Skip to main content

cryptography is a package which provides cryptographic recipes and primitives to Python developers.

Project description

Latest Version https://travis-ci.org/pyca/cryptography.svg?branch=master https://coveralls.io/repos/pyca/cryptography/badge.png?branch=master

cryptography is a package which provides cryptographic recipes and primitives to Python developers. Our goal is for it to be your “cryptographic standard library”. It supports Python 2.6-2.7, Python 3.2+, and PyPy.

cryptography includes both high level recipes, and low level interfaces to common cryptographic algorithms such as symmetric ciphers, message digests and key derivation functions. For example, to encrypt something with cryptography’s high level symmetric encryption recipe:

>>> from cryptography.fernet import Fernet
>>> # Put this somewhere safe!
>>> key = Fernet.generate_key()
>>> f = Fernet(key)
>>> token = f.encrypt(b"A really secret message. Not for prying eyes.")
>>> token
'...'
>>> f.decrypt(token)
'A really secret message. Not for prying eyes.'

You can find more information in the documentation.

Discussion

If you run into bugs, you can file them in our issue tracker.

We maintain a cryptography-dev mailing list for development discussion.

You can also join #cryptography-dev on Freenode to ask questions or get involved.

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cryptography-0.5.2.tar.gz (319.7 kB view details)

Uploaded Source

Built Distributions

cryptography-0.5.2-cp34-none-win_amd64.whl (1.0 MB view details)

Uploaded CPython 3.4 Windows x86-64

cryptography-0.5.2-cp34-none-win32.whl (830.6 kB view details)

Uploaded CPython 3.4 Windows x86

cryptography-0.5.2-cp33-none-win_amd64.whl (1.0 MB view details)

Uploaded CPython 3.3 Windows x86-64

cryptography-0.5.2-cp33-none-win32.whl (830.6 kB view details)

Uploaded CPython 3.3 Windows x86

cryptography-0.5.2-cp32-none-win_amd64.whl (1.0 MB view details)

Uploaded CPython 3.2 Windows x86-64

cryptography-0.5.2-cp32-none-win32.whl (831.1 kB view details)

Uploaded CPython 3.2 Windows x86

cryptography-0.5.2-cp27-none-win_amd64.whl (1.0 MB view details)

Uploaded CPython 2.7 Windows x86-64

cryptography-0.5.2-cp27-none-win32.whl (830.9 kB view details)

Uploaded CPython 2.7 Windows x86

cryptography-0.5.2-cp26-none-win_amd64.whl (1.0 MB view details)

Uploaded CPython 2.6 Windows x86-64

cryptography-0.5.2-cp26-none-win32.whl (831.7 kB view details)

Uploaded CPython 2.6 Windows x86

File details

Details for the file cryptography-0.5.2.tar.gz.

File metadata

File hashes

Hashes for cryptography-0.5.2.tar.gz
Algorithm Hash digest
SHA256 39e00712ace199c0346f59a5e4526782841277167649ee5dc4ec8faeb786d288
MD5 8c2d381ef263653b640a7a5d14618e4c
BLAKE2b-256 afde11aa6ef58de2ee27c8624428e1590b649fa7de26ab28a7d4801929381c5e

See more details on using hashes here.

Provenance

File details

Details for the file cryptography-0.5.2-cp34-none-win_amd64.whl.

File metadata

File hashes

Hashes for cryptography-0.5.2-cp34-none-win_amd64.whl
Algorithm Hash digest
SHA256 90e8979805c8aea408cecbdb057532f9cb35eb11eb37b9bf9b56552f30a3e0f5
MD5 313831bfbb0052bf9b3f4038d6e04169
BLAKE2b-256 2a03900bf9c2cb241286b59cb8a789d4114c631c1b4ebc62d2d93a84a99d5783

See more details on using hashes here.

Provenance

File details

Details for the file cryptography-0.5.2-cp34-none-win32.whl.

File metadata

File hashes

Hashes for cryptography-0.5.2-cp34-none-win32.whl
Algorithm Hash digest
SHA256 d016bccd583dd3633730a95ac095a15c5b5b6463ff13fc64cf6b2898097a9643
MD5 a4c3736ab0a2c5f0dc100f358b033eb6
BLAKE2b-256 93bd74f4d8632c3ac1a39ad13f2f75a0249f70c4ae3ddc2a3bbb9ee9ffdb3674

See more details on using hashes here.

Provenance

File details

Details for the file cryptography-0.5.2-cp33-none-win_amd64.whl.

