| Type: | Package |
| Title: | Cryptographic Hash, Extendable-Output and Binary Encoding Functions |
| Version: | 1.1.0 |
| Description: | Fast and memory-efficient streaming hash functions, binary encoding and serialization. Hashes strings and raw vectors directly. Stream hashes files which can be larger than memory, as well as in-memory objects through R's serialization mechanism. Implements the SHA-256, SHA-3 and 'Keccak' cryptographic hash functions, SHAKE256 extendable-output function (XOF), 'SipHash' pseudo-random function, base64 and base58 encoding, and 'CBOR' serialization. |
| License: | MIT + file LICENSE |
| URL: | https://shikokuchuo.net/secretbase/, https://github.com/shikokuchuo/secretbase/ |
| BugReports: | https://github.com/shikokuchuo/secretbase/issues |
| Depends: | R (≥ 3.5) |
| Config/build/compilation-database: | true |
| Encoding: | UTF-8 |
| RoxygenNote: | 7.3.3 |
| NeedsCompilation: | yes |
| Packaged: | 2026-01-07 21:39:11 UTC; cg334 |
| Author: | Charlie Gao |
| Maintainer: | Charlie Gao <charlie.gao@posit.co> |
| Repository: | CRAN |
| Date/Publication: | 2026-01-08 11:50:11 UTC |
secretbase: Cryptographic Hash, Extendable-Output and Binary Encoding Functions
Description
Fast and memory-efficient streaming hash functions, binary encoding and serialization. Hashes strings and raw vectors directly. Stream hashes files which can be larger than memory, as well as in-memory objects through R's serialization mechanism. Implements the SHA-256, SHA-3 and 'Keccak' cryptographic hash functions, SHAKE256 extendable-output function (XOF), 'SipHash' pseudo-random function, base64 and base58 encoding, and 'CBOR' serialization.
Author(s)
Maintainer: Charlie Gao charlie.gao@posit.co (ORCID)
Other contributors:
Posit Software, PBC (ROR) [copyright holder, funder]
Hibiki AI Limited [copyright holder]
See Also
Useful links:
Report bugs at https://github.com/shikokuchuo/secretbase/issues
Base58 Decode
Description
Decodes a character string or raw vector from base58 encoding with checksum.
Usage
base58dec(x, convert = TRUE)
Arguments
x |
a character string or raw vector containing base58 encoded data. |
convert |
logical |
Details
The 4-byte checksum suffix is verified using double SHA-256 and an error is raised if validation fails. Note: does not expect a version byte prefix (unlike Bitcoin Base58Check).
The value of convert should be set to TRUE, FALSE or NA to be the
reverse of the 3 encoding operations (for strings, raw vectors and arbitrary
objects), in order to return the original object.
Value
A character string, raw vector, or other object depending on the
value of convert.
References
This implementation is based on 'libbase58' by Luke Dashjr under the MIT licence at https://github.com/luke-jr/libbase58.
See Also
Examples
base58dec(base58enc("secret base"))
base58dec(base58enc(as.raw(c(1L, 2L, 4L))), convert = FALSE)
base58dec(base58enc(data.frame()), convert = NA)
Base58 Encode
Description
Encodes a character string, raw vector or other object to base58 encoding with a 4-byte checksum suffix.
Usage
base58enc(x, convert = TRUE)
Arguments
x |
an object. |
convert |
logical |
Details
Adds a 4-byte checksum suffix (double SHA-256) to the data before base58 encoding. Note: does not include a version byte prefix (unlike Bitcoin Base58Check).
A character string or raw vector (with no attributes) is encoded as is, whilst all other objects are first serialized (using R serialisation version 3, big-endian representation).
Value
A character string or raw vector depending on the value of convert.
References
This implementation is based on 'libbase58' by Luke Dashjr under the MIT licence at https://github.com/luke-jr/libbase58.
