dcrypt


Namedcrypt JSON
Version 0.0.4 PyPI version JSON
download
home_pageNone
SummaryEncrypt text and Python objects using RSA + Fernet encryption.
upload_time2024-04-01 19:17:40
maintainerNone
docs_urlNone
authorNone
requires_python>=3.7
licenseNone
keywords encryption decryption rsa fernet encrypt decrypt encryptor decryptor encrypter decrypter encrypting decrypting encryptors decryptors encrypters decrypters cryptography
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            ## dcrypt

Use RSA + Fernet encryption to encrypt and decrypt text and Python objects.

## Installation

Install with pip:

```bash
pip install dcrypt
```

## Usage

`dcrypt` contains three classes that can be used for encryption and decryption:

- `TextCrypt`: Encrypts and decrypts text.
- `ObjectCrypt`: Encrypts and decrypts text and Python objects (using `pickle`).
- `JSONCrypt`: `ObjectCrypt` that encrypts into a JSON parsable format.

Let's start by encrypting some text we want to keep secret:

```python
import dcrypt

# First, we create a cryptkey
cryptkey = dcrypt.CryptKey()

# Then, we create a TextCrypt object with the key
text_crypt = dcrypt.TextCrypt(key=cryptkey)

# Now, we can encrypt some text
encrypted_text = text_crypt.encrypt("This is a secret message!")
print(encrypted_text)

# And decrypt it again
decrypted_text = text_crypt.decrypt(encrypted_text)
print(decrypted_text)
```

How about encrypting Python objects?

```python
# We can use our existing cryptkey

# Create an ObjectCrypt object with the key
object_crypt = dcrypt.ObjectCrypt(key=cryptkey)

# Encrypt a Python object
my_secrets = {
    "passcode": 1234,
    "password": "password123",
}

encrypted_object = object_crypt.encrypt(my_secrets)
print(encrypted_object)

# The Output would be something like:
# {
#   "passcode": "gAAAAABgJ0Z...",
#   "password": "gAAAAABgJ0Z...",
# }
```

You could also decide to use the object crypt to encrypt text too.

Okay! Let's assume that we want to store `my_secrets` in JSON format. It would be nice if `my_secrets` is encrypted in a format that is JSON serializable. We can do this by using the `JSONCrypt` class:

```python
# Let's add a tuple of emails to our secrets
my_secrets["emails"] = ("user@host.com", "abc@xyz.com")

# With JSONCrypt
json_crypt = dcrypt.JSONCrypt(key=cryptkey)
encrypted_secrets = json_crypt.encrypt(my_secrets)

# Let's decrypt it again
decrypted_secrets = json_crypt.decrypt(encrypted_secrets)

# Just to be sure, let's check that the decrypted secrets are the same as the original secrets
assert decrypted_secrets == my_secrets

# Oops! We get an error:
# AssertionError
# Why? Because the tuple was converted to a list when we encrypted it.
# So take note of this when using JSONCrypt.
```

### `CryptKey`

A cryptkey is simply a key that is used to encrypt and decrypt data.

Let's create a cryptkey:

```python
import dcrypt

cryptkey = dcrypt.CryptKey()
```

Hmm... that was easy. But what actually is a cryptkey? A cryptkey is an object containing a signature used to encrypt and decrypt data. Wondering what the signature is? A cryptkey signature contains four things:

- A rsa public key
- A rsa private key
- An encrypted master key (Fernet key)
- The hash method used to sign and verify the master key

The rsa keys are used to encrypt and decrypt the master key. The master key is used to encrypt and decrypt data. The rsa keys are generated using the `rsa` library. The master key is generated using the `cryptography` library's `Fernet` class.

What if we want stronger encryption? We can specify the keys signature strength

```python
cryptkey = dcrypt.CryptKey(signature_strength=2)
# The default is 1. But we can specify 2 or 3 for stronger encryption.
# The caveat is that the higher the signature strength, the longer it takes to generate the cryptkey.
```

We can also specify the hash method used to sign and verify the master key

```python
cryptkey = dcrypt.CryptKey(hash_algorithm="SHA-512")

# See `dcrypt.signature.SUPPORTED_HASH_ALGORITHMS` for a list of supported hash methods.
```

