CipherSweetCross-platform, searchable field-level encryption
Before adding searchable encryption support to your project, make sure you understand the appropriate threat model for your use case. At a minimum, you will want your application and database server to be running on separate cloud instances / virtual machines. (Even better: Separate bare-metal hardware.)
- Encryption that targets the 256-bit security level (using AEAD modes with extended nonces to minimize users' rekeying burden).
- Compliance-Specific Protocol Support. Multiple backends to satisfy a diverse range of compliance requirements. More can be added as needed:
- Key separation. Each column is encrypted with a different key, all of which are derived from your master encryption key using secure key-splitting algorithms.
- Key management integration. CipherSweet supports integration with Key Management solutions for storing and retrieving the master encryption key.
Searchable Encryption. CipherSweet uses
with the fuzzier and Bloom filter strategies to allow fast ciphertext search
with minimal data leakage.
- Each blind index on each column uses a distinct key from your encryption key and each other blind index key.
- This doesn't allow for
LIKEoperators or regular expression searching, but it does allow you to index transformations (e.g. substrings) of the plaintext, hashed under a distinct key.
- Adaptability. CipherSweet has a database- and product-agnostic design, so it should be easy to write an adapter to use CipherSweet in your preferred programming language and/or framework.
- File/stream encryption. CipherSweet has an API for encrypting files that provides authenticated encryption that defeats TOCTOU attacks with minimal overhead. Learn more.
The CipherSweet documentation is available online. Select your language below to get started.
- Coming soon: Java
- Coming soon: .NET (C#)
- Coming soon: Rust
- Coming soon: Python
CipherSweet Specification and Internals
If your company uses this library in their products or services, you may be interested in purchasing a support contract from Paragon Initiative Enterprises.