SkillAgentSearch skills...

Edgetk

🔒 Encrypted Data Gateway Engine - Command-line Integrated Security Suite written in Go (OpenSSL compliant)

Install / Use

/learn @pedroalbanese/Edgetk

README

EDGE Toolkit (مجموعة أدوات متطورة)

ISC License GoDoc GitHub downloads Go Report Card GitHub go.mod Go version GitHub release (latest by date) DOI

Multi-purpose cross-platform hybrid cryptography tool for symmetric and asymmetric encryption, cipher-based message authentication code (CMAC|PMAC|GMAC|VMAC), recursive hash digest, hash-based message authentication code (HMAC), HMAC-based key derivation function (HKDF), password-based key derivation function (PBKDF2|Lyra2|Scrypt), password-hashing scheme (Bcrypt|Argon2|Lyra2|Makwa), shared key agreement (ECDH|VKO|X25519|X448|ML-KEM), digital signature (RSA|ECDSA|EdDSA|GOST|SLH-DSA|ML-DSA), X.509 CSRs, CRLs and Certificates, and TCP instant server with TLS 1.3 and TLCP encryption layers for small or embedded systems.

Fully OpenSSL/LibreSSL/GmSSL/Botan/libsodium/RHash/Mcrypt compliant

<details><summary>Implements</summary>
  1. Africacrypt 2009: Galindo-Garcia Identity-Based Signature (IBS)
  2. Anubis Involutional SPN 128-bit block cipher (Barreto, ESAT/COSIC)
  3. Asiacrypt 2001: Short Signatures from the Weil Pairing (BLS)
  4. Asi­acrypt 2005: Barreto Identity-Based Signature (IBS)
  5. BSI TR-03111 Elliptic Curve Cryptography (ECC) Technical Guideline
  6. CHASKEY Message Authentication Code (Nicky Mouha, ESAT/COSIC)
  7. CubeHash and SipHash64/128 (Daniel J. Bernstein & JP Aumasson)
  8. CRYPTO 1999: IND-CCA2 Fujisaki-Okamoto Transformation (IBE)
  9. CRYPTO 2001: Boneh-Franklin Identity-Based Encryption (IBE)
  10. DSTU 7564:2014 A New Standard of Ukraine: The Kupyna Hash Function
  11. DSTU 7624:2014 A Encryption Standard of Ukraine: Kalyna Block Cipher
  12. Eurocrypt 1996: Security Proofs for Signature Schemes (EUF-CMA ElGamal)
  13. Eurocrypt 2004: Boneh-Boyen Identity-Based Encryption (IBE)
  14. GB/T 32907-2016 - SM4 128-bit Block Cipher
  15. GB/T 32918.4-2016 SM2 Elliptic Curve Asymmetric Encryption
  16. GB/T 38636-2020 - Transport Layer Cryptography Protocol (TLCP)
  17. GM/T 0001-2012 ZUC Zu Chongzhi Stream cipher 128/256-bit key
  18. GM/T 0002-2012 SM4 Block cipher with 128-bit key
  19. GM/T 0003-2012 SM2 Public key algorithm 256-bit
  20. GM/T 0004-2012 SM3 Message digest algorithm 256-bit hash value
  21. GM/T 0044-2016 SM9 Public key algorithm 256-bit
  22. GM/T 0086-2020 Specification of key management system based on SM9
  23. GOST 28147-89 64-bit block cipher (RFC 5830)
  24. GOST R 34.10-2012 VKO key agreement function (RFC 7836)
  25. GOST R 34.10-2012 public key signature function (RFC 7091)
  26. GOST R 34.11-2012 Streebog hash function (RFC 6986)
  27. GOST R 34.11-94 CryptoPro hash function (RFC 5831)
  28. GOST R 34.12-2015 128-bit block cipher Kuznechik (RFC 7801)
  29. GOST R 34.12-2015 64-bit block cipher Magma (RFC 8891)
  30. GOST R 50.1.114-2016 GOST R 34.10-2012 and GOST R 34.11-2012
  31. HC-128 Stream Cipher simplified version of HC-256 (Wu, ESAT/COSIC)
  32. IGE (Infinite Garble Extension) Mode of Operation for Block ciphers
  33. ISO/IEC 10118-3:2003 RIPEMD128/160/256 and Whirlpool (ESAT/COSIC)
  34. ISO/IEC 18033-3:2010 HIGHT, SEED, Camellia and MISTY1 Block ciphers
  35. ISO/IEC 18033-4:2011 SNOW 2.0 and KCipher-2 stream ciphers (RFC 7008)
  36. ISO/IEC 29192-3:2012 Trivium Stream cipher with 80-bit key
  37. ISO/IEC 18033-5:2015 IBE - Identity-based Encryption Mechanisms
  38. ISO/IEC 18033-5:2015/Amd.1:2021(E) SM9 Mechanism
  39. ISO/IEC 14888-3:2018 EC-SDSA Schnorr-based Signature Scheme
  40. ISO/IEC 29192-2:2019 PRESENT, CLEFIA and LEA block ciphers
  41. ISO/IEC 15946-5:2022 Barreto-Naehrig and Barreto-Lynn-Scott Curves
  42. ITI DOC-ICP-01.01 Curve E-521 Brazilian Digital Signature Standard
