Asymmetric encryption with sodiumSource:
Wrap a pair of sodium keys for asymmetric encryption. You should pass your private key and the public key of the person that you are communicating with.
A sodium public key. This is either a raw vector of length 32 or a path to file containing the contents of the key (written by
A sodium private key. This is either a raw vector of length 32 or a path to file containing the contents of the key (written by
Logical, indicating if authenticated encryption (via
sodium::auth_decrypt()) should be used. If
sodium::simple_decrypt()will be used. The difference is that with
authenticated = TRUEthe message is signed with your private key so that tampering with the message will be detected.
NOTE: the order here (pub, key) is very important; if the wrong order is used you cannot decrypt things. Unfortunately because sodium keys are just byte sequences there is nothing to distinguish the public and private keys so this is a pretty easy mistake to make.
keypair_openssl() for a similar function using
# Generate two keypairs, one for Alice, and one for Bob key_alice <- sodium::keygen() pub_alice <- sodium::pubkey(key_alice) key_bob <- sodium::keygen() pub_bob <- sodium::pubkey(key_bob) # Alice wants to send Bob a message so she creates a key pair with # her private key and bob's public key (she does not have bob's # private key). pair_alice <- cyphr::keypair_sodium(pub = pub_bob, key = key_alice) # She can then encrypt a secret message: secret <- cyphr::encrypt_string("hi bob", pair_alice) secret #>  84 5c d8 be 6a 92 94 af b0 89 7a 1b 80 03 12 01 ce fc 98 aa 05 10 67 47 d5 #>  6a ce c5 ea bf 1f af 60 34 3f ca c1 de bd 99 cb b8 1c 05 63 7b # Bob wants to read the message so he creates a key pair using # Alice's public key and his private key: pair_bob <- cyphr::keypair_sodium(pub = pub_alice, key = key_bob) cyphr::decrypt_string(secret, pair_bob) #>  "hi bob"