors
Repository
CIRCL: Cloudflare Interoperable Reusable Cryptographic Library
Basic Info
- Host: GitHub
- Owner: cloudflare
- License: other
- Language: Go
- Default Branch: main
- Homepage: http://blog.cloudflare.com/introducing-circl
- Size: 70.6 MB
Statistics
- Stars: 1,496
- Watchers: 42
- Forks: 174
- Open Issues: 57
- Releases: 15
Topics
Metadata Files
README.md
![]()
CIRCL
CIRCL (Cloudflare Interoperable, Reusable Cryptographic Library) is a collection of cryptographic primitives written in Go. The goal of this library is to be used as a tool for experimental deployment of cryptographic algorithms targeting Post-Quantum (PQ) and Elliptic Curve Cryptography (ECC).
Security Disclaimer
This library is offered as-is, and without a guarantee. Therefore, it is expected that changes in the code, repository, and API occur in the future. We recommend to take caution before using this library in a production application since part of its content is experimental. All security issues must be reported, please notify us immediately following the instructions given in our Security Policy.
Installation
You can get CIRCL by fetching:
sh
go get -u github.com/cloudflare/circl
Alternatively, look at the Cloudflare Go fork to see how to integrate CIRCL natively in Go.
List of Algorithms
Elliptic Curve Cryptography
| Diffie-Hellman Protocol | |:---:|
- X25519 and X448 functions. (RFC-7748)
- Curve4Q function based on FourQ curve. (draft-ladd-cfrg-4q)
| Digital Signature Schemes | |:---:|
- Ed25519 and Ed448 signatures. (RFC-8032)
- BLS signatures. (draft-irtf-cfrg-bls-signature)
| Prime Groups | |:---:|
- P-256, P-384, P-521. (FIPS 186-5)
- Ristretto group. (RFC-9496)
- Bilinear pairings: with the BLS12-381 curve, and hash to G1 and G2.
- Hash to curve, hash to field, XMD and XOF expanders. (RFC-9380)
| High-Level Protocols | |:---:|
- HPKE: Hybrid Public-Key Encryption (RFC-9180)
- VOPRF: Verifiable Oblivious Pseudorandom functions. (RFC-9497)
- RSA Blind Signatures. (RFC-9474)
- Partially-blind RSA Signatures. (draft-cfrg-partially-blind-rsa)
- CPABE: Ciphertext-Policy Attribute-Based Encryption. (ia.cr/2019/966)
- OT: Simplest Oblivious Transfer (ia.cr/2015/267).
- Threshold RSA Signatures (Shoup Eurocrypt 2000).
- Prio3 Verifiable Distributed Aggregation Function (draft-irtf-cfrg-vdaf).
Post-Quantum Cryptography
| KEM: Key Encapsulation Methods | |:---:|
- ML-KEM: modes 512, 768, 1024 (FIPS-203).
- X-Wing (draft-connolly-cfrg-xwing-kem).
- Kyber KEM: modes 512, 768, 1024 (KYBER).
- FrodoKEM: modes 640-SHAKE. (FrodoKEM)
- CSIDH: Post-Quantum Commutative Group Action (CSIDH).
- (insecure, deprecated) ~~SIDH/SIKE~~: Supersingular Key Encapsulation with primes p434, p503, p751 (SIKE).
| Digital Signature Schemes | |:---:|
- Dilithium: modes 2, 3, 5 (Dilithium).
- ML-DSA: modes 44, 65, 87 (FIPS 204).
- SLH-DSA: twelve parameter sets, pure and pre-hash signing (FIPS 205).
Zero-knowledge Proofs
- Schnorr: Prove knowledge of the Discrete Logarithm. (RFC-8235)
- DLEQ: Prove knowledge of the Discrete Logarithm Equality. (RFC-9497)
- DLEQ in Qn: Prove knowledge of the Discrete Logarithm Equality for subgroup of squares in (Z/nZ)*.
Symmetric Cryptography
| XOF: eXtendable Output Functions | |:---:|
- SHAKE128 and SHAKE256 (FIPS 202).
- BLAKE2X: BLAKE2XB and BLAKE2XS (Blake2x)
- KangarooTwelve: fast hashing based on Keccak-p. (KangarooTwelve).
