<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Psychevus</title>
    <description>The latest articles on DEV Community by Psychevus (@psychevus).</description>
    <link>https://dev.to/psychevus</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2524127%2F1e6db0a5-7036-49f0-8fdc-90ebb7e6c59a.jpeg</url>
      <title>DEV Community: Psychevus</title>
      <link>https://dev.to/psychevus</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/psychevus"/>
    <language>en</language>
    <item>
      <title>Introducing Cryptography Suite: A Python Library for the Modern Developer</title>
      <dc:creator>Psychevus</dc:creator>
      <pubDate>Wed, 04 Dec 2024 16:21:13 +0000</pubDate>
      <link>https://dev.to/psychevus/introducing-cryptography-suite-a-python-library-for-the-modern-developer-50e</link>
      <guid>https://dev.to/psychevus/introducing-cryptography-suite-a-python-library-for-the-modern-developer-50e</guid>
      <description>&lt;h2&gt;
  
  
  Introducing &lt;strong&gt;Cryptography Suite&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;As developers, we’re often caught between juggling multiple libraries to implement encryption, hashing, key management, and secure protocols in our applications. Wouldn't it be great if we had &lt;strong&gt;one unified library&lt;/strong&gt; to handle all our cryptographic needs without compromising on flexibility or security? &lt;/p&gt;

&lt;p&gt;That's exactly what &lt;strong&gt;Cryptography Suite&lt;/strong&gt; aims to solve.&lt;/p&gt;

&lt;h3&gt;
  
  
  🔍 What is Cryptography Suite?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Cryptography Suite&lt;/strong&gt; is a comprehensive cryptographic toolkit for Python. Designed to meet the demands of modern developers, it provides a wide range of cryptographic primitives and protocols in a single package. Whether you're encrypting sensitive data, signing messages, or generating one-time passwords (OTPs), this library has you covered.&lt;/p&gt;

&lt;p&gt;Unlike some alternatives, &lt;strong&gt;Cryptography Suite&lt;/strong&gt; takes a developer-first approach by providing an intuitive API, solid documentation, and strong security practices. &lt;/p&gt;

&lt;h3&gt;
  
  
  🎯 Who Is It For?
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Developers&lt;/strong&gt; building secure Python applications.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Educators&lt;/strong&gt; looking for a unified library to teach cryptographic concepts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security Enthusiasts&lt;/strong&gt; interested in exploring modern cryptographic techniques.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Startups &amp;amp; Enterprises&lt;/strong&gt; needing a library that balances ease-of-use with cutting-edge cryptography.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Whether you’re a seasoned cryptography nerd or someone dipping their toes into secure coding, &lt;strong&gt;Cryptography Suite&lt;/strong&gt; has something to offer.&lt;/p&gt;

&lt;h3&gt;
  
  
  🌟 Key Features
&lt;/h3&gt;

&lt;p&gt;Here’s what makes &lt;strong&gt;Cryptography Suite&lt;/strong&gt; stand out:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Unified API&lt;/strong&gt;&lt;br&gt;
No more juggling multiple libraries! Access encryption, hashing, key management, digital signatures, password-based key exchange (PAKE), secret sharing, and OTPs from a single library.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Modern Cryptographic Standards&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Symmetric Encryption: AES-GCM, ChaCha20-Poly1305.
&lt;/li&gt;
&lt;li&gt;Asymmetric Encryption: RSA, Ed25519, ECDSA.
&lt;/li&gt;
&lt;li&gt;Hashing: SHA-256, SHA-512, BLAKE2b.
&lt;/li&gt;
&lt;li&gt;Secret Sharing: Shamir’s Secret Sharing.
&lt;/li&gt;
&lt;li&gt;Password Authentication: SPAKE2 (PAKE).
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Developer-Friendly Design&lt;/strong&gt;&lt;br&gt;
A simple, intuitive API that saves time. No cryptography degree required to get started!&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Cross-Platform Compatibility&lt;/strong&gt;&lt;br&gt;
Works seamlessly on Linux, macOS, and Windows.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Extensible &amp;amp; Customizable&lt;/strong&gt;&lt;br&gt;
Need a specific encryption mode or key size? Extend and tweak the library to suit your needs.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Rigorous Testing&lt;/strong&gt;&lt;br&gt;
Achieves 98% test coverage, so you can trust it in your workflows.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  🚀 Getting Started
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Installation&lt;/strong&gt; is as easy as running:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;pip &lt;span class="nb"&gt;install &lt;/span&gt;cryptography-suite
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Or, clone the repository for custom development:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone https://github.com/Psychevus/cryptography-suite.git
&lt;span class="nb"&gt;cd &lt;/span&gt;cryptography-suite
pip &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nb"&gt;.&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  💡 Example Use Cases
&lt;/h3&gt;

