Edgetk
🔒 Encrypted Data Gateway Engine - Command-line Integrated Security Suite written in Go (OpenSSL compliant)
Install / Use
/learn @pedroalbanese/EdgetkREADME
EDGE Toolkit (مجموعة أدوات متطورة)
Multi-purpose cross-platform hybrid cryptography tool for symmetric and asymmetric encryption, cipher-based message authentication code (CMAC|PMAC|GMAC|VMAC), recursive hash digest, hash-based message authentication code (HMAC), HMAC-based key derivation function (HKDF), password-based key derivation function (PBKDF2|Lyra2|Scrypt), password-hashing scheme (Bcrypt|Argon2|Lyra2|Makwa), shared key agreement (ECDH|VKO|X25519|X448|ML-KEM), digital signature (RSA|ECDSA|EdDSA|GOST|SLH-DSA|ML-DSA), X.509 CSRs, CRLs and Certificates, and TCP instant server with TLS 1.3 and TLCP encryption layers for small or embedded systems.
Fully OpenSSL/LibreSSL/GmSSL/Botan/libsodium/RHash/Mcrypt compliant
<details><summary>Implements</summary>- Africacrypt 2009: Galindo-Garcia Identity-Based Signature (IBS)
- Anubis Involutional SPN 128-bit block cipher (Barreto, ESAT/COSIC)
- Asiacrypt 2001: Short Signatures from the Weil Pairing (BLS)
- Asiacrypt 2005: Barreto Identity-Based Signature (IBS)
- BSI TR-03111 Elliptic Curve Cryptography (ECC) Technical Guideline
- CHASKEY Message Authentication Code (Nicky Mouha, ESAT/COSIC)
- CubeHash and SipHash64/128 (Daniel J. Bernstein & JP Aumasson)
- CRYPTO 1999: IND-CCA2 Fujisaki-Okamoto Transformation (IBE)
- CRYPTO 2001: Boneh-Franklin Identity-Based Encryption (IBE)
- DSTU 7564:2014 A New Standard of Ukraine: The Kupyna Hash Function
- DSTU 7624:2014 A Encryption Standard of Ukraine: Kalyna Block Cipher
- Eurocrypt 1996: Security Proofs for Signature Schemes (EUF-CMA ElGamal)
- Eurocrypt 2004: Boneh-Boyen Identity-Based Encryption (IBE)
- GB/T 32907-2016 - SM4 128-bit Block Cipher
- GB/T 32918.4-2016 SM2 Elliptic Curve Asymmetric Encryption
- GB/T 38636-2020 - Transport Layer Cryptography Protocol (TLCP)
- GM/T 0001-2012 ZUC Zu Chongzhi Stream cipher 128/256-bit key
- GM/T 0002-2012 SM4 Block cipher with 128-bit key
- GM/T 0003-2012 SM2 Public key algorithm 256-bit
- GM/T 0004-2012 SM3 Message digest algorithm 256-bit hash value
- GM/T 0044-2016 SM9 Public key algorithm 256-bit
- GM/T 0086-2020 Specification of key management system based on SM9
- GOST 28147-89 64-bit block cipher (RFC 5830)
- GOST R 34.10-2012 VKO key agreement function (RFC 7836)
- GOST R 34.10-2012 public key signature function (RFC 7091)
- GOST R 34.11-2012 Streebog hash function (RFC 6986)
- GOST R 34.11-94 CryptoPro hash function (RFC 5831)
- GOST R 34.12-2015 128-bit block cipher Kuznechik (RFC 7801)
- GOST R 34.12-2015 64-bit block cipher Magma (RFC 8891)
- GOST R 50.1.114-2016 GOST R 34.10-2012 and GOST R 34.11-2012
- HC-128 Stream Cipher simplified version of HC-256 (Wu, ESAT/COSIC)
- IGE (Infinite Garble Extension) Mode of Operation for Block ciphers
- ISO/IEC 10118-3:2003 RIPEMD128/160/256 and Whirlpool (ESAT/COSIC)
- ISO/IEC 18033-3:2010 HIGHT, SEED, Camellia and MISTY1 Block ciphers
- ISO/IEC 18033-4:2011 SNOW 2.0 and KCipher-2 stream ciphers (RFC 7008)
- ISO/IEC 29192-3:2012 Trivium Stream cipher with 80-bit key
- ISO/IEC 18033-5:2015 IBE - Identity-based Encryption Mechanisms
- ISO/IEC 18033-5:2015/Amd.1:2021(E) SM9 Mechanism
- ISO/IEC 14888-3:2018 EC-SDSA Schnorr-based Signature Scheme
- ISO/IEC 29192-2:2019 PRESENT, CLEFIA and LEA block ciphers
- ISO/IEC 15946-5:2022 Barreto-Naehrig and Barreto-Lynn-Scott Curves
- ITI DOC-ICP-01.01 Curve E-521 Brazilian Digital Signature Standard
- KS X 1213-1 ARIA 128-bit block cipher with 128/192/256-bit keys
- KS X 3246 LEA - Lightweight Encryption Algorithm (TTAK.KO-12.0223)
- KS X 3262 LSH - A New Fast Secure Hash Function Family (in Korean)
- LNCS 1838 - A One Round Protocol for Tripartite Diffie-Hellman
- NIST SP800-186 X25519 Diffie-Hellman (OpenSSL compliant)
- NIST SP800-38D GCM AEAD mode for 128-bit block ciphers (RFC 5288)
- NIST SP800-232 Ascon-Based Lightweight Cryptography Standard
- PiLBA 2008: The Curupira-2 Block Cipher for Constrained Platforms
- PKC 2003: Cha-Cheon Identity-Based Signature (IBS)
- RFC 1423: Privacy Enhancement for Internet Electronic Mail
- RFC 2104: HMAC - Keyed-Hashing for Message Authentication
- RFC 2144: CAST-128 64-bit Block cipher with 128-bit key
- RFC 2612: The CAST-256 Encryption Algorithm