### Saving and Loading CryptKeys

I know, I know. You want to save your cryptkey so you can use it later. You can do this by saving the cryptkey's signature to a file. Let's see how:

```python
import dcrypt

# Shinny new cryptkey
cryptkey = dcrypt.CryptKey()

# Now, let's save it
cryptkey.signature.dump("./secrets_folder/cryptkey.json")

# Yes! We saved it. Now, let's load our key signature back and recreate our cryptkey
signature = dcrypt.Signature.load("./secrets_folder/cryptkey.json")
cryptkey = dcrypt.CryptKey(signature=signature)

# Yay! We have our cryptkey back.
```

> Another reason why you may want to save your key signature is to remove the overhead of generating a new cryptkey every time you want to encrypt or decrypt data. Especially when the signature strength is maxed out(3). You can just load the signature from a file and use it to create a new cryptkey.

### Let's talk about cryptkey signatures

The cryptkey signature is a NamedTuple which contains...? Right! A public key, a private key, an encrypted master key and a hash method.

The cool thing about cryptkey signatures is that once created, they cannot be modified. So we can access the public key, private key, encrypted master key and hash method without worrying about them being modified.

Let's see how we can use cryptkey signatures:

```python
import dcrypt

signature = dcrypt.CryptKey.make_signature()
# Yes! we use the `make_signature` classmethod to create a cryptkey signature.

# Now, let's access the public key
public_key = signature.pub_key

# What about the hash method?
hash_method = signature.hash_method

# And the encrypted master key?
encrypted_master_key = signature.enc_master_key
```

There are two types of cryptkey signatures:

- `Signature`
- `CommonSignature`

What are the differences between them? Let's start with the `CommonSignature`.
A `CommonSignature` is a cryptkey signature whose values are all strings. This means that it can be easily serialized and deserialized. This is the type of signature that is saved to a file when we use the `dump` method.

Unlike the `CommonSignature`, a `Signature` is a cryptkey signature whose values are not all strings. Some are byte type. This means that it cannot be easily serialized and deserialized. This is the type of signature that is used to create a cryptkey.

However, we can convert a `Signature` to a `CommonSignature` and vice versa:

```python
import dcrypt

# Let's create a cryptkey signature
signature = dcrypt.CryptKey.make_signature()

# Now, let's convert it to a common signature
common_signature = signature.common()

# And back to a signature
signature = dcrypt.Signature.from_common(common_signature)
```

Easy, right? But why do we need to convert a signature to a common signature? Well, we need to do this when we want to save a cryptkey signature to a file. We can't save a `Signature` to a file. We can only save a `CommonSignature` to a file.

Another use case is if we need to send a cryptkey signature over a network, we need to convert it to a common signature first and then convert it back to a signature when we receive it.

```python
import dcrypt
import requests

# Let's create a cryptkey signature
signature = dcrypt.CryptKey.make_signature()

# Now, let's convert it to a common signature
common_signature = signature.common()

# Let's send it over a network
requests.post("https://example.com", json=common_signature.json())

# Now, let's receive it
common_signature_as_json = requests.get("https://example.com").json()

# Construct a common signature from the json
common_signature = dcrypt.CommonSignature(**common_signature_as_json)

# And convert it back to a signature
signature = dcrypt.Signature.from_common(common_signature)
# Easy peasy!
```

If you noticed, we converted the common signature to json before sending it over the network. You do this using the `json` method of the `CommonSignature` class.

### Encrypting function output

Say you have a method in a class called `Human` which returns the contact information of the human which will be sent over a network. You may want to encrypt the result of the method before sending it. How do you do this?

First let's define our `Human` class:

```python
from dataclasses import dataclass

@dataclass
class Human:
    name: str
    gender: str
    email: str
    phonenumber: str
    address: str
    ...

    def get_contact_info(self):
        return {
            "email": self.email,
            "phonenumber": self.phonenumber,
        }
```

Now, let's create a cryptkey and an `ObjectCrypt` object:

```python
import dcrypt

# Create a cryptkey
cryptkey = dcrypt.CryptKey()

# Create an ObjectCrypt object
object_crypt = dcrypt.ObjectCrypt(key=cryptkey)

# Let save the cryptkey signature to a file
cryptkey.signature.dump("./secrets_folder/cryptkey.json")
```

All that's left is to decorate the `get_contact_info` method with the object crypt we just created:

```python

class Human:
    ...

    @object_crypt
    def get_contact_info(self):
        return {
            "email": self.email,
            "phonenumber": self.phonenumber,
        }
```

