Zenroom is a brand new, small and portable virtual machine for cryptographic operations. The Zenroom VM has no external dependencies, is smaller than 2MB, runs in even less memory and is ready for experimental use on many target platforms: desktop, embedded, mobile, cloud and browsers (webassembly).
The goal of this project is that of improving people's awareness of how their data is processed by algorithms, as well facilitate the work of developers to create along privacy by design principles using algorithms that can be deployed in any situation without any change.
0.8.005 Nov 2018 17:55
0.6.014 Jul 2018 16:52
Implemented arithmetic operations on elliptic curve points (ECP) as cryptographic primitives to implement new schemes.
Modularised ECDH class/factory implementation to support multiple curve types.
Support for multiple memory managers (still not fully reentrant), improved use of memory (and reflexivity), better constructors in scripts.
Further progress on syntax in relation to use-cases (DECODE D3.5).
Abstract Syntax Tree parsing of smart rules and rendering to JSON (based on lpeglabels and lua-parser).
Exposed more public calls on zenroom.h for usage as a library (stdout/stderr to memory).
Added contributed scripts for iOS, Android and Go shared builds.
0.5.013 Apr 2018 09:00
Fully adopted Milagro-crypto-C as underlying crypto library, abandoning luazen at least for now. Refactored the API and language approach to adopt a more object-oriented posture towards first-class citizen data objects (octets) and keyrings. Full ECDH implementation with support for multiple curve types.
Direct-syntax interpreter upgraded to Lua 5.3; dropped dependency from lua_sandbox effectively cleaning up large portions of code.
Adopted an embedded memory-manager (umm) optionally enabled at runtime, achieving significant speed improvements, reduction of resources used and full control on memory allocation; adopted a function pointer mechanism to easily include different memory managers in the future.
Updated documentation accordingly with more examples and tests. Half-baked RSA implementation may be abandoned in the future unless use-cases arise.