Download Latest Version kisatk_linux-x86.zip (747.2 kB)
Email in envelope

Get an email when there's a new version of KISA Toolkit

Home
Name Modified Size InfoDownloads / Week
kisatk_win32.zip 2021-08-03 811.1 kB
kisatk_linux-x86.zip 2021-08-03 747.2 kB
kisatk_linux-amd64.zip 2021-08-03 779.4 kB
kisatk_linux-armel.zip 2021-08-03 727.9 kB
README.md 2021-08-03 2.8 kB
Totals: 5 Items   3.1 MB 0

KISA Toolkit

Multi purpose cross-platform cryptography tool for symmetric encryption, cipher-based message authentication code (CMAC), recursive hash digest, hash-based message authentication code (HMAC) and PBKDF2 function.

KISA Tookit: Korea Internet & Security Agency's Standard Algoritms:

  • LSH Message digest algorithm 256/512-bit hash value.
  • ARIA 128-bit block cipher with 128/192/256-bit keys.
  • LEA 128-bit block cipher with 128/192/256-bit keys.
  • SEED 128-bit block cipher with 128/256-bit keys.
  • HIGHT 64-bit block cipher with 128-bit key.

Cryptographic Functions:

  • Symmetric Encryption/Decryption
  • Hash Digest
  • CMAC (Cipher-based message authentication code)
  • HMAC (Hash-based message authentication code)
  • PBKDF2 (Password-based key derivation function 2)

Usage:

 -bits int
       Key length: 64, 128, 192 or 256. (for RAND and PBKDF2) (default 256)
 -check string
       Check hashsum file.
 -cipher string
       Block cipher: LEA, SEED, ARIA or HIGHT. (default "lea")
 -cmac
       Compute Cipher-based message authentication code.
 -crypt
       Encrypt/Decrypt with symmetric block ciphers.
 -digest
       Compute single hashsum.
 -hash string
       Hash algorithm: LSH256 or LSH512. (default "lsh256")
 -hashsum string
       Target file/wildcard to generate hashsum list.
 -hmac
       Compute Hash-based message authentication code.
 -iter int
       Iterations. (for PBKDF2 only) (default 1)
 -key string
       Password, CMAC secret key or HMAC key, depending on operation.
 -mode string
       Mode of operation: CTR or OFB. (default "CTR")
 -pbkdf2
       Password-based key derivation function.
 -rand
       Generate random cryptographic key.
 -recursive
       Process directories recursively. (for HASHSUM command only)
 -salt string
       Salt. (for PBKDF2 only)
 -verbose
       Verbose mode. (The exit code is always 0 in this mode)

Examples:

Encryption/decryption with symmetric block cipher (LEA-128bit):

./kisatk -crypt -key $128bitkey < plaintext.ext > ciphertext.ext
./kisatk -crypt -key $128bitkey < ciphertext.ext > plaintext.ext

LSH256 hashsum (list):

./kisatk -hashsum "\*.\*" [-recursive]

LSH256 hashsum (single):

./kisatk -digest < file.ext

HMAC-LSH256 (hash-based message authentication code):

./kisatk -hmac -key $SecretKey < file.ext

PBKDF2 (password-based key derivation function 2):

./kisatk -pbkdf2 -key "pass" -iter 10000 -salt "salt"

Note:

The PBKDF2 function can be combined with the CRYPT and HMAC commands:

./kisatk -crypt -pbkdf2 -key "pass" < plaintext.ext > ciphertext.ext
./kisatk -hmac -pbkdf2 -key "pass" -iter 10000 -salt "salt" < file.ext
Source: README.md, updated 2021-08-03