That's it! Now, the result of the `get_contact_info` method will be encrypted before it is returned and yes you can decrypt it with the same object crypt or create a new object crypt with the already saved cryptkey signature.

```python
tolu = Human(
    name="Tolu",
    gender="Male",
    email="tioluwa.dev@gmail.com",
    phonenumber="08012345678",
    address="Lagos, Nigeria."
)

# Let's get his contact info
encrypted_contact_info = tolu.get_contact_info()

# The output would be something like:
# {
#   "email": "gAAAAABgJ0Z...",
#   "phonenumber": "gAAAAABgJ0Z...",
# }

# Now, let's decrypt it
signature = dcrypt.Signature.load("./secrets_folder/cryptkey.json")
new_cryptkey = dcrypt.CryptKey(signature=signature)
new_object_crypt = dcrypt.ObjectCrypt(key=new_cryptkey)
decrypted_contact_info = new_object_crypt.decrypt(contact_info)

# The output should be:
# {
#   "email": "tioluwa.dev@gmail",
#   "phonenumber": "08012345678",
# }
```

You are now ready to use `dcrypt` to encrypt and decrypt your data. Goodluck!

## Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

### Testing

To run the tests, simply run the following command in the root directory of your cloned repository:

```bash
python -m unittest discover tests "test_*.py"
```

