PySETO - A Python implementation of PASETO

PySETO is a PASETO (Platform-Agnostic SEcurity TOkens) implementation written in Python which supports all of the versions and purposes below.

  • Version 1: NIST Compatibility
  • ✅ Local: Symmetric Authenticated Encryption
  • AES-256-CTR + HMAC-SHA384 (Encrypt-then-MAC).
  • ✅ Public: Asymmetric Authentication (Public-Key Signatures)
  • RSASSA-PSS with 2048-bit key, SHA384 hashing and MGF1+SHA384.
  • Version 2: Sodium Original
  • ✅ Local: Symmetric Authenticated Encryption
  • XChaCha20-Poly1305 (192-bit nonce, 256-bit key, 128-bit authentication tag).
  • ✅ Public: Asymmetric Authentication (Public-Key Signatures)
  • EdDSA over Curve25519.
  • Version 3: NIST Modern
  • ✅ Local: Symmetric Authenticated Encryption
  • AES-256-CTR + HMAC-SHA384 (Encrypt-then-MAC).
  • ✅ Public: Asymmetric Authentication (Public-Key Signatures)
  • ECDSA over NIST P-384, with SHA-384, using RFC 6979 deterministic k-values.
  • Version 4: Sodium Modern
  • ✅ Local: Symmetric Authenticated Encryption
  • XChaCha20 + BLAKE2b-MAC (Encrypt-then-MAC).
  • ✅ Public: Asymmetric Authentication (Public-Key Signatures)
  • EdDSA over Curve25519.

See Document for details.

Installation

You can install PySETO with pip:

$ pip install pyseto

Usage

You can use it as follows:

v4.local

>>> import pyseto
>>> from pyseto import Key
>>> key = Key.new("v4", "local", "our-secret")
>>> token = pyseto.encode(key, '{"data": "this is a signed message", "exp": "2022-01-01T00:00:00+00:00"}')
>>> token
b'v4.local.VXJUUePf8zL1670zhOmbO7eRdccapuXlf76fRCkntiRauk2qQFOaBQOk4ISSRXQZvcGG2C5H74ShLzoU3YorK4xdfjHBj4ESoRB5mt1FWf8MEXoDQiIHQ4WDyMR57ferhaKJM6FwgcwM2xINWy1xCSFz5f7al0c8RUnd4xO_42beR83ye0jRYg'
>>> decoded = pyseto.decode(key, token)
>>> decoded.payload
b'{"data": "this is a signed message", "exp": "2022-01-01T00:00:00+00:00"}'

v4.public

>>> import pyseto
>>> from pyseto import Key
>>> secret_key_pem = "-----BEGIN PRIVATE KEY-----\nMC4CAQAwBQYDK2VwBCIEILTL+0PfTOIQcn2VPkpxMwf6Gbt9n4UEFDjZ4RuUKjd0\n-----END PRIVATE KEY-----"
>>> public_key_pem = "-----BEGIN PUBLIC KEY-----\nMCowBQYDK2VwAyEAHrnbu7wEfAP9cGBOAHHwmH4Wsot1ciXBHwBBXQ4gsaI=\n-----END PUBLIC KEY-----"
>>> secret_key = Key.new("v4", "public", secret_key_pem)
>>> token = pyseto.encode(secret_key, '{"data": "this is a signed message", "exp": "2022-01-01T00:00:00+00:00"}')
>>> token
b'v4.public.eyJkYXRhIjogInRoaXMgaXMgYSBzaWduZWQgbWVzc2FnZSIsICJleHAiOiAiMjAyMi0wMS0wMVQwMDowMDowMCswMDowMCJ9l1YiKei2FESvHBSGPkn70eFO1hv3tXH0jph1IfZyEfgm3t1DjkYqD5r4aHWZm1eZs_3_bZ9pBQlZGp0DPSdzDg'
>>> public_key = Key.new("v4", "public", public_key_pem)
>>> decoded = pyseto.decode(public_key, token)
>>> decoded.payload
b'{"data": "this is a signed message", "exp": "2022-01-01T00:00:00+00:00"}'

API Reference

See Document.

Tests

You can run tests from the project root after cloning with:

$ tox
GitHub - dajiaji/pyseto: A Python implementation of PASETO.
A Python implementation of PASETO. Contribute to dajiaji/pyseto development by creating an account on GitHub.