- SIMD Keccak f1600 Permutation.
| LWC: Lightweight Cryptography | |:---:|
- Ascon v1.2: Family of AEAD block ciphers (ASCON)
Misc
| Integers | |:---:|
- Safe primes generation.
- Integer encoding: wNAF, regular signed digit, mLSBSet representations.
| Finite Fields | |:---:|
- Fp25519, Fp448, Fp511, Fp434, Fp503, Fp751.
- Fp381, and its quadratic, sextic and twelveth extensions.
- Polynomials in monomial and Lagrange basis.
| Elliptic Curves | |:---:|
- P-384 Curve
- FourQ
- Goldilocks
- BLS12-381
Testing and Benchmarking
Library comes with number of make targets which can be used for testing and benchmarking:
testperforms testing of the binary.benchruns benchmarks.coverproduces coverage.lintruns set of linters on the code base.
Contributing
To contribute, fork this repository and make your changes, and then make a Pull Request. A Pull Request requires approval of the admin team and a successful CI build.
How to Cite
To cite CIRCL, use one of the following formats and update the version and date you accessed this project.
APA Style
Faz-Hernandez, A. and Kwiatkowski, K. (2019). Introducing CIRCL:
An Advanced Cryptographic Library. Cloudflare. Available at
https://github.com/cloudflare/circl. v1.6.1 Accessed Apr, 2025.
BibTeX Source
bibtex
@manual{circl,
title = {Introducing CIRCL: An Advanced Cryptographic Library},
author = {Armando Faz-Hernandez and Kris Kwiatkowski},
organization = {Cloudflare},
abstract = {{CIRCL (Cloudflare Interoperable, Reusable Cryptographic Library) is
a collection of cryptographic primitives written in Go. The goal
of this library is to be used as a tool for experimental
deployment of cryptographic algorithms targeting Post-Quantum (PQ)
and Elliptic Curve Cryptography (ECC).}},
note = {Available at \url{https://github.com/cloudflare/circl}. v1.6.1 Accessed Apr, 2025},
month = jun,
year = {2019}
}
CFF Style
See attached CITATION.cff file.
License
The project is licensed under the BSD-3-Clause License.
Owner
- Name: Cloudflare
- Login: cloudflare
- Kind: organization
- Location: San Francisco, London, Austin, Lisbon, Singapore
- Website: https://www.cloudflare.com
- Repositories: 454
- Profile: https://github.com/cloudflare
Citation (CITATION.cff)
---
cff-version: 1.2.0
version: 1.6.1
title: "Introducing CIRCL: An Advanced Cryptographic Library"
license: BSD-3-Clause
abstract: >
CIRCL (Cloudflare Interoperable, Reusable Cryptographic Library) is
a collection of cryptographic primitives written in Go. The goal
of this library is to be used as a tool for experimental
deployment of cryptographic algorithms targeting Post-Quantum (PQ)
and Elliptic Curve Cryptography (ECC).
authors:
- family-names: Faz-Hernandez
given-names: Armando
affiliation: Cloudflare, Inc.
orcid: "https://orcid.org/0000-0001-5502-8666"
- family-names: Kwiatkowski
given-names: Kris
orcid: "https://orcid.org/0000-0003-2363-317X"
date-released: "2019-07-10"
keywords:
- cryptography
- crypto
- post-quantum
- golang
repository-code: "https://github.com/cloudflare/circl/"
type: software
message: "Available at https://github.com/cloudflare/circl. v1.6.1 Accessed Apr, 2025."
contact:
- name: "Cloudflare, Inc."