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "dcrypt",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.7",
    "maintainer_email": "ti-oluwa <tioluwa.dev@gmail.com>",
    "keywords": "encryption, decryption, rsa, fernet, encrypt, decrypt, encryptor, decryptor, encrypter, decrypter, encrypting, decrypting, encryptors, decryptors, encrypters, decrypters, cryptography",
    "author": null,
    "author_email": "ti-oluwa <tioluwa.dev@gmail.com>",
    "download_url": "https://files.pythonhosted.org/packages/75/33/d5e004d075b13b6ef7c5e37a64f3188a65709653933af051af43a5d15874/dcrypt-0.0.4.tar.gz",
    "platform": null,
    "description": "## dcrypt\r\n\r\nUse RSA + Fernet encryption to encrypt and decrypt text and Python objects.\r\n\r\n## Installation\r\n\r\nInstall with pip:\r\n\r\n```bash\r\npip install dcrypt\r\n```\r\n\r\n## Usage\r\n\r\n`dcrypt` contains three classes that can be used for encryption and decryption:\r\n\r\n- `TextCrypt`: Encrypts and decrypts text.\r\n- `ObjectCrypt`: Encrypts and decrypts text and Python objects (using `pickle`).\r\n- `JSONCrypt`: `ObjectCrypt` that encrypts into a JSON parsable format.\r\n\r\nLet's start by encrypting some text we want to keep secret:\r\n\r\n```python\r\nimport dcrypt\r\n\r\n# First, we create a cryptkey\r\ncryptkey = dcrypt.CryptKey()\r\n\r\n# Then, we create a TextCrypt object with the key\r\ntext_crypt = dcrypt.TextCrypt(key=cryptkey)\r\n\r\n# Now, we can encrypt some text\r\nencrypted_text = text_crypt.encrypt(\"This is a secret message!\")\r\nprint(encrypted_text)\r\n\r\n# And decrypt it again\r\ndecrypted_text = text_crypt.decrypt(encrypted_text)\r\nprint(decrypted_text)\r\n```\r\n\r\nHow about encrypting Python objects?\r\n\r\n```python\r\n# We can use our existing cryptkey\r\n\r\n# Create an ObjectCrypt object with the key\r\nobject_crypt = dcrypt.ObjectCrypt(key=cryptkey)\r\n\r\n# Encrypt a Python object\r\nmy_secrets = {\r\n    \"passcode\": 1234,\r\n    \"password\": \"password123\",\r\n}\r\n\r\nencrypted_object = object_crypt.encrypt(my_secrets)\r\nprint(encrypted_object)\r\n\r\n# The Output would be something like:\r\n# {\r\n#   \"passcode\": \"gAAAAABgJ0Z...\",\r\n#   \"password\": \"gAAAAABgJ0Z...\",\r\n# }\r\n```\r\n\r\nYou could also decide to use the object crypt to encrypt text too.\r\n\r\nOkay! Let's assume that we want to store `my_secrets` in JSON format. It would be nice if `my_secrets` is encrypted in a format that is JSON serializable. We can do this by using the `JSONCrypt` class:\r\n\r\n```python\r\n# Let's add a tuple of emails to our secrets\r\nmy_secrets[\"emails\"] = (\"user@host.com\", \"abc@xyz.com\")\r\n\r\n# With JSONCrypt\r\njson_crypt = dcrypt.JSONCrypt(key=cryptkey)\r\nencrypted_secrets = json_crypt.encrypt(my_secrets)\r\n\r\n# Let's decrypt it again\r\ndecrypted_secrets = json_crypt.decrypt(encrypted_secrets)\r\n\r\n# Just to be sure, let's check that the decrypted secrets are the same as the original secrets\r\nassert decrypted_secrets == my_secrets\r\n\r\n# Oops! We get an error:\r\n# AssertionError\r\n# Why? Because the tuple was converted to a list when we encrypted it.\r\n# So take note of this when using JSONCrypt.\r\n```\r\n\r\n### `CryptKey`\r\n\r\nA cryptkey is simply a key that is used to encrypt and decrypt data.\r\n\r\nLet's create a cryptkey:\r\n\r\n```python\r\nimport dcrypt\r\n\r\ncryptkey = dcrypt.CryptKey()\r\n```\r\n\r\nHmm... that was easy. But what actually is a cryptkey? A cryptkey is an object containing a signature used to encrypt and decrypt data. Wondering what the signature is? A cryptkey signature contains four things:\r\n\r\n- A rsa public key\r\n- A rsa private key\r\n- An encrypted master key (Fernet key)\r\n- The hash method used to sign and verify the master key\r\n\r\nThe rsa keys are used to encrypt and decrypt the master key. The master key is used to encrypt and decrypt data. The rsa keys are generated using the `rsa` library. The master key is generated using the `cryptography` library's `Fernet` class.\r\n\r\nWhat if we want stronger encryption? We can specify the keys signature strength\r\n\r\n```python\r\ncryptkey = dcrypt.CryptKey(signature_strength=2)\r\n# The default is 1. But we can specify 2 or 3 for stronger encryption.\r\n# The caveat is that the higher the signature strength, the longer it takes to generate the cryptkey.\r\n```\r\n\r\nWe can also specify the hash method used to sign and verify the master key\r\n\r\n```python\r\ncryptkey = dcrypt.CryptKey(hash_algorithm=\"SHA-512\")\r\n\r\n# See `dcrypt.signature.SUPPORTED_HASH_ALGORITHMS` for a list of supported hash methods.