Latest 1.2.0-rc4
License Copyright Copyright 2018 Google
Platforms ios 9.0
Dependencies BoringSSL, rapidjson
Ubuntu macOS
Kokoro Ubuntu Kokoro macOS


Using crypto in your application shouldn’t have

feel like juggling chainsaws in the dark. Tink is a crypto library written by a
group of cryptographers and security engineers at Google. It was born out of
our extensive experience working with Google’s product teams, fixing
weaknesses in implementations
, and
providing simple APIs that can be used safely without needing a crypto

Tink provides secure APIs that are easy to use correctly. It reduces common
crypto pitfalls with user-centered design, careful implementation and code
reviews, and extensive testing. You can add features like encryption, decryption
and signing to your application with Tink – the same library AdMob, Google Pay,
the Android Search App and several Google products also use to secure their

Getting started

TIP The easiest way to get started with Tink is to install
Bazel, then build, run
and play with the hello world examples.

Tink performs cryptographic tasks via so-called primitives,
each of which is defined via a corresponding interface that specifies the
functionality of the primitive. For example, symmetric key encryption is
offered via an AEAD-primitive (Authenticated Encryption with Associated
, that
supports two operations:

  • encrypt(plaintext, associated_data), which encrypts the given plaintext
    (using associated_data as additional AEAD-input) and returns the resulting
  • decrypt(ciphertext, associated_data), which decrypts the given
    ciphertext (using associated_data as additional AEAD-input) and returns
    the resulting plaintext

Before implementations of primitives can be used, they must be