See Also
Examples
base58enc("secret base")
base58enc(as.raw(c(1L, 2L, 4L)), convert = FALSE)
base58enc(data.frame())
Base64 Decode
Description
Decodes a character string, raw vector or other object from base64 encoding.
Usage
base64dec(x, convert = TRUE)
Arguments
x |
an object. |
convert |
logical |
Details
The value of convert should be set to TRUE, FALSE or NA to be the
reverse of the 3 encoding operations (for strings, raw vectors and arbitrary
objects), in order to return the original object.
Value
A character string, raw vector, or other object depending on the
value of convert.
References
This implementation is based that by 'The Mbed TLS Contributors' under the 'Mbed TLS' Trusted Firmware Project at https://www.trustedfirmware.org/projects/mbed-tls.
See Also
Examples
base64dec(base64enc("secret base"))
base64dec(base64enc(as.raw(c(1L, 2L, 4L))), convert = FALSE)
base64dec(base64enc(data.frame()), convert = NA)
Base64 Encode
Description
Encodes a character string, raw vector or other object to base64 encoding.
Usage
base64enc(x, convert = TRUE)
Arguments
x |
an object. |
convert |
logical |
Details
A character string or raw vector (with no attributes) is encoded as is, whilst all other objects are first serialized (using R serialisation version 3, big-endian representation).
Value
A character string or raw vector depending on the value of convert.
References
This implementation is based that by 'The Mbed TLS Contributors' under the 'Mbed TLS' Trusted Firmware Project at https://www.trustedfirmware.org/projects/mbed-tls.
See Also
Examples
base64enc("secret base")
base64enc(as.raw(c(1L, 2L, 4L)), convert = FALSE)
base64enc(data.frame())
CBOR Decode
Description
Decode CBOR (Concise Binary Object Representation, RFC 8949) data to an R object.
Usage
cbordec(x)
Arguments
x |
A raw vector containing CBOR-encoded data. |
Details
CBOR types map to R types as follows:
Integers: integer (if within range) or double
Float16/Float32/Float64: double
Byte strings: raw vectors
Text strings: character
false/true: logical
null: NULL
undefined: NA
Arrays: lists
Maps: named lists (keys must be text strings)
Value
The decoded R object.
See Also
Examples
# Round-trip encoding
original <- list(a = 1L, b = "test", c = TRUE)
cbordec(cborenc(original))
CBOR Encode
Description
Encode an R object to CBOR (Concise Binary Object Representation, RFC 8949) format.
Usage
cborenc(x)
Arguments
x |
R object to encode. Supported types: NULL, logical, integer, double, character, raw vectors, and lists (named lists become CBOR maps, unnamed become CBOR arrays). |
Details
This implementation supports a minimal CBOR subset:
Unsigned and negative integers
Float64
Byte strings (raw vectors)
Text strings (UTF-8)
Simple values: false, true, null, undefined
Arrays (unnamed lists/vectors)
Maps (named lists)
Scalars (length-1 vectors without attributes) encode as their CBOR scalar equivalents. Vectors with length > 1 or attributes encode as CBOR arrays. NA values encode as CBOR undefined (which decodes back to NA).
Value
A raw vector containing the CBOR-encoded data.
See Also
Examples
# Encode a named list (becomes CBOR map)
cborenc(list(a = 1L, b = "hello"))
# Round-trip
cbordec(cborenc(list(x = TRUE, y = as.raw(1:3))))
Keccak Cryptographic Hash Algorithms
Description
Returns a Keccak hash of the supplied object or file.
Usage
keccak(x, bits = 256L, convert = TRUE, file)
Arguments
x |
object to hash. A character string or raw vector (without attributes) is hashed as is. All other objects are stream hashed using native R serialization. |
bits |
integer output size of the returned hash. Must be one of |
convert |
logical |
file |
character file name / path. If specified, |
Value
A character string, raw or integer vector depending on convert.
