Metadata-Version: 2.4
Name: securekit
Version: 1.0.3
Summary: Production-ready cryptography library for Python
Home-page: https://github.com/anshuman365/securekit
Author: SecureKit Team
Author-email: SecureKit Team <anshumansingh3697@gmail.com>
License: MIT
Project-URL: Homepage, https://github.com/anshuman365/securekit
Project-URL: Documentation, https://github.com/anshuman365/securekit#readme
Project-URL: Repository, https://github.com/anshuman365/securekit
Project-URL: Issues, https://github.com/anshuman365/securekit/issues
Keywords: cryptography,security,encryption,kms,hashing
Classifier: Development Status :: 5 - Production/Stable
Classifier: Intended Audience :: Developers
Classifier: License :: OSI Approved :: MIT License
Classifier: Operating System :: OS Independent
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.8
Classifier: Programming Language :: Python :: 3.9
Classifier: Programming Language :: Python :: 3.10
Classifier: Programming Language :: Python :: 3.11
Classifier: Programming Language :: Python :: 3.12
Classifier: Topic :: Security :: Cryptography
Classifier: Topic :: Software Development :: Libraries :: Python Modules
Requires-Python: >=3.8
Description-Content-Type: text/markdown
License-File: LICENSE
Requires-Dist: argon2-cffi>=21.3.0
Requires-Dist: cryptography>=41.0.0
Requires-Dist: pynacl>=1.5.0
Provides-Extra: aws
Requires-Dist: boto3>=1.28.0; extra == "aws"
Provides-Extra: vault
Requires-Dist: hvac>=1.1.0; extra == "vault"
Provides-Extra: django
Requires-Dist: Django>=3.2.0; extra == "django"
Provides-Extra: flask
Requires-Dist: Flask>=2.0.0; extra == "flask"
Provides-Extra: fastapi
Requires-Dist: fastapi>=0.68.0; extra == "fastapi"
Provides-Extra: dev
Requires-Dist: pytest>=7.0.0; extra == "dev"
Requires-Dist: pytest-cov>=4.0.0; extra == "dev"
Requires-Dist: bandit>=1.7.0; extra == "dev"
Requires-Dist: safety>=2.0.0; extra == "dev"
Dynamic: author
Dynamic: home-page
Dynamic: license-file
Dynamic: requires-python

# SecureKit 🔐

<div align="center">

![SecureKit Logo](docs/images/securekit-logo.png)

A comprehensive cryptographic toolkit with secure defaults for Python applications.

![Python Version](https://img.shields.io/badge/python-3.8%2B-blue)
![License](https://img.shields.io/badge/license-Apache%202.0-green)
![PyPI Version](https://img.shields.io/pypi/v/securekit)
![Tests](https://github.com/anshuman365/securekit/actions/workflows/ci.yml/badge.svg)

[📚 Documentation](https://github.com/anshuman365/securekit#readme) •
[🚀 Quick Start](https://github.com/anshuman365/securekit#quick-start-) •
[💬 Discussions](https://github.com/anshuman365/securekit/discussions)

</div>

## Features ✨

### Core Cryptography
- **🔐 Argon2id Password Hashing** - Modern password hashing with automatic parameter calibration
- **🔒 Authenticated Encryption** - ChaCha20-Poly1305 AEAD with XChaCha20 nonces
- **🗝️ Digital Signatures** - Ed25519 for fast, secure signing and verification
- **🔑 Key Derivation** - HKDF for secure key material derivation
- **🎲 Secure Random** - Cryptographically secure random number generation
- **⏱️ Constant-Time Operations** - Timing-attack resistant comparisons

### Key Management
- **💾 Local Encrypted Keystore** - File-based key storage with master key encryption
- **☁️ AWS KMS Integration** - Seamless integration with AWS Key Management Service
- **🏔️ HashiCorp Vault** - Support for Vault's transit secrets engine
- **🔄 Key Rotation** - Automated key rotation policies
- **🔐 Key Wrapping** - Secure key encryption key (KEK) operations

### Framework Integrations
- **🌶️ Flask** - Field encryption decorators and seamless integration
- **🎸 Django** - Encrypted model fields for sensitive data
- **⚡ FastAPI** - Dependency injection for cryptographic operations