  43. KS X 1213-1 ARIA 128-bit block cipher with 128/192/256-bit keys
  44. KS X 3246 LEA - Lightweight Encryption Algorithm (TTAK.KO-12.0223)
  45. KS X 3262 LSH - A New Fast Secure Hash Function Family (in Korean)
  46. LNCS 1838 - A One Round Protocol for Tripartite Diffie-Hellman
  47. NIST SP800-186 X25519 Diffie-Hellman (OpenSSL compliant)
  48. NIST SP800-38D GCM AEAD mode for 128-bit block ciphers (RFC 5288)
  49. NIST SP800-232 Ascon-Based Lightweight Cryptography Standard
  50. PiLBA 2008: The Curupira-2 Block Cipher for Constrained Platforms
  51. PKC 2003: Cha-Cheon Identity-Based Signature (IBS)
  52. RFC 1423: Privacy Enhancement for Internet Electronic Mail
  53. RFC 2104: HMAC - Keyed-Hashing for Message Authentication
  54. RFC 2144: CAST-128 64-bit Block cipher with 128-bit key
  55. RFC 2612: The CAST-256 Encryption Algorithm
  56. RFC 3610: Counter with CBC-MAC Mode of Operation (CCM Mode)
  57. RFC 4009: The SEED Encryption Algorithm (KISA)
  58. RFC 4253: Serpent 128-bit Block cipher with 128/192/256-bit keys
  59. RFC 4493: Cipher-based Message Authentication Code (CMAC)
  60. RFC 4503: Rabbit Stream Cipher Algorithm with 128-bit key
  61. RFC 4543: Galois Message Authentication Code (GMAC)
  62. RFC 4764: EAX Authenticated-Encryption Mode of Operation
  63. RFC 4648: Base16, Base32, and Base64 Data Encodings
  64. RFC 5246: Transport Layer Security (TLS) Protocol Version 1.2
  65. RFC 5280: Internet X.509 PKI Certificate Revocation List (CRL)
  66. RFC 5297: Synthetic Initialization Vector (SIV Mode)
  67. RFC 5639: Elliptic Curve Cryptography (ECC) Brainpool Standard Curves
  68. RFC 5869: HMAC-based Key Derivation Function (HKDF)
  69. RFC 6114: The 128-Bit Blockcipher CLEFIA (Sony)
  70. RFC 7008: KCipher-2 Encryption Algorithm (KDDI R&D Laboratories)
  71. RFC 7253: OCB3 Offset Codebook Authenticated-Encryption Algorithm
  72. RFC 7292: PKCS #12 Personal Information Exchange Syntax v1.1
  73. RFC 7539: ChaCha20-Poly1305 AEAD Stream cipher
  74. RFC 7693: The BLAKE2 Cryptographic Hash and MAC (JP Aumasson)
  75. RFC 7748: Curve25519 and Curve448: Elliptic Curves for Security
  76. RFC 7914: The Scrypt Password-Based Key Derivation Function
  77. RFC 8032: Ed25519 Signature a.k.a. EdDSA (Daniel J. Bernstein)
  78. RFC 8446: Transport Layer Security (TLS) Protocol Version 1.3
  79. RFC 8554: Post-Quantum Leighton-Micali Hash-Based Signatures
  80. RFC 9058: MGM AEAD mode for 64 and 128 bit ciphers (E. Griboedova)
  81. RFC 9367: GOST Cipher Suites for Transport Layer Security (TLS 1.3)
  82. SAC 2002: Hess Efficient Identity Based Signature (IBS)
  83. SBRC 2007: Curupira1 96-bit block cipher with 96/144/192-bit keys
  84. STB 34.101.31-2011 Belarusian standard (Bel-T) block cipher
  85. STB 34.101.45-2013 Belarusian BignV1 public key algorithhm
  86. STB 34.101.77-2020 Belarusian standard BASH hash function
  87. TTAS.KO-12.0004/R1 128-bit Block Cipher SEED (ISO/IEC 18033-3:2010)
  88. TTAS.KO-12.0040/R1 64-bit Block Cipher HIGHT (ISO/IEC 18033-3:2010)
  89. TTAS.KO-12.0011/R2 HAS-160 Korean-standardized hash algorithm
  90. TTAK.KO-12.0015/R3 EC-KCDSA Korean Digital Signature Algorithm
  91. TTAK.KO-12.0223 LEA 128-bit block cipher (ISO/IEC 29192-2:2019)
  92. TTAK.KO-12.0276 LSH Message digest algorithm (KS X 3262)
  93. US FIPS 197 Advanced Encryption Standard (AES)
  94. US FIPS 180-2 Secure Hash Standard (SHS) SHA1 and SHA2 Algorithms
  95. US FIPS 202 SHA-3 Permutation-Based Hash (instance of the Keccak)
  96. US FIPS 203 Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM)
  97. US FIPS 204 Module-Lattice-Based Digital Signature Standard (ML-DSA)
  98. US FIPS 205 Stateless Hash-Based Digital Signature Standard (SLH-DSA)
</details> <details><summary>National Cryptographic Standards</summary>