R Serialization Stream Hashing
Where this is used, serialization is always version 3 big-endian representation and the headers (containing R version and native encoding information) are skipped to ensure portability across platforms.
As hashing is performed in a streaming fashion, there is no materialization of, or memory allocation for, the serialized object.
References
Keccak is the underlying algorithm for SHA-3, and is identical apart from the value of the padding parameter.
The Keccak algorithm was designed by G. Bertoni, J. Daemen, M. Peeters and G. Van Assche.
This implementation is based on one by 'The Mbed TLS Contributors' under the 'Mbed TLS' Trusted Firmware Project at https://www.trustedfirmware.org/projects/mbed-tls.
Examples
# Keccak-256 hash as character string:
keccak("secret base")
# Keccak-256 hash as raw vector:
keccak("secret base", convert = FALSE)
# Keccak-224 hash as character string:
keccak("secret base", bits = 224)
# Keccak-384 hash as character string:
keccak("secret base", bits = 384)
# Keccak-512 hash as character string:
keccak("secret base", bits = 512)
# Keccak-256 hash a file:
file <- tempfile(); cat("secret base", file = file)
keccak(file = file)
unlink(file)
SHA-256 Cryptographic Hash Algorithm
Description
Returns a SHA-256 hash of the supplied object or file, or HMAC if a secret key is supplied.
Usage
sha256(x, key = NULL, convert = TRUE, file)
Arguments
x |
object to hash. A character string or raw vector (without attributes) is hashed as is. All other objects are stream hashed using native R serialization. |
key |
if |
convert |
logical |
file |
character file name / path. If specified, |
Value
A character string, raw or integer vector depending on convert.
R Serialization Stream Hashing
Where this is used, serialization is always version 3 big-endian representation and the headers (containing R version and native encoding information) are skipped to ensure portability across platforms.
As hashing is performed in a streaming fashion, there is no materialization of, or memory allocation for, the serialized object.
References
The SHA-256 Secure Hash Standard was published by the National Institute of Standards and Technology (NIST) in 2002 at https://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf.
This implementation is based on one by 'The Mbed TLS Contributors' under the 'Mbed TLS' Trusted Firmware Project at https://www.trustedfirmware.org/projects/mbed-tls.
Examples
# SHA-256 hash as character string:
sha256("secret base")
# SHA-256 hash as raw vector:
sha256("secret base", convert = FALSE)
# SHA-256 hash a file:
file <- tempfile(); cat("secret base", file = file)
sha256(file = file)
unlink(file)
# SHA-256 HMAC using a character string secret key:
sha256("secret", key = "base")
# SHA-256 HMAC using a raw vector secret key:
sha256("secret", key = charToRaw("base"))
SHA-3 Cryptographic Hash Algorithms
Description
Returns a SHA-3 hash of the supplied object or file.
Usage
sha3(x, bits = 256L, convert = TRUE, file)
Arguments
x |
object to hash. A character string or raw vector (without attributes) is hashed as is. All other objects are stream hashed using native R serialization. |
bits |
integer output size of the returned hash. Must be one of |
convert |
logical |
file |
character file name / path. If specified, |
Value
A character string, raw or integer vector depending on convert.
R Serialization Stream Hashing
Where this is used, serialization is always version 3 big-endian representation and the headers (containing R version and native encoding information) are skipped to ensure portability across platforms.
As hashing is performed in a streaming fashion, there is no materialization of, or memory allocation for, the serialized object.
References
The SHA-3 Secure Hash Standard was published by the National Institute of Standards and Technology (NIST) in 2015 at doi:10.6028/NIST.FIPS.202.
This implementation is based on one by 'The Mbed TLS Contributors' under the 'Mbed TLS' Trusted Firmware Project at https://www.trustedfirmware.org/projects/mbed-tls.