\r\n```\r\n\r\n### Saving and Loading CryptKeys\r\n\r\nI know, I know. You want to save your cryptkey so you can use it later. You can do this by saving the cryptkey's signature to a file. Let's see how:\r\n\r\n```python\r\nimport dcrypt\r\n\r\n# Shinny new cryptkey\r\ncryptkey = dcrypt.CryptKey()\r\n\r\n# Now, let's save it\r\ncryptkey.signature.dump(\"./secrets_folder/cryptkey.json\")\r\n\r\n# Yes! We saved it. Now, let's load our key signature back and recreate our cryptkey\r\nsignature = dcrypt.Signature.load(\"./secrets_folder/cryptkey.json\")\r\ncryptkey = dcrypt.CryptKey(signature=signature)\r\n\r\n# Yay! We have our cryptkey back.\r\n```\r\n\r\n> Another reason why you may want to save your key signature is to remove the overhead of generating a new cryptkey every time you want to encrypt or decrypt data. Especially when the signature strength is maxed out(3). You can just load the signature from a file and use it to create a new cryptkey.\r\n\r\n### Let's talk about cryptkey signatures\r\n\r\nThe cryptkey signature is a NamedTuple which contains...? Right! A public key, a private key, an encrypted master key and a hash method.\r\n\r\nThe cool thing about cryptkey signatures is that once created, they cannot be modified. So we can access the public key, private key, encrypted master key and hash method without worrying about them being modified.\r\n\r\nLet's see how we can use cryptkey signatures:\r\n\r\n```python\r\nimport dcrypt\r\n\r\nsignature = dcrypt.CryptKey.make_signature()\r\n# Yes! we use the `make_signature` classmethod to create a cryptkey signature.\r\n\r\n# Now, let's access the public key\r\npublic_key = signature.pub_key\r\n\r\n# What about the hash method?\r\nhash_method = signature.hash_method\r\n\r\n# And the encrypted master key?\r\nencrypted_master_key = signature.enc_master_key\r\n```\r\n\r\nThere are two types of cryptkey signatures:\r\n\r\n- `Signature`\r\n- `CommonSignature`\r\n\r\nWhat are the differences between them? Let's start with the `CommonSignature`.\r\nA `CommonSignature` is a cryptkey signature whose values are all strings. This means that it can be easily serialized and deserialized. This is the type of signature that is saved to a file when we use the `dump` method.\r\n\r\nUnlike the `CommonSignature`, a `Signature` is a cryptkey signature whose values are not all strings. Some are byte type. This means that it cannot be easily serialized and deserialized. This is the type of signature that is used to create a cryptkey.\r\n\r\nHowever, we can convert a `Signature` to a `CommonSignature` and vice versa:\r\n\r\n```python\r\nimport dcrypt\r\n\r\n# Let's create a cryptkey signature\r\nsignature = dcrypt.CryptKey.make_signature()\r\n\r\n# Now, let's convert it to a common signature\r\ncommon_signature = signature.common()\r\n\r\n# And back to a signature\r\nsignature = dcrypt.Signature.from_common(common_signature)\r\n```\r\n\r\nEasy, right? But why do we need to convert a signature to a common signature? Well, we need to do this when we want to save a cryptkey signature to a file. We can't save a `Signature` to a file. We can only save a `CommonSignature` to a file.\r\n\r\nAnother use case is if we need to send a cryptkey signature over a network, we need to convert it to a common signature first and then convert it back to a signature when we receive it.\r\n\r\n```python\r\nimport dcrypt\r\nimport requests\r\n\r\n# Let's create a cryptkey signature\r\nsignature = dcrypt.CryptKey.make_signature()\r\n\r\n# Now, let's convert it to a common signature\r\ncommon_signature = signature.common()\r\n\r\n# Let's send it over a network\r\nrequests.post(\"https://example.com\", json=common_signature.json())\r\n\r\n# Now, let's receive it\r\ncommon_signature_as_json = requests.get(\"https://example.com\").json()\r\n\r\n# Construct a common signature from the json\r\ncommon_signature = dcrypt.CommonSignature(**common_signature_as_json)\r\n\r\n# And convert it back to a signature\r\nsignature = dcrypt.Signature.from_common(common_signature)\r\n# Easy peasy!\r\n```\r\n\r\nIf you noticed, we converted the common signature to json before sending it over the network. You do this using the `json` method of the `CommonSignature` class.\r\n\r\n### Encrypting function output\r\n\r\nSay you have a method in a class called `Human` which returns the contact information of the human which will be sent over a network. You may want to encrypt the result of the method before sending it. How do you do this?\r\n\r\nFirst let's define our `Human` class:\r\n\r\n```python\r\nfrom dataclasses import dataclass\r\n\r\n@dataclass\r\nclass Human:\r\n    name: str\r\n    gender: str\r\n    email: str\r\n    phonenumber: str\r\n    address: str\r\n    ...