You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
These prior efforts can be considered to be somewhat partially successful in presenting Haskell developers with access to cryptographic primitives, but present a significant development challenge and a high refactoring cost if dependencies become deprecated, which happens often. Of these libraries, a considerable amount are deprecated or have been dead for many years, with `cryptonite`, `crypton`, and `saltine` being clear front-runners in terms of current usage and transitive dependencies (and `sel` being under active development).
203
+
These prior efforts can be considered to be somewhat partially successful in presenting Haskell developers with access to cryptographic primitives, but present a significant development challenge and a high refactoring cost if dependencies become deprecated, which happens often. Of these libraries, a considerable amount are deprecated or archived, with `cryptonite`, `crypton`, and `saltine` being clear front-runners in terms of current usage and transitive dependencies (and `sel` being under active development).
204
204
205
205
Of these four, one is a fork of another (`crypton` and `cryptonite`), and the other two are bindings to `libsodium` which does not sufficiently capture our need for low-level cryptographic primitives in general. `crypton/ite` exposes a few highly- opinionated / specific classes for hashing, block and stream ciphers, but otherwise is focused on concrete implementations and functions. Both `crypton` and `cryptonite` rely on bindings to C implementations that have not undergone the same vetting as commonly-used C libraries; though the code is itself not suspect, the lack of provenance makes it ill-suited for recommendation in trusted environments, and maintenance of the C implementation poses burden of high technical skill. `libsodium` bindings are more trustworthy, but the limited options severely hamper interop with other systems unless they too are using `libsodium`, making them ill-suited for recommendation for some use cases.
206
206
@@ -333,11 +333,11 @@ As the intended engineer and member of the Haskell Cryptography Group carrying o
As the intended source of funding, the Haskell Foundation would be invested in seeing that its funding is spent effectively.
336
+
As the intended owner and source of funding for this project, the Haskell Foundation would be invested in seeing that its funding is spent effectively.
337
337
338
338
-[Haskell Cryptography Group ](https://github.com/haskell-cryptography)
339
339
340
-
As the intended owner of the project, this project will be new maintenance burden on the Haskell Cryptography Group.
340
+
As the intended maintainer of the project, this project will be new burden on the Haskell Cryptography Group.
341
341
342
342
- Users of existing cryptography libraries such as `crypton`, `cryptonite`, `libsodium / saltine`.
0 commit comments