panda-confidential-kms v3.0.2
panda-confidential-kms
Extension to Panda-Confidential to leverage AWS KMS
We built Panda-Confidential to make TweetNaCl.js easier to use and extend without giving up auditability. This library extends Confidential with the AWS Key Management Service, leveraging a source of robust randomness and allowing only indirect access to cryptographic keys.
Installation
npm install panda-confidential panda-confidential-kms --saveUsage
import SDK from "aws-sdk"
# Add your credentials to SDK.config
import {confidential} from "panda-confidential"
import KMS from "panda-confidential-kms"
{randomBytes, key, decrypt, encrypt, randomBytes, encode} = KMS confidential(), SDKPanda-Confidential-KMS replaces the default TweetNaCl.js randomBytes interface with generateRandom, using KMS to generate a cryptographically secure random value.
Panda-Confidential-KMS also adds a new key type, KMSKeyID. The encrypt function recognizes keys instantiated with KMS constructor. KMS is limited to encrypting data 4kB or shorter. So we use TweetNaCl.js to encrypt the data symmetrically (with a unique key for each operation) and then lock the key with KMS.
do ->
myKey = key.KMS "alias/myKey"
# Person A symmetrically encrypts their data.
message = "Hello World!"
ciphertext = await encrypt myKey, messagedecrypt performs the reverse operation, unlocking the unique key with KMS and then using TweetNaCl.js to recover the plaintext.
# Later, Person A decrypts that ciphertext.
output = await decrypt myKey, ciphertext