- RFC 3610: Counter with CBC-MAC Mode of Operation (CCM Mode)
- RFC 4009: The SEED Encryption Algorithm (KISA)
- RFC 4253: Serpent 128-bit Block cipher with 128/192/256-bit keys
- RFC 4493: Cipher-based Message Authentication Code (CMAC)
- RFC 4503: Rabbit Stream Cipher Algorithm with 128-bit key
- RFC 4543: Galois Message Authentication Code (GMAC)
- RFC 4764: EAX Authenticated-Encryption Mode of Operation
- RFC 4648: Base16, Base32, and Base64 Data Encodings
- RFC 5246: Transport Layer Security (TLS) Protocol Version 1.2
- RFC 5280: Internet X.509 PKI Certificate Revocation List (CRL)
- RFC 5297: Synthetic Initialization Vector (SIV Mode)
- RFC 5639: Elliptic Curve Cryptography (ECC) Brainpool Standard Curves
- RFC 5869: HMAC-based Key Derivation Function (HKDF)
- RFC 6114: The 128-Bit Blockcipher CLEFIA (Sony)
- RFC 7008: KCipher-2 Encryption Algorithm (KDDI R&D Laboratories)
- RFC 7253: OCB3 Offset Codebook Authenticated-Encryption Algorithm
- RFC 7292: PKCS #12 Personal Information Exchange Syntax v1.1
- RFC 7539: ChaCha20-Poly1305 AEAD Stream cipher
- RFC 7693: The BLAKE2 Cryptographic Hash and MAC (JP Aumasson)
- RFC 7748: Curve25519 and Curve448: Elliptic Curves for Security
- RFC 7914: The Scrypt Password-Based Key Derivation Function
- RFC 8032: Ed25519 Signature a.k.a. EdDSA (Daniel J. Bernstein)
- RFC 8446: Transport Layer Security (TLS) Protocol Version 1.3
- RFC 8554: Post-Quantum Leighton-Micali Hash-Based Signatures
- RFC 9058: MGM AEAD mode for 64 and 128 bit ciphers (E. Griboedova)
- RFC 9367: GOST Cipher Suites for Transport Layer Security (TLS 1.3)
- SAC 2002: Hess Efficient Identity Based Signature (IBS)
- SBRC 2007: Curupira1 96-bit block cipher with 96/144/192-bit keys
- STB 34.101.31-2011 Belarusian standard (Bel-T) block cipher
- STB 34.101.45-2013 Belarusian BignV1 public key algorithhm
- STB 34.101.77-2020 Belarusian standard BASH hash function
- TTAS.KO-12.0004/R1 128-bit Block Cipher SEED (ISO/IEC 18033-3:2010)
- TTAS.KO-12.0040/R1 64-bit Block Cipher HIGHT (ISO/IEC 18033-3:2010)
- TTAS.KO-12.0011/R2 HAS-160 Korean-standardized hash algorithm
- TTAK.KO-12.0015/R3 EC-KCDSA Korean Digital Signature Algorithm
- TTAK.KO-12.0223 LEA 128-bit block cipher (ISO/IEC 29192-2:2019)
- TTAK.KO-12.0276 LSH Message digest algorithm (KS X 3262)
- US FIPS 197 Advanced Encryption Standard (AES)
- US FIPS 180-2 Secure Hash Standard (SHS) SHA1 and SHA2 Algorithms
- US FIPS 202 SHA-3 Permutation-Based Hash (instance of the Keccak)
- US FIPS 203 Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM)
- US FIPS 204 Module-Lattice-Based Digital Signature Standard (ML-DSA)
- US FIPS 205 Stateless Hash-Based Digital Signature Standard (SLH-DSA)
🇨🇳 SM2, SM3, SM4, SM9, ZUC — Chinese national cryptographic standards
Defined by the State Cryptography Administration (SCA) and standardized under GB/T and GM/T series. Widely used in Chinese government, banking, and telecom infrastructure.
🇷🇺 GOST R 34.10, Kuznechik, Streebog — Russian Federation cryptographic standards
Approved by FSTEC and Federal Security Service (FSB), standardized under GOST R series. Used across official and military systems in Russia.
🇺🇦 Kalyna, Kupyna — Ukrainian national cryptographic standards
Standardized as DSTU 7624:2014 (Kalyna block cipher) and DSTU 7564:2014 (Kupyna hash function) by the Ukrainian State Service for Special Communications and Information Protection.
🇰🇷 ARIA, SEED, LEA, LSH, KCDSA — Korean national cryptographic algorithms
Developed under TTAS.KO and KS X standards. Used in public sector systems and Korean financial institutions. Published by KISA and TTA.
🇧🇾 BignV1, Bel-T, BASH — Belarusian cryptographic standards
Standardized by the STB 34.101 series. Designed for public key encryption (BignV1), block cipher encryption (Bel-T), and hashing (BASH), primarily for use within Belarusian national security frameworks.
🇫🇷 ANSSI FRP256v1 — French national elliptic curve for digital signatures
Developed by the ANSSI (Agence nationale de la sécurité des systèmes d'information). Used for secure digital signature implementations within French governmental and critical infrastructure systems.
🇯🇵 KCipher-2, Camellia — Japanese national cryptographic algorithms
KCipher-2 is a lightweight stream cipher standardized under ISO/IEC 18033-4:2011.
Camellia is a block cipher developed by Mitsubishi and NTT, internationally