GitHub Events
Total
- Create event: 9
- Release event: 2
- Issues event: 27
- Watch event: 187
- Delete event: 7
- Issue comment event: 54
- Push event: 40
- Pull request review event: 131
- Pull request review comment event: 116
- Pull request event: 48
- Fork event: 35
Last Year
- Create event: 9
- Release event: 2
- Issues event: 27
- Watch event: 187
- Delete event: 7
- Issue comment event: 54
- Push event: 40
- Pull request review event: 131
- Pull request review comment event: 116
- Pull request event: 48
- Fork event: 35
Committers
Last synced: 9 months ago
Top Committers
| Name | Commits | |
|---|---|---|
| armfazh | a****h@c****m | 339 |
| Bas Westerbaan | b****s@w****e | 95 |
| Kris Kwiatkowski | k****s@c****m | 67 |
| Christopher Wood | c****w@h****t | 32 |
| Josh Soref | 2****f | 31 |
| xvzcf | x****f | 15 |
| Watson Ladd | w****n@c****m | 13 |
| Sofía Celi | c****9@g****m | 11 |
| Michael McLoughlin | m****n@g****m | 10 |
| John Bampton | j****n | 8 |
| Christopher Patton | c****n@g****m | 7 |
| Peter Wu | p****u@c****m | 5 |
| Tom Thorogood | m****b@t****k | 5 |
| Tanya Verma | t****a@c****m | 4 |
| zhdllwyc | y****w@u****u | 3 |
| Hrushikesh Deshpande | 1****e | 2 |
| dependabot[bot] | 4****] | 1 |
| Nadim Kobeissi | n****m@s****e | 1 |
| Monis Khan | i@m****p | 1 |
| MingLLuo | s****9@1****m | 1 |
| Mik Kocikowski | m****k@c****m | 1 |
| Matt Clarkson | m****n@g****m | 1 |
| Ko- | K****- | 1 |
| Josh Brown | j****1@g****m | 1 |
| Douglas Daniels | d****s@g****m | 1 |
| Daniel | d****n | 1 |
| Baoshuo Ren | i@b****n | 1 |
Committer Domains (Top 20 + Academic)
Issues and Pull Requests
Last synced: 6 months ago
All Time
- Total issues: 66
- Total pull requests: 170
- Average time to close issues: 5 months
- Average time to close pull requests: about 1 month
- Total issue authors: 44
- Total pull request authors: 27
- Average comments per issue: 2.24
- Average comments per pull request: 1.11
- Merged pull requests: 132
- Bot issues: 0
- Bot pull requests: 2
Past Year
- Issues: 20
- Pull requests: 46
- Average time to close issues: 24 days
- Average time to close pull requests: 15 days
- Issue authors: 17
- Pull request authors: 9
- Average comments per issue: 1.35
- Average comments per pull request: 0.63
- Merged pull requests: 32
- Bot issues: 0
- Bot pull requests: 1
Top Authors
Issue Authors
- armfazh (5)
- bwesterb (4)
- chris-wood (3)
- kriskwiatkowski (3)
- UladzimirTrehubenka (3)
- david415 (3)
- 3052 (2)
- krissully (2)
- udf2457 (2)
- JensAc (1)
- alenhorvat (1)
- ravinderncog (1)
- mvd-ows (1)
- pmcampones (1)
- y12studio (1)
Pull Request Authors
- armfazh (99)
- bwesterb (39)
- chris-wood (9)
- Lekensteyn (9)
- zhdllwyc (7)
- elementrics (5)
- tanyav2 (5)
- tmthrgd (4)
- ilway25 (2)
- dependabot[bot] (2)
- hrushikeshdeshpande (2)
- mattyclarkson (2)
- emersion (2)
- LINCKODE (2)
- MingLLuo (2)
Top Labels
Issue Labels
Pull Request Labels
Packages
- Total packages: 17
- Total downloads: unknown
- Total docker downloads: 6,747,227,080
-
Total dependent packages: 6,861
(may contain duplicates) -
Total dependent repositories: 2,787
(may contain duplicates) - Total versions: 100
- Total advisories: 4
proxy.golang.org: github.com/cloudflare/circl
Package circl provides a collection of cryptographic primitives. The goal of this module is to be used as a tool for experimental deployment of cryptographic algorithms targeting Post-Quantum (PQ) and Elliptic Curve Cryptography (ECC). Following blog post describes ideas behind CIRCL in more details: https://blog.cloudflare.com/introducing-circl/
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl#section-documentation
- License: BSD-3-Clause
-
Latest release: v1.6.1
published 11 months ago
Rankings
Advisories (4)
proxy.golang.org: github.com/cloudflare/circl/internal/sha3
Package sha3 implements the SHA-3 fixed-output-length hash functions and the SHAKE variable-output-length hash functions defined by FIPS-202. Both types of hash function use the "sponge" construction and the Keccak permutation. For a detailed specification see http://keccak.noekeon.org/ If you aren't sure what function you need, use SHAKE256 with at least 64 bytes of output. The SHAKE instances are faster than the SHA3 instances; the latter have to allocate memory to conform to the hash.Hash interface. If you need a secret-key MAC (message authentication code), prepend the secret key to the input, hash with SHAKE256 and read at least 32 bytes of output. The SHA3-x (x equals 224, 256, 384, or 512) functions have a security strength against preimage