&lt;h4&gt;
  
  
  1. Encrypt Data with AES-GCM
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;cryptography_suite.encryption&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;aes_encrypt&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;aes_decrypt&lt;/span&gt;

&lt;span class="n"&gt;message&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Confidential Data&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;
&lt;span class="n"&gt;password&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;securepassword123&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;

&lt;span class="c1"&gt;# Encrypt the message
&lt;/span&gt;&lt;span class="n"&gt;encrypted&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;aes_encrypt&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;message&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;password&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Encrypted:&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;encrypted&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Decrypt the message
&lt;/span&gt;&lt;span class="n"&gt;decrypted&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;aes_decrypt&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;encrypted&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;password&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Decrypted:&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;decrypted&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  2. Generate RSA Keys and Encrypt Data
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;cryptography_suite.asymmetric&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;generate_rsa_keypair&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;rsa_encrypt&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;rsa_decrypt&lt;/span&gt;

&lt;span class="n"&gt;private_key&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;public_key&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;generate_rsa_keypair&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;

&lt;span class="n"&gt;data&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sa"&gt;b&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Sensitive Data&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;

&lt;span class="c1"&gt;# Encrypt the data
&lt;/span&gt;&lt;span class="n"&gt;encrypted_data&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;rsa_encrypt&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;data&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;public_key&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Decrypt the data
&lt;/span&gt;&lt;span class="n"&gt;decrypted_data&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;rsa_decrypt&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;encrypted_data&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;private_key&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Decrypted Data:&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;decrypted_data&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  3. Split and Recover Secrets with Shamir's Secret Sharing
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;cryptography_suite.secret_sharing&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;create_shares&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;reconstruct_secret&lt;/span&gt;

&lt;span class="n"&gt;secret&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;123456789&lt;/span&gt;
&lt;span class="n"&gt;shares&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;create_shares&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;secret&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;threshold&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mi"&gt;3&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;num_shares&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mi"&gt;5&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Reconstruct the secret using 3 shares
&lt;/span&gt;&lt;span class="n"&gt;recovered_secret&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;reconstruct_secret&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;shares&lt;/span&gt;&lt;span class="p"&gt;[:&lt;/span&gt;&lt;span class="mi"&gt;3&lt;/span&gt;&lt;span class="p"&gt;])&lt;/span&gt;
&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Recovered Secret:&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;recovered_secret&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h3&gt;
  
  
  🤔 Why Not Just Use Cryptography or PyCryptodome?
&lt;/h3&gt;

&lt;p&gt;Great question! While both libraries are fantastic, &lt;strong&gt;Cryptography Suite&lt;/strong&gt; adds several unique benefits:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Unified API&lt;/strong&gt;: Instead of importing multiple libraries and juggling inconsistent APIs, Cryptography Suite provides everything under one roof.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Better Defaults&lt;/strong&gt;: The library bakes in security best practices by default—no need to worry about accidentally misusing cryptographic primitives.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Customizability&lt;/strong&gt;: Need custom key sizes, algorithms, or encryption modes? Cryptography Suite is designed for easy extensibility.&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  🔒 Security Disclaimer
&lt;/h3&gt;

&lt;p&gt;Security is hard. While &lt;strong&gt;Cryptography Suite&lt;/strong&gt; implements widely accepted cryptographic standards, it is crucial to have third-party audits before using it in high-stakes production environments. Treat this library as a powerful tool but ensure your use cases align with best practices in security engineering.&lt;/p&gt;




&lt;h3&gt;
  
  
  🛠 Contribute or Learn More
&lt;/h3&gt;

&lt;p&gt;The full source code is available on GitHub. Contributions are welcome—whether it’s feedback, feature requests, or pull requests. Let’s build something secure together!&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://github.com/Psychevus/cryptography-suite" rel="noopener noreferrer"&gt;GitHub Repository&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  📬 What Do You Think?
&lt;/h3&gt;

&lt;p&gt;I’d love to hear your thoughts! Whether it’s a feature you’d like to see, a discussion about cryptographic challenges, or general feedback, feel free to leave a comment or reach out.&lt;/p&gt;

&lt;p&gt;TL;DR:&lt;br&gt;
&lt;strong&gt;Cryptography Suite&lt;/strong&gt; is an all-in-one Python library for cryptographic tasks, designed to save you time, simplify your workflows, and empower your projects. Give it a try and let me know what you think!&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
