#crypto #aes #rijndael #block-cipher

no-std aes

Facade for AES (Rijndael) block ciphers implementations

6 releases (3 breaking)

0.3.2 Nov 1, 2018
0.3.1 Oct 4, 2018
0.2.0 Jul 27, 2018
0.1.0 Jun 22, 2018
0.0.0 Oct 6, 2016

#49 in Cryptography

Download history 219/week @ 2018-10-14 112/week @ 2018-10-21 263/week @ 2018-10-28 315/week @ 2018-11-04 224/week @ 2018-11-11 608/week @ 2018-11-18 719/week @ 2018-11-25 910/week @ 2018-12-02 913/week @ 2018-12-09 652/week @ 2018-12-16 586/week @ 2018-12-23 583/week @ 2018-12-30 1222/week @ 2019-01-06 483/week @ 2019-01-13 356/week @ 2019-01-20

2,149 downloads per month
Used in 15 crates (11 directly)


537 lines

RustCrypto: block ciphers Build Status

Collection of block ciphers and block modes written in pure Rust.


Currently only AES crates provide constant-time implementations. If you do not really know what you are doing it's generally recommended not to use other cipher implementations in this repository.

Additionally crates in this repository have not yet received any formal cryptographic and security reviews.


Supported algorithms

Name Alt name Crate name crates.io Docs
AES Rijndael aes






Blowfish blowfish crates.io Documentation
DES + 3DES DEA + 3DEA des crates.io Documentation
Kuznyechik GOST R 34.12-2015 kuznyechik crates.io Documentation
Magma GOST 28147-89 and GOST R 34.12-2015 magma crates.io Documentation
RC2 ARC2 rc2 crates.io Documentation
Twofish twofish crates.io Documentation

Minimum Rust version

All crates in this repository support Rust 1.22 or higher. (except aesni and aes crates, which require Rust 1.27) In future minimum supported Rust version can be changed, but it will be done with the minor version bump.


Block cipher crates provide only bare block cipher implementations. For most applications you will need to use some block cipher mode of operation which are generically implemented in the block-modes crate.

Lets use AES128-CBC with PKCS7 padding to show an example:

extern crate aes_soft as aes;
extern crate block_modes;

use block_modes::{BlockMode, BlockModeIv, Cbc};
use block_modes::block_padding::Pkcs7;
use aes::Aes128;

// create an alias for convinience
type Aes128Cbc = Cbc<Aes128, Pkcs7>;

let mut cipher = Aes128Cbc::new_varkey(key, iv).unwrap();
// buffer must have enough space for message+padding
let mut buffer = [0u8; 32];
// copy message to the buffer
let encrypted_msg = cipher.encrypt_pad(&mut buffer, msg_len).unwrap();

let mut cipher = Aes128Cbc::new_varkey(key, iv).unwrap();
let decrypted_msg = cipher.decrypt_pad(encrypted_data).unwrap();

Note that this example does not use any authentification which can lead to serious vulnarabilities! For Message Authentication Code implementations take a look at RustCrypto/MACs repository.

Some block modes (e.g. CTR, CFB) effectively transform block ciphers into stream ciphers. Such modes are published under separate crates in the RustCrypto/stream-ciphers repository.


All crates licensed under either of

at your option.


Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.