attacks of x bits. Since they only produce "x" bits of output, their collision-resistance is only "x/2" bits. The SHAKE-256 and -128 functions have a generic security strength of 256 and 128 bits against all attacks, provided that at least 2x bits of their output is used. Requesting more than 64 or 32 bytes of output, respectively, does not increase the collision-resistance of the SHAKE functions. A sponge builds a pseudo-random function from a public pseudo-random permutation, by applying the permutation to a state of "rate + capacity" bytes, but hiding "capacity" of the bytes. A sponge starts out with a zero state. To hash an input using a sponge, up to "rate" bytes of the input are XORed into the sponge's state. The sponge is then "full" and the permutation is applied to "empty" it. This process is repeated until all the input has been "absorbed". The input is then padded. The digest is "squeezed" from the sponge in the same way, except that output is copied out instead of input being XORed in. A sponge is parameterized by its generic security strength, which is equal to half its capacity; capacity + rate is equal to the permutation's width. Since the KeccakF-1600 permutation is 1600 bits (200 bytes) wide, this means that the security strength of a sponge instance is equal to (1600 - bitrate) / 2. The SHAKE functions are recommended for most new uses. They can produce output of arbitrary length. SHAKE256, with an output length of at least 64 bytes, provides 256-bit security against all attacks. The Keccak team recommends it for most applications upgrading from SHA2-512. (NIST chose a much stronger, but much slower, sponge instance for SHA3-512.) The SHA-3 functions are "drop-in" replacements for the SHA-2 functions. They produce output of the same length, with the same security strengths against all attacks. This means, in particular, that SHA3-256 only has 128-bit collision resistance, because its output length is 32 bytes.
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/internal/sha3#section-documentation
- License: BSD-3-Clause
Rankings
proxy.golang.org: github.com/cloudflare/circl/sign/ed448
Package ed448 implements Ed448 signature scheme as described in RFC-8032. This package implements two signature variants. Specific functions for sign and verify are defined. A generic signing function for all schemes is available through the crypto.Signer interface, which is implemented by the PrivateKey type. A correspond all-in-one verification method is provided by the VerifyAny function. Both schemes require a context string for domain separation. This parameter is passed using a SignerOptions struct defined in this package. References:
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/sign/ed448#section-documentation
- License: BSD-3-Clause
Rankings
proxy.golang.org: github.com/cloudflare/circl/sign
Package sign provides unified interfaces for signature schemes. A register of schemes is available in the package
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/sign#section-documentation
- License: BSD-3-Clause
Rankings
proxy.golang.org: github.com/cloudflare/circl/dh/x448
Package x448 provides Diffie-Hellman functions as specified in RFC-7748. Validation of public keys. The Diffie-Hellman function, as described in RFC-7748 [1], works for any public key. However, if a different protocol requires contributory behaviour [2,3], then the public keys must be validated against low-order points [3,4]. To do that, the Shared function performs this validation internally and returns false when the public key is invalid (i.e., it is a low-order point). References:
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/dh/x448#section-documentation
- License: BSD-3-Clause
Rankings
proxy.golang.org: github.com/cloudflare/circl/dh/x25519
Package x25519 provides Diffie-Hellman functions as specified in RFC-7748. Validation of public keys. The Diffie-Hellman function, as described in RFC-7748 [1], works for any public key. However, if a different protocol requires contributory behaviour [2,3], then the public keys must be validated against low-order points [3,4]. To do that, the Shared function performs this validation internally and returns false when the public key is invalid (i.e., it is a low-order point). References:
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/dh/x25519#section-documentation
- License: BSD-3-Clause
Rankings
proxy.golang.org: github.com/cloudflare/circl/ecc/goldilocks
Package goldilocks provides elliptic curve operations over the goldilocks curve.