🇨🇳 SM2, SM3, SM4, SM9, ZUC — Chinese national cryptographic standards

Defined by the State Cryptography Administration (SCA) and standardized under GB/T and GM/T series. Widely used in Chinese government, banking, and telecom infrastructure.


🇷🇺 GOST R 34.10, Kuznechik, Streebog — Russian Federation cryptographic standards

Approved by FSTEC and Federal Security Service (FSB), standardized under GOST R series. Used across official and military systems in Russia.


🇺🇦 Kalyna, Kupyna — Ukrainian national cryptographic standards

Standardized as DSTU 7624:2014 (Kalyna block cipher) and DSTU 7564:2014 (Kupyna hash function) by the Ukrainian State Service for Special Communications and Information Protection.


🇰🇷 ARIA, SEED, LEA, LSH, KCDSA — Korean national cryptographic algorithms

Developed under TTAS.KO and KS X standards. Used in public sector systems and Korean financial institutions. Published by KISA and TTA.


🇧🇾 BignV1, Bel-T, BASH — Belarusian cryptographic standards

Standardized by the STB 34.101 series. Designed for public key encryption (BignV1), block cipher encryption (Bel-T), and hashing (BASH), primarily for use within Belarusian national security frameworks.


🇫🇷 ANSSI FRP256v1 — French national elliptic curve for digital signatures

Developed by the ANSSI (Agence nationale de la sécurité des systèmes d'information). Used for secure digital signature implementations within French governmental and critical infrastructure systems.


🇯🇵 KCipher-2, Camellia — Japanese national cryptographic algorithms

KCipher-2 is a lightweight stream cipher standardized under ISO/IEC 18033-4:2011.
Camellia is a block cipher developed by Mitsubishi and NTT, internationally

View on GitHub
GitHub Stars17
CategoryDevelopment
Updated5d ago
Forks1

Languages

Go

Security Score

95/100

Audited on Mar 22, 2026

No findings