simple-secure-webcrypto
v2.0.1
Published
Simple and secure encrypt/decrypt functions using Web Crypto API and no dependencies
Readme
simple-secure-webcrypto
This Simple Secure WebCrypto library was created to make it easy to do symmetric encryption and decryption of strings using the Web Crypto API, which provides the SubtleCrypto interface with low-level cryptographic functions.
Features
✅ Zero package dependencies - exclusively uses WebCrypto API.
✅ Works on browser platforms like Cloudflare Workers.
✅ Secure defaults; uses AES-GCM (authenticated encryption) with a 256 bit key.
✅ Written in TypeScript.
Who is this library for?
If you're a developer building on platforms such as Cloudflare Pages or Cloudflare Workers and want to easily encrypt and decrypt some data with just an secret from an environment variable, this library provides a simple interface to do so.
Usage
Install via your package manager:
bun install simple-secure-webcryptoThen invoke the async encrypt and decrypt functions:
import { encrypt, decrypt } from "simple-secure-webcrypto";
const someData = "hello world";
try {
const encrypted = await encrypt(env.ENCRYPTION_SECRET, someData);
const decrypted = await decrypt(env.ENCRYPTION_SECRET, encrypted);
} catch (error) {
console.log(error);
}Note: the decrypt function will throw an error if the encrypted data is in an invalid format.
To generate a new random encryption secret key, we created the genkey.ts helper:
import { generateKey } from "./src/index";
console.log(await generateKey());which you can run from this repository root with:
bun run ./genkey.tsHow does it work?
Under the hood the SubtleCrypto interface provides encryption and decryption functions which support multiple algorithms.
The encrypted string returns from our encrypt function will be encoded as iv.ciphertext where:
IV is the base64 encoded Initialization Vector (IV) aka nonce, randomly generated on each
encryptfunction invocation.Ciphertext is the base64 encoded AES-GCM encrypted value.
The returned string can safely be stored in a database or cookie; AES-GCM uses authenticated encryption, which will fail if either the ciphertext or IV cannot be verified, per Appendix B: Authentication Assurance in NIST SP 800-38D.
License
MIT
Credit
Thank you to Nadrama.com for sponsoring this work! Nadrama enables you to run a Kubernetes PaaS in your cloud account, in minutes.
References
Development
We're using TypeScript, Bun, Bun test, Prettier, and ESLint.
To install dev dependencies:
bun installTo run prettier and eslint:
bun run pretty
bun run lintTo run tests:
bun testTo build:
bun run buildSecurity
Please reach out to Nadrama or @ryan0x44 if you have any security related questions or concerns.
