Encryption and Decryption

Learn how to perform encryption and decryption in Go using the crypto/cipher package and popular libraries like OpenPGP.

Cryptography in Go can be performed using various packages that provide implementations of common encryption algorithms. This snippet focuses on basic encryption and decryption using the crypto/cipher package and the more comprehensive OpenPGP library for high-level encryption.

Basic Encryption and Decryption using AES

The crypto/cipher package in Go supports a variety of encryption algorithms, of which AES (Advanced Encryption Standard) is widely used. Below is a simple example of AES encryption and decryption in Go.

package main

import (
	"crypto/aes"
	"crypto/cipher"
	"crypto/rand"
	"encoding/hex"
	"fmt"
	"io"
)

func encrypt(plaintext string, key []byte) (string, error) {
	block, err := aes.NewCipher(key)
	if err != nil {
		return "", err
	}

	ciphertext := make([]byte, aes.BlockSize+len(plaintext))
	iv := ciphertext[:aes.BlockSize]
	if _, err := io.ReadFull(rand.Reader, iv); err != nil {
		return "", err
	}

	stream := cipher.NewCFBEncrypter(block, iv)
	stream.XORKeyStream(ciphertext[aes.BlockSize:], []byte(plaintext))

	return fmt.Sprintf("%x", ciphertext), nil
}

func decrypt(encryptedHex string, key []byte) (string, error) {
	ciphertext, _ := hex.DecodeString(encryptedHex)
	block, err := aes.NewCipher(key)
	if err != nil {
		return "", err
	}

	if len(ciphertext) < aes.BlockSize {
		return "", fmt.Errorf("ciphertext too short")
	}

	iv := ciphertext[:aes.BlockSize]
	ciphertext = ciphertext[aes.BlockSize:]

	stream := cipher.NewCFBDecrypter(block, iv)
	stream.XORKeyStream(ciphertext, ciphertext)

	return string(ciphertext), nil
}

func main() {
	key := []byte("golangcrypto73key") // 16 bytes key for AES-128.
	plaintext := "golang encryption example"

	encrypted, err := encrypt(plaintext, key)
	if err != nil {
		panic(err)
	}
	fmt.Printf("Encrypted: %s\n", encrypted)

	decrypted, err := decrypt(encrypted, key)
	if err != nil {
		panic(err)
	}
	fmt.Printf("Decrypted: %s\n", decrypted)
}

Encryption and Decryption using OpenPGP

OpenPGP is a popular standard for encrypted communication. The crypto/openpgp package in Go offers a way to handle OpenPGP encryption and decryption for more complex requirements.

package main

import (
	"bytes"
	"fmt"
	"io"
	"golang.org/x/crypto/openpgp"
)

func encryptWithOpenPGP(plaintext []byte, recipient *openpgp.Entity) ([]byte, error) {
	buf := new(bytes.Buffer)
	w, err := openpgp.Encrypt(buf, []*openpgp.Entity{recipient}, nil, nil, nil)
	if err != nil {
		return nil, err
	}
	_, err = w.Write(plaintext)
	if err != nil {
		return nil, err
	}
	w.Close()
	return buf.Bytes(), nil
}

func decryptWithOpenPGP(ciphertext []byte, privKeyRing *openpgp.EntityList) ([]byte, error) {
	md, err := openpgp.ReadMessage(bytes.NewBuffer(ciphertext), privKeyRing, nil, nil)
	if err != nil {
		return nil, err
	}
	plaintext, err := io.ReadAll(md.UnverifiedBody)
	if err != nil {
		return nil, err
	}
	return plaintext, nil
}

func main() {
	// Example goes here - loading keys from private key ring file, etc.
	fmt.Println("Encryption with OpenPGP example")
}

Note: The OpenPGP example requires setting up keys which is beyond the scope of this snippet. Refer to the OpenPGP library documentation for proper implementation.

Best Practices

  • Use a secure key exchange mechanism to distribute encryption keys.
  • Ensure keys are stored securely and rotated regularly.
  • Validate the encryption scheme's authenticity (e.g., using HMAC).
  • Consider using AEAD (Authenticated Encryption with Associated Data) schemes like GCM.

Common Pitfalls

  • Using weak or hardcoded encryption keys.
  • Neglecting proper error handling could lead to security issues.
  • Forgetting to initialize the IV (Initialization Vector) securely.
  • Not checking for common vulnerabilities (e.g., padding oracle attack).

Performance Tips

  • Use streaming modes (like CFB) for large data, avoiding loading it entirely in memory.
  • Benchmark and profile your code to identify opportunities for optimization.
  • Consider hardware-accelerated encryption libraries for performance-critical applications.