const crypto = require('crypto'); const fs = require('fs').promises; class CryptoManager { constructor(options = {}) { this.algorithm = options.algorithm || 'aes-256-gcm'; this.keyLength = options.keyLength || 32; this.ivLength = options.ivLength || 16; this.tagLength = options.tagLength || 16; this.iterations = options.iterations || 100000; this.keyCache = new Map(); } generateKey(password, salt) { const cacheKey = `${password}:${salt.toString('hex')}`; if (this.keyCache.has(cacheKey)) { return this.keyCache.get(cacheKey); } const key = crypto.pbkdf2Sync(password, salt, this.iterations, this.keyLength, 'sha256'); this.keyCache.set(cacheKey, key); if (this.keyCache.size > 100) { const firstKey = this.keyCache.keys().next().value; this.keyCache.delete(firstKey); } return key; } encrypt(data, password) { try { const salt = crypto.randomBytes(16); const iv = crypto.randomBytes(this.ivLength); const key = this.generateKey(password, salt); const cipher = crypto.createCipher(this.algorithm, key, { iv }); let encrypted = cipher.update(data, 'utf8', 'hex'); encrypted += cipher.final('hex'); const tag = cipher.getAuthTag(); return { encrypted, salt: salt.toString('hex'), iv: iv.toString('hex'), tag: tag.toString('hex'), algorithm: this.algorithm }; } catch (error) { throw new Error(`Encryption failed: ${error.message}`); } } decrypt(encryptedData, password) { try { const { encrypted, salt, iv, tag, algorithm } = encryptedData; const key = this.generateKey(password, Buffer.from(salt, 'hex')); const decipher = crypto.createDecipher(algorithm, key, { iv: Buffer.from(iv, 'hex') }); decipher.setAuthTag(Buffer.from(tag, 'hex')); let decrypted = decipher.update(encrypted, 'hex', 'utf8'); decrypted += decipher.final('utf8'); return decrypted; } catch (error) { throw new Error(`Decryption failed: ${error.message}`); } } generateHash(data, algorithm = 'sha256') { return crypto.createHash(algorithm).update(data).digest('hex'); } generateHMAC(data, secret, algorithm = 'sha256') { return crypto.createHmac(algorithm, secret).update(data).digest('hex'); } verifyHMAC(data, secret, expectedHmac, algorithm = 'sha256') { const computedHmac = this.generateHMAC(data, secret, algorithm); return crypto.timingSafeEqual( Buffer.from(computedHmac, 'hex'), Buffer.from(expectedHmac, 'hex') ); } generateRandomBytes(length = 32) { return crypto.randomBytes(length); } generateSecurePassword(length = 16, includeSymbols = true) { const charset = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789'; const symbols = '!@#$%^&*()_+-=[]{}|;:,.<>?'; const fullCharset = includeSymbols ? charset + symbols : charset; let password = ''; for (let i = 0; i < length; i++) { const randomIndex = crypto.randomInt(0, fullCharset.length); password += fullCharset[randomIndex]; } return password; } async encryptFile(filePath, password, outputPath = null) { try { const data = await fs.readFile(filePath, 'utf8'); const encrypted = this.encrypt(data, password); const output = outputPath || `${filePath}.encrypted`; await fs.writeFile(output, JSON.stringify(encrypted, null, 2)); return output; } catch (error) { throw new Error(`File encryption failed: ${error.message}`); } } async decryptFile(encryptedFilePath, password, outputPath = null) { try { const encryptedData = JSON.parse(await fs.readFile(encryptedFilePath, 'utf8')); const decrypted = this.decrypt(encryptedData, password); const output = outputPath || encryptedFilePath.replace('.encrypted', ''); await fs.writeFile(output, decrypted); return output; } catch (error) { throw new Error(`File decryption failed: ${error.message}`); } } static create(options) { return new CryptoManager(options); } } class DigitalSignature { constructor(algorithm = 'rsa', keySize = 2048) { this.algorithm = algorithm; this.keySize = keySize; this.keyPairs = new Map(); } generateKeyPair(keyId = 'default') { const { publicKey, privateKey } = crypto.generateKeyPairSync(this.algorithm, { modulusLength: this.keySize, publicKeyEncoding: { type: 'spki', format: 'pem' }, privateKeyEncoding: { type: 'pkcs8', format: 'pem' } }); this.keyPairs.set(keyId, { publicKey, privateKey }); return { publicKey, privateKey }; } sign(data, privateKey, algorithm = 'sha256') { try { const sign = crypto.createSign(algorithm); sign.update(data); return sign.sign(privateKey, 'hex'); } catch (error) { throw new Error(`Signing failed: ${error.message}`); } } verify(data, signature, publicKey, algorithm = 'sha256') { try { const verify = crypto.createVerify(algorithm); verify.update(data); return verify.verify(publicKey, signature, 'hex'); } catch (error) { throw new Error(`Verification failed: ${error.message}`); } } signWithKeyId(data, keyId = 'default') { const