"So do you roll your own crypto?"
If you're reading this section, you might already know the short answer: No.
We don't roll our own crypto. Themis relies on algorithm implementations that come from platform providers and open-source projects. We believe that anyone in their right mind should use well-known, audited implementations of well-known and proven cryptographic ciphers for their core security needs.
We've built Themis to have easy-to-use large building blocks bound to precise security guarantees and use cases — these are Secure Cell, Secure Message, Secure Session, and Secure Comparator cryptosystems. They are composed according to the best modern practices of achieving certain security guarantees.
Cryptographic algorithms mentioned on the main Soter page come from 3 cryptographic donors (all coming from one family of products), linked
1. These kinds of
libcrypto.so do not contain all the primitives we need (i.e. Secure Comparator relies on ed25519 and in the future it might require the implementation of an even more esoteric elliptic curve), so we have to supply the primitives from different backends in one build.
2. Some considerations concerning the performance and implementation elegance made us build additional experimental backends based on:
Themis is designed to be algorithm-agnostic thanks to its special abstraction layer, Soter. It could be built with custom ciphers or cipher implementations specific to your regulatory needs or to the available implementations in your environment. There are two ways you can alter these parameters: for the symmetric algorithm, there is a variable that points libsoter to a specific function picked at the compilation time.
Authenticated symmetric algorithm is selected by the
(Only AES in GCM mode is currently available.)
THEMIS_AUTH_SYM_ALG_AES_256_GCM(used by default)
General symmetric algorithm is selected by the
(Only AES in CTR mode is currently available.)
THEMIS_SYM_ALG_AES_256_CTR(used by default)
As for asymmetric algorithms, we're still working on making them switchable during compilation. Currently, for most of the asymmetric operations, the algorithm is selected by the key type you feed into it (either RSA or EC key, defined when the keypair is generated).
However, for RSA you can change the key length at compilation time
(We strongly insist that using a key length less than 2048
should only be done due to performance considerations,
in safe environments.)
2048(used by default)
What to use as a default backend is a matter of personal preferences and specific constraints of the task in question. So since 0.9.5 release version, Themis'
make system enables you to build Themis based on different backends yourself.
Our goal is not only to keep developing Themis with the best implementations of the best cryptographic algorithms available under the hood. Our goal lies as much in being able to consciously choose the optimal cryptographic algorithms for each use case, on every Themis build.