pop-crypt provides various interfaces to assist in encrypting and decrypting secure hashes
or creating and verifying one-way password hashes.
pop-crypt is a component of the Pop PHP Framework.
Install pop-crypt using Composer.
composer require popphp/pop-crypt
Or, require it in your composer.json file
"require": {
"popphp/pop-crypt" : "^3.0.0"
}
Create a password hash:
use Pop\Crypt\Hashing;
$hasher = Hashing\BcryptHasher::create();
$hashedValue = $hasher->make('password');
if ($hasher->verify('password', $hashedValue)) {
echo 'You shall pass!' . PHP_EOL;
} else {
echo 'YOU SHALL NOT PASS!' . PHP_EOL;
}Create an encrypted value:
use Pop\Crypt\Encryption;
$encrypter = new Encryption\Encrypter($mySecureKey, 'aes-256-cbc');
// Returns a base-64 encoded string of the encrypted data
$encryptedData = $encrypter->encrypt('SENSITIVE_DATA');
// Returns the valid, decrypted data
try {
$decryptedData = $encrypter->decrypt($encryptedData);
// Else, throws an error exception is something is incorrect or invalid
} catch (\Exception $e) {
echo $e->getMessage();
}The standard PHP password hashing algorithms are supported:
PASSWORD_BCRYPTPASSWORD_ARGON2IPASSWORD_ARGON2ID
The PASSWORD_BCRYPT algorithm supports the cost option. The salt has been deprecated as of PHP 8.0.0.
The PASSWORD_ARGON2I and PASSWORD_ARGON2ID algorithms support the following options:
memory_costtime_costthreads
All the algorithms use the standard default values for the options if none are passed.
The Encryption classes are built using the openssl extension and its related functions. Supported ciphers are:
aes-128-cbcaes-256-cbcaes-128-gcmaes-256-gcm
It is important to safely store the key or keys used to generate the encrypted data. When correctly paired with their cipher, the encrypted data can successfully be decrypted. However, if the key is incorrect or matched with the wrong cipher, decryption will fail.
A key that matches the chosen cipher can be generated with the following method:
use Pop\Crypt\Encryption;
$key = Encryption\Encrypter::generateKey($cipher, false);Methods that manage the key values have an optional $raw parameter.
In the case of generating or getting key values from the encrypter, if $raw is true, then the key value will be
returned as a raw string of bytes. Otherwise, if $raw is false, the key value will be base-64 encoded before it
is returned.
In the case of setting key values or previous key values in the encrypter, if $raw is false, then the key values will
be treated was base-64 encoded values and will be decoded as they are stored in the object. If $raw is true, the
key values will not be processed or decoded in any way.
In order to preserve legacy keys that have been previously used and rotated out of use, you can load those previous keys to have the encrypter object attempt to use them if the latest key does not work. This provides graceful rotation of keys.
use Pop\Crypt\Encryption;
$encrypter = new Encryption\Encrypter($currentKey, 'aes-256-cbc');
$encrypter->setPreviousKeys([$oldKey1, $oldKey2, $oldKey3]);