## Installation 📦

```bash
pip install securekit
```

For optional dependencies (AWS KMS, Vault, framework support):

```bash
# AWS KMS support
pip install securekit[aws]

# HashiCorp Vault support  
pip install securekit[vault]

# Framework integrations
pip install securekit[flask]
pip install securekit[django]
pip install securekit[fastapi]

# Development dependencies
pip install securekit[dev]
```

## Quick Start 🚀

### Password Hashing

```python
from securekit.crypto.password import hash_password, verify_password

# Hash a password
hashed = hash_password("MySecurePassword123!")
# Returns: '$argon2id$v=19$m=65536,t=3,p=2$...'

# Verify a password
is_valid = verify_password("MySecurePassword123!", hashed)
# Returns: True
```

### Authenticated Encryption

```python
from securekit.crypto.aead import aead_encrypt, aead_decrypt
import os

# Generate a key (in production, use a key management system)
key = os.urandom(32)

# Encrypt data
plaintext = b"Sensitive user data"
aad = b"user_12345"  # Additional authenticated data
ciphertext = aead_encrypt(key, plaintext, aad)

# Decrypt and verify
decrypted = aead_decrypt(key, ciphertext, aad)
# Returns: b"Sensitive user data"
```

### Digital Signatures

```python
from securekit.crypto.core import ed25519_keypair, ed25519_sign, ed25519_verify

# Generate key pair
private_key, public_key = ed25519_keypair()

# Sign a message
message = b"Important transaction data"
signature = ed25519_sign(private_key, message)

# Verify signature
is_valid = ed25519_verify(public_key, message, signature)
# Returns: True
```

### Local Key Management

```python
from securekit.kms.local import LocalKeyManager

# Initialize key manager
km = LocalKeyManager("./keystore.json")

# Generate encryption keys
user_key_id = km.generate_key("user_encryption")
session_key_id = km.generate_key("session_encryption")

# Use keys for encryption
user_key = km.get_key(user_key_id)
# Use with aead_encrypt/decrypt
```

## Framework Integrations 🛠️

### Flask Integration

```python
from flask import Flask
from securekit.adapters.flask import register_securekit, encrypt_fields
from securekit.kms.local import LocalKeyManager

app = Flask(__name__)
key_manager = LocalKeyManager("./keystore.json")
register_securekit(app, key_manager)

@app.route('/profile')
@encrypt_fields(['email', 'phone'])  # Automatically encrypts these fields
def get_profile():
    return {
        'username': 'john_doe',
        'email': 'john@example.com',     # Will be encrypted in response
        'phone': '+1234567890'           # Will be encrypted in response
    }
```

### Django Integration

```python
from django.db import models
from securekit.adapters.django import EncryptedField

class UserProfile(models.Model):
    user = models.ForeignKey(User, on_delete=models.CASCADE)
    ssn = EncryptedField(key_id="user_data")           # Encrypted at rest
    credit_card = EncryptedField(key_id="payment_data") # Encrypted at rest
    public_data = models.CharField(max_length=255)     # Stored in plain text
```

### FastAPI Integration

```python
from fastapi import FastAPI, Depends
from securekit.adapters.fastapi import SecureKitDependency
from securekit.kms.local import LocalKeyManager

app = FastAPI()
key_manager = LocalKeyManager("./keystore.json")
securekit = SecureKitDependency(key_manager)

@app.post("/encrypt-data")
async def encrypt_data(
    data: str,
    securekit: SecureKitDependency = Depends()
):
    encrypted = securekit.encrypt(data.encode(), "user_data")
    return {"encrypted_data": encrypted.hex()}
```

## Key Management Systems 🔑

### AWS KMS

```python
from securekit.kms.aws import AWSKeyManager

# Uses AWS credentials from environment or ~/.aws/credentials
km = AWSKeyManager(region='us-east-1')

# Generate a key in AWS KMS
key_id = km.generate_key("production_encryption")

# Wrap a data key
data_key = os.urandom(32)
wrapped_key = km.wrap_key(data_key, key_id)
```

### HashiCorp Vault

```python
from securekit.kms.vault import VaultKeyManager

km = VaultKeyManager(
    url="http://localhost:8200",
    token="your-vault-token"
)

# Generate key in Vault transit
key_id = km.generate_key("app_encryption")

# Use for encryption/decryption
wrapped = km.wrap_key(b"sensitive_data", key_id)
```