File metadata

File hashes

Hashes for cryptography-0.5.2-cp33-none-win_amd64.whl
Algorithm Hash digest
SHA256 d4ce01875db8e6d609cff2965f4d27b20508d0c7388ee4713957b41c4944de62
MD5 8ce66243334efade96a812ec953eb6d7
BLAKE2b-256 8d25927344edfdd46f6a7fc640b3fb8a57ca924958c8a8599e188e86d0fd380e

See more details on using hashes here.

Provenance

File details

Details for the file cryptography-0.5.2-cp33-none-win32.whl.

File metadata

File hashes

Hashes for cryptography-0.5.2-cp33-none-win32.whl
Algorithm Hash digest
SHA256 25ed2aac2e7f9b9d41ecda6f96d06ec24f3f5278cdfc63c0496000568f49f845
MD5 0a73399db2a14e2e6743a184bdce705b
BLAKE2b-256 374ca72103319300f68a12bfd657cde8c2133331bd4611ca0c59959816dd6065

See more details on using hashes here.

Provenance

File details

Details for the file cryptography-0.5.2-cp32-none-win_amd64.whl.

File metadata

File hashes

Hashes for cryptography-0.5.2-cp32-none-win_amd64.whl
Algorithm Hash digest
SHA256 74ea9e18d0b2af856fbc3bf6d546f97dac56e50ae8593e15f0f273aa3ae48892
MD5 9a75274560eea0b4367b1ccd4299f6b1
BLAKE2b-256 cd0681d8413a3d3c51c45adca451cc83887d989bcf422a2d93453611c1a3bb5e

See more details on using hashes here.

Provenance

File details

Details for the file cryptography-0.5.2-cp32-none-win32.whl.

File metadata

File hashes

Hashes for cryptography-0.5.2-cp32-none-win32.whl
Algorithm Hash digest
SHA256 90d8f0c87c97e79fb81d446bf795b5ffd5eba3e356bfb1394ce6d22b1fca2972
MD5 55ad32565d0a53e41600add4823b89cf
BLAKE2b-256 4d295e85ff8efe5a0607fa1e8e717d5bbd0740d18338fc852f068689f234c5f8

See more details on using hashes here.

Provenance

File details

Details for the file cryptography-0.5.2-cp27-none-win_amd64.whl.

File metadata

File hashes

Hashes for cryptography-0.5.2-cp27-none-win_amd64.whl
Algorithm Hash digest
SHA256 c159821fb19fe33d23a131dc8f83e1460e34b84c53b35845946c2a23ff67ac70
MD5 711fac379815b02aa570405bd747bf47
BLAKE2b-256 0e33eda30e8193fe439d5db78c7b00aae58a6cf20395ed6b3ca5ab981b8982f1

See more details on using hashes here.

Provenance

File details

Details for the file cryptography-0.5.2-cp27-none-win32.whl.

File metadata

File hashes

Hashes for cryptography-0.5.2-cp27-none-win32.whl
Algorithm Hash digest
SHA256 641e600fe3248f50586fbe36e586e82f44ec310f39dfe3739e2e66bf3f2219a3
MD5 a072d7188e93a9baa57da9fb2fc1b0c5
BLAKE2b-256 f4b8564416127e69aa3fd635065ba873da851066a50f2a1085fc074bdc57e490

See more details on using hashes here.

Provenance

File details

Details for the file cryptography-0.5.2-cp26-none-win_amd64.whl.

File metadata

File hashes

Hashes for cryptography-0.5.2-cp26-none-win_amd64.whl
Algorithm Hash digest
SHA256 851cd69c85360351bb87603bca29a4995d2cd52ed838ba57f89bffa4ce56fc06
MD5 3927fa42291ef86a96f15ccf5e1ac49e
BLAKE2b-256 a6cd8b24ee87ea8bf54324b11c5bd66dac114c9c59b0df82071c6f0a5d2af0b5

See more details on using hashes here.

Provenance

File details

Details for the file cryptography-0.5.2-cp26-none-win32.whl.

File metadata

File hashes

Hashes for cryptography-0.5.2-cp26-none-win32.whl
Algorithm Hash digest
SHA256 23d96f92945c85275cf3c71c920db0b62e2205235442486f98c3e968c08f6c08
MD5 ae1fabcbd538d8d8feb0c8de98d2eeea
BLAKE2b-256 008b261c25619c428e37ff1bdddabf194f412b75c9d6f4cba1d2a2843c6e42a7

See more details on using hashes here.

Provenance

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page