\r\n\r\n    def get_contact_info(self):\r\n        return {\r\n            \"email\": self.email,\r\n            \"phonenumber\": self.phonenumber,\r\n        }\r\n```\r\n\r\nNow, let's create a cryptkey and an `ObjectCrypt` object:\r\n\r\n```python\r\nimport dcrypt\r\n\r\n# Create a cryptkey\r\ncryptkey = dcrypt.CryptKey()\r\n\r\n# Create an ObjectCrypt object\r\nobject_crypt = dcrypt.ObjectCrypt(key=cryptkey)\r\n\r\n# Let save the cryptkey signature to a file\r\ncryptkey.signature.dump(\"./secrets_folder/cryptkey.json\")\r\n```\r\n\r\nAll that's left is to decorate the `get_contact_info` method with the object crypt we just created:\r\n\r\n```python\r\n\r\nclass Human:\r\n    ...\r\n\r\n    @object_crypt\r\n    def get_contact_info(self):\r\n        return {\r\n            \"email\": self.email,\r\n            \"phonenumber\": self.phonenumber,\r\n        }\r\n```\r\n\r\nThat's it! Now, the result of the `get_contact_info` method will be encrypted before it is returned and yes you can decrypt it with the same object crypt or create a new object crypt with the already saved cryptkey signature.\r\n\r\n```python\r\ntolu = Human(\r\n    name=\"Tolu\",\r\n    gender=\"Male\",\r\n    email=\"tioluwa.dev@gmail.com\",\r\n    phonenumber=\"08012345678\",\r\n    address=\"Lagos, Nigeria.\"\r\n)\r\n\r\n# Let's get his contact info\r\nencrypted_contact_info = tolu.get_contact_info()\r\n\r\n# The output would be something like:\r\n# {\r\n#   \"email\": \"gAAAAABgJ0Z...\",\r\n#   \"phonenumber\": \"gAAAAABgJ0Z...\",\r\n# }\r\n\r\n# Now, let's decrypt it\r\nsignature = dcrypt.Signature.load(\"./secrets_folder/cryptkey.json\")\r\nnew_cryptkey = dcrypt.CryptKey(signature=signature)\r\nnew_object_crypt = dcrypt.ObjectCrypt(key=new_cryptkey)\r\ndecrypted_contact_info = new_object_crypt.decrypt(contact_info)\r\n\r\n# The output should be:\r\n# {\r\n#   \"email\": \"tioluwa.dev@gmail\",\r\n#   \"phonenumber\": \"08012345678\",\r\n# }\r\n```\r\n\r\nYou are now ready to use `dcrypt` to encrypt and decrypt your data. Goodluck!\r\n\r\n## Contributing\r\n\r\nContributions are welcome! Please feel free to submit a Pull Request.\r\n\r\n### Testing\r\n\r\nTo run the tests, simply run the following command in the root directory of your cloned repository:\r\n\r\n```bash\r\npython -m unittest discover tests \"test_*.py\"\r\n```\r\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "Encrypt text and Python objects using RSA + Fernet encryption.",
    "version": "0.0.4",
    "project_urls": {
        "Bug Tracker": "https://github.com/ti-oluwa/dcrypt/issues",
        "Homepage": "https://github.com/ti-oluwa/dcrypt",
        "Repository": "https://github.com/ti-oluwa/dcrypt"
    },
    "split_keywords": [
        "encryption",
        " decryption",
        " rsa",
        " fernet",
        " encrypt",
        " decrypt",
        " encryptor",
        " decryptor",
        " encrypter",
        " decrypter",
        " encrypting",
        " decrypting",
        " encryptors",
        " decryptors",
        " encrypters",
        " decrypters",
        " cryptography"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "8c57e13755591eebf650a31039ac14a655656decf14f4ab2a6abde7cff699b9f",
                "md5": "26e3bc19986ac168e3230df9d46f75f3",
                "sha256": "09fdbd85519f34865feb1ac01fba9cdea55ddd9041aa14845d95cc6c9ffa2887"
            },
            "downloads": -1,
            "filename": "dcrypt-0.0.4-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "26e3bc19986ac168e3230df9d46f75f3",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.7",
            "size": 13973,
            "upload_time": "2024-04-01T19:17:32",
            "upload_time_iso_8601": "2024-04-01T19:17:32.649844Z",
            "url": "https://files.pythonhosted.org/packages/8c/57/e13755591eebf650a31039ac14a655656decf14f4ab2a6abde7cff699b9f/dcrypt-0.0.4-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "7533d5e004d075b13b6ef7c5e37a64f3188a65709653933af051af43a5d15874",
                "md5": "0eb99dd4f6dac1b0747b82bda5a2650e",
                "sha256": "32ac6d96ea5e6ebfe8f1a891a3f302be7e5e62fc5f737d9aef60eb530e207a8f"
            },
            "downloads": -1,
            "filename": "dcrypt-0.0.4.tar.gz",
            "has_sig": false,
            "md5_digest": "0eb99dd4f6dac1b0747b82bda5a2650e",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.7",
            "size": 16923,
            "upload_time": "2024-04-01T19:17:40",
            "upload_time_iso_8601": "2024-04-01T19:17:40.853697Z",
            "url": "https://files.pythonhosted.org/packages/75/33/d5e004d075b13b6ef7c5e37a64f3188a65709653933af051af43a5d15874/dcrypt-0.0.4.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-04-01 19:17:40",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "ti-oluwa",
    "github_project": "dcrypt",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "requirements": [],
    "lcname": "dcrypt"
}
        
Elapsed time: 0.23851s