Examples
# SHA3-256 hash as character string:
sha3("secret base")
# SHA3-256 hash as raw vector:
sha3("secret base", convert = FALSE)
# SHA3-224 hash as character string:
sha3("secret base", bits = 224)
# SHA3-384 hash as character string:
sha3("secret base", bits = 384)
# SHA3-512 hash as character string:
sha3("secret base", bits = 512)
# SHA3-256 hash a file:
file <- tempfile(); cat("secret base", file = file)
sha3(file = file)
unlink(file)
SHAKE256 Extendable Output Function
Description
Returns a SHAKE256 hash of the supplied object or file.
Usage
shake256(x, bits = 256L, convert = TRUE, file)
Arguments
x |
object to hash. A character string or raw vector (without attributes) is hashed as is. All other objects are stream hashed using native R serialization. |
bits |
integer output size of the returned hash. Value must be between
|
convert |
logical |
file |
character file name / path. If specified, |
Details
To produce single integer values suitable for use as random seeds for R's
pseudo random number generators (RNGs), set bits to 32 and convert to
NA.
Value
A character string, raw or integer vector depending on convert.
R Serialization Stream Hashing
Where this is used, serialization is always version 3 big-endian representation and the headers (containing R version and native encoding information) are skipped to ensure portability across platforms.
As hashing is performed in a streaming fashion, there is no materialization of, or memory allocation for, the serialized object.
References
This implementation is based on one by 'The Mbed TLS Contributors' under the 'Mbed TLS' Trusted Firmware Project at https://www.trustedfirmware.org/projects/mbed-tls.
Examples
# SHAKE256 hash as character string:
shake256("secret base")
# SHAKE256 hash as raw vector:
shake256("secret base", convert = FALSE)
# SHAKE256 hash to integer:
shake256("secret base", bits = 32L, convert = NA)
# SHAKE256 hash a file:
file <- tempfile(); cat("secret base", file = file)
shake256(file = file)
unlink(file)
SipHash Pseudorandom Function
Description
Returns a fast, cryptographically-strong SipHash keyed hash of the supplied object or file. SipHash-1-3 is optimised for performance. Note: SipHash is not a cryptographic hash algorithm.
Usage
siphash13(x, key = NULL, convert = TRUE, file)
Arguments
x |
object to hash. A character string or raw vector (without attributes) is hashed as is. All other objects are stream hashed using native R serialization. |
key |
a character string or raw vector comprising the 16 byte (128 bit)
key data, or else |
convert |
logical |
file |
character file name / path. If specified, |
Value
A character string, raw or integer vector depending on convert.
R Serialization Stream Hashing
Where this is used, serialization is always version 3 big-endian representation and the headers (containing R version and native encoding information) are skipped to ensure portability across platforms.
As hashing is performed in a streaming fashion, there is no materialization of, or memory allocation for, the serialized object.
References
The SipHash family of cryptographically-strong pseudorandom functions (PRFs) are described in 'SipHash: a fast short-input PRF', Jean-Philippe Aumasson and Daniel J. Bernstein, Paper 2012/351, 2012, Cryptology ePrint Archive at https://ia.cr/2012/351.
This implementation is based on the SipHash streaming implementation by Daniele Nicolodi, David Rheinsberg and Tom Gundersen at https://github.com/c-util/c-siphash. This is in turn based on the SipHash reference implementation by Jean-Philippe Aumasson and Daniel J. Bernstein released to the public domain at https://github.com/veorq/SipHash.
Examples
# SipHash-1-3 hash as character string:
siphash13("secret base")
# SipHash-1-3 hash as raw vector:
siphash13("secret base", convert = FALSE)
# SipHash-1-3 hash using a character string key:
siphash13("secret", key = "base")
# SipHash-1-3 hash using a raw vector key:
siphash13("secret", key = charToRaw("base"))
# SipHash-1-3 hash a file:
file <- tempfile(); cat("secret base", file = file)
siphash13(file = file)
unlink(file)