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/ecc/goldilocks#section-documentation
- License: BSD-3-Clause
Rankings
proxy.golang.org: github.com/cloudflare/circl/math
Package math provides some utility functions for big integers.
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/math#section-documentation
- License: BSD-3-Clause
Rankings
proxy.golang.org: github.com/cloudflare/circl/math/mlsbset
Package mlsbset provides a constant-time exponentiation method with precomputation. References: "Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV–GLS curves" by (Faz-Hernandez et al.)
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/math/mlsbset#section-documentation
- License: BSD-3-Clause
Rankings
proxy.golang.org: github.com/cloudflare/circl/math/fp448
Package fp448 provides prime field arithmetic over GF(2^448-2^224-1).
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/math/fp448#section-documentation
- License: BSD-3-Clause
Rankings
proxy.golang.org: github.com/cloudflare/circl/sign/ed25519
Package ed25519 implements Ed25519 signature scheme as described in RFC-8032. This package provides optimized implementations of the three signature variants and maintaining closer compatibility with crypto/ed25519. Specific functions for sign and verify are defined. A generic signing function for all schemes is available through the crypto.Signer interface, which is implemented by the PrivateKey type. A correspond all-in-one verification method is provided by the VerifyAny function. Signing with Ed25519Ph or Ed25519Ctx requires a context string for domain separation. This parameter is passed using a SignerOptions struct defined in this package. While Ed25519Ph accepts an empty context, Ed25519Ctx enforces non-empty context strings. These functions are compatible with the “Ed25519” function defined in RFC-8032. However, unlike RFC 8032's formulation, this package's private key representation includes a public key suffix to make multiple signing operations with the same key more efficient. This package refers to the RFC-8032 private key as the “seed”. References
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/sign/ed25519#section-documentation
- License: BSD-3-Clause
Rankings
proxy.golang.org: github.com/cloudflare/circl/internal/conv
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/internal/conv#section-documentation
- License: BSD-3-Clause
Rankings
proxy.golang.org: github.com/cloudflare/circl/pke/kyber/internal/common/asm
AVX2 optimized version of polynomial operations. See the comments on the generic implementation for the details of the maths involved.
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/pke/kyber/internal/common/asm#section-documentation
- License: BSD-3-Clause
-
Latest release: v0.0.0-20230906233825-44133f703215
published over 2 years ago
Rankings
proxy.golang.org: github.com/cloudflare/circl/simd/keccakf1600/internal/asm
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/simd/keccakf1600/internal/asm#section-documentation
- License: BSD-3-Clause
-
Latest release: v0.0.0-20240103120215-ede59c5caa02
published about 2 years ago
Rankings
proxy.golang.org: github.com/cloudflare/circl/sign/dilithium/internal/common/asm
AVX2 optimized version of Poly.[Inv]NTT(). See the comments on the generic implementation for details on the maths involved.
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/sign/dilithium/internal/common/asm#section-documentation
- License: BSD-3-Clause
-
Latest release: v0.0.0-20230906233825-44133f703215
published over 2 years ago
Rankings
proxy.golang.org: github.com/Cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/Cloudflare/circl#section-documentation
- License: other
-
Latest release: v1.6.1
published 11 months ago
Rankings
proxy.golang.org: github.com/cloudflare/circl/sign/internal/dilithium/asm
AVX2 optimized version of Poly.[Inv]NTT(). See the comments on the generic implementation for details on the maths involved.
- Homepage: https://github.com/cloudflare/circl
- Documentation: https://pkg.go.dev/github.com/cloudflare/circl/sign/internal/dilithium/asm#section-documentation
- License: BSD-3-Clause
Rankings
Dependencies
- actions/checkout v3 composite
- actions/setup-go v3 composite
- codecov/codecov-action v2 composite
- github/codeql-action/analyze v2 composite
- github/codeql-action/init v2 composite
- golangci/golangci-lint-action v3 composite