| Name | Modified | Size | Downloads / Week |
|---|---|---|---|
| kisatk_win32.zip | 2021-08-03 | 811.1 kB | |
| kisatk_linux-x86.zip | 2021-08-03 | 747.2 kB | |
| kisatk_linux-amd64.zip | 2021-08-03 | 779.4 kB | |
| kisatk_linux-armel.zip | 2021-08-03 | 727.9 kB | |
| README.md | 2021-08-03 | 2.8 kB | |
| Totals: 5 Items | 3.1 MB | 0 |
KISA Toolkit
Multi purpose cross-platform cryptography tool for symmetric encryption, cipher-based message authentication code (CMAC), recursive hash digest, hash-based message authentication code (HMAC) and PBKDF2 function.
KISA Tookit: Korea Internet & Security Agency's Standard Algoritms:
- LSH Message digest algorithm 256/512-bit hash value.
- ARIA 128-bit block cipher with 128/192/256-bit keys.
- LEA 128-bit block cipher with 128/192/256-bit keys.
- SEED 128-bit block cipher with 128/256-bit keys.
- HIGHT 64-bit block cipher with 128-bit key.
Cryptographic Functions:
- Symmetric Encryption/Decryption
- Hash Digest
- CMAC (Cipher-based message authentication code)
- HMAC (Hash-based message authentication code)
- PBKDF2 (Password-based key derivation function 2)
Usage:
-bits int
Key length: 64, 128, 192 or 256. (for RAND and PBKDF2) (default 256)
-check string
Check hashsum file.
-cipher string
Block cipher: LEA, SEED, ARIA or HIGHT. (default "lea")
-cmac
Compute Cipher-based message authentication code.
-crypt
Encrypt/Decrypt with symmetric block ciphers.
-digest
Compute single hashsum.
-hash string
Hash algorithm: LSH256 or LSH512. (default "lsh256")
-hashsum string
Target file/wildcard to generate hashsum list.
-hmac
Compute Hash-based message authentication code.
-iter int
Iterations. (for PBKDF2 only) (default 1)
-key string
Password, CMAC secret key or HMAC key, depending on operation.
-mode string
Mode of operation: CTR or OFB. (default "CTR")
-pbkdf2
Password-based key derivation function.
-rand
Generate random cryptographic key.
-recursive
Process directories recursively. (for HASHSUM command only)
-salt string
Salt. (for PBKDF2 only)
-verbose
Verbose mode. (The exit code is always 0 in this mode)
Examples:
Encryption/decryption with symmetric block cipher (LEA-128bit):
./kisatk -crypt -key $128bitkey < plaintext.ext > ciphertext.ext ./kisatk -crypt -key $128bitkey < ciphertext.ext > plaintext.ext
LSH256 hashsum (list):
./kisatk -hashsum "\*.\*" [-recursive]
LSH256 hashsum (single):
./kisatk -digest < file.ext
HMAC-LSH256 (hash-based message authentication code):
./kisatk -hmac -key $SecretKey < file.ext
PBKDF2 (password-based key derivation function 2):
./kisatk -pbkdf2 -key "pass" -iter 10000 -salt "salt"
Note:
The PBKDF2 function can be combined with the CRYPT and HMAC commands:
./kisatk -crypt -pbkdf2 -key "pass" < plaintext.ext > ciphertext.ext ./kisatk -hmac -pbkdf2 -key "pass" -iter 10000 -salt "salt" < file.ext