keyPair = this.keyPairs.get(keyId); if (!keyPair) { throw new Error(`Key pair with ID '${keyId}' not found`); } return this.sign(data, keyPair.privateKey); } verifyWithKeyId(data, signature, keyId = 'default') { const keyPair = this.keyPairs.get(keyId); if (!keyPair) { throw new Error(`Key pair with ID '${keyId}' not found`); } return this.verify(data, signature, keyPair.publicKey); } exportKeyPair(keyId = 'default') { return this.keyPairs.get(keyId); } importKeyPair(publicKey, privateKey, keyId = 'default') { this.keyPairs.set(keyId, { publicKey, privateKey }); } listKeyIds() { return Array.from(this.keyPairs.keys()); } deleteKeyPair(keyId) { return this.keyPairs.delete(keyId); } } class SecureStorage { constructor(cryptoManager, filePath) { this.crypto = cryptoManager; this.filePath = filePath; this.data = new Map(); this.isLoaded = false; this.autoSave = true; } async load(password) { try { const encryptedData = JSON.parse(await fs.readFile(this.filePath, 'utf8')); const decrypted = this.crypto.decrypt(encryptedData, password); const parsed = JSON.parse(decrypted); this.data = new Map(Object.entries(parsed)); this.isLoaded = true; return true; } catch (error) { if (error.code === 'ENOENT') { this.data = new Map(); this.isLoaded = true; return true; } throw new Error(`Failed to load secure storage: ${error.message}`); } } async save(password) { try { const dataObject = Object.fromEntries(this.data); const serialized = JSON.stringify(dataObject, null, 2); const encrypted = this.crypto.encrypt(serialized, password); await fs.writeFile(this.filePath, JSON.stringify(encrypted, null, 2)); return true; } catch (error) { throw new Error(`Failed to save secure storage: ${error.message}`); } } set(key, value, password) { if (!this.isLoaded) { throw new Error('Storage not loaded. Call load() first.'); } this.data.set(key, value); if (this.autoSave) { return this.save(password); } return Promise.resolve(); } get(key) { if (!this.isLoaded) { throw new Error('Storage not loaded. Call load() first.'); } return this.data.get(key); } has(key) { if (!this.isLoaded) { throw new Error('Storage not loaded. Call load() first.'); } return this.data.has(key); } delete(key, password) { if (!this.isLoaded) { throw new Error('Storage not loaded. Call load() first.'); } const deleted = this.data.delete(key); if (deleted && this.autoSave) { return this.save(password); } return Promise.resolve(deleted); } clear(password) { if (!this.isLoaded) { throw new Error('Storage not loaded. Call load() first.'); } this.data.clear(); if (this.autoSave) { return this.save(password); } return Promise.resolve(); } keys() { if (!this.isLoaded) { throw new Error('Storage not loaded. Call load() first.'); } return Array.from(this.data.keys()); } values() { if (!this.isLoaded) { throw new Error('Storage not loaded. Call load() first.'); } return Array.from(this.data.values()); } entries() { if (!this.isLoaded) { throw new Error('Storage not loaded. Call load() first.'); } return Array.from(this.data.entries()); } size() { if (!this.isLoaded) { throw new Error('Storage not loaded. Call load() first.'); } return this.data.size; } setAutoSave(enabled) { this.autoSave = enabled; } } function createSecureHash(data, algorithm = 'sha256', rounds = 1) { let hash = data; for (let i = 0; i < rounds; i++) { hash = crypto.createHash(algorithm).update(hash).digest('hex'); } return hash; } function compareSecureHashes(hash1, hash2) { if (hash1.length !== hash2.length) { return false; } return crypto.timingSafeEqual( Buffer.from(hash1, 'hex'), Buffer.from(hash2, 'hex') ); } async function secureDelete(filePath, passes = 3) { try { const stats = await fs.stat(filePath); const fileSize = stats.size; for (let pass = 0; pass < passes; pass++) { const randomData = crypto.randomBytes(fileSize); await fs.writeFile(filePath, randomData); await fs.fsync(await fs.open(filePath, 'r+')); } await fs.unlink(filePath); return true; } catch (error) { throw new Error(`Secure deletion failed: ${error.message}`); } } const createCryptoUtilities = (options = {}) => { const crypto = new CryptoManager(options); const signature = new DigitalSignature(); return { crypto, signature, createSecureStorage: (filePath) => new SecureStorage(crypto, filePath), hash: (data, algorithm) => createSecureHash(data, algorithm), compareHashes: compareSecureHashes, secureDelete, generateKey: () => crypto.generateRandomBytes(32).toString('hex'), generatePassword: (length, includeSymbols) => crypto.generateSecurePassword(length, includeSymbols) }; }; module.exports = { CryptoManager, DigitalSignature, SecureStorage, createSecureHash, compareSecureHashes, secureDelete, createCryptoUtilities };