## Configuration ⚙️

### Environment Variables

```bash
# Argon2 Parameters
export SECUREKIT_ARGON2_TIME_COST=3
export SECUREKIT_ARGON2_MEMORY_COST=65536
export SECUREKIT_ARGON2_PARALLELISM=2

# Key Management
export SECUREKIT_KMS_TYPE=local  # local, aws, vault
export SECUREKIT_LOCAL_KEYSTORE=~/.securekit/keystore.json

# AWS KMS
export AWS_REGION=us-east-1
export AWS_ACCESS_KEY_ID=your_access_key
export AWS_SECRET_ACCESS_KEY=your_secret_key

# Vault
export VAULT_ADDR=http://localhost:8200
export VAULT_TOKEN=your_vault_token
```

### Programmatic Configuration

```python
from securekit.crypto.password import PasswordHasher

# Custom Argon2 parameters
hasher = PasswordHasher(
    time_cost=4,        # Higher for more security
    memory_cost=131072, # 128 MB
    parallelism=2,      # Number of threads
    hash_len=32,        # 256-bit output
    salt_len=16         # 128-bit salt
)
```

## Security Best Practices 🛡️

### Password Security
- Uses Argon2id (winner of the Password Hashing Competition)
- Automatic parameter calibration for target hash time
- Built-in protection against timing attacks
- Secure salt generation

### Encryption
- XChaCha20-Poly1305 for large nonces and safe random generation
- Additional authenticated data (AAD) for context binding
- Tamper-proof ciphertext structure
- Key commitment in the encryption format

### Key Management
- Master key encryption for local key storage
- Secure key derivation using HKDF
- Automatic key rotation support
- Hardware security module (HSM) integration via cloud KMS

## Examples 📚

Check the `examples/` directory for complete working examples:

- **Flask App** (`examples/flask_app.py`) - Complete web application with user registration and encrypted profiles
- **FastAPI App** (`examples/fastapi_app.py`) - Modern async API with dependency injection
- **Django Integration** (`examples/django_app/`) - Django models with encrypted fields

## Testing 🧪

Run the test suite to verify everything works:

```bash
# Install development dependencies
pip install securekit[dev]

# Run all tests
pytest tests/ -v

# Run specific test categories
pytest tests/test_crypto.py -v
pytest tests/test_kms.py -v
pytest tests/test_adapters.py -v
```

## Contributing 🤝

We welcome contributions! Please see our contributing guidelines:

1. Fork the repository
2. Create a feature branch (`git checkout -b feature/amazing-feature`)
3. Commit your changes (`git commit -m 'Add some amazing feature'`)
4. Push to the branch (`git push origin feature/amazing-feature`)
5. Open a Pull Request

### Development Setup

```bash
git clone https://github.com/yourusername/securekit.git
cd securekit
pip install -e .[dev]
pre-commit install
```

## Security Audit 🔍

SecureKit undergoes regular security reviews:

- **Cryptographic Review**: All algorithms follow industry standards
- **Dependency Scanning**: Regular vulnerability scanning
- **Timing Attack Analysis**: Constant-time operations where critical
- **Memory Safety**: Secure memory handling practices

Report security issues to: nexoraindustries@gmail.com

## License 📄

This project is licensed under the Apache License - see the [LICENSE](https://github.com/anshuman365/securekit#LICENSE) file for details.

## Support 💬

- **Documentation**: [https://github.com/anshuman365/securekit#readme](https://github.com/anshuman365/securekit#readme)
- **Issue Tracker**: [https://github.com/anshuman365/securekit/issues](https://github.com/anshuman365/securekit/issues)
- **Discussions**: [GitHub Discussions](https://github.com/anshuman365/securekit/discussions)

## Acknowledgments 🙏

- **Argon2** team for the modern password hashing algorithm
- **Libsodium** for reliable cryptographic primitives
- **Cryptography.io** for Python bindings to OpenSSL
- **PyNaCl** for Python bindings to Libsodium

---

<div align="center">

**SecureKit** - Enterprise-grade cryptography made simple 🔐

*"Security shouldn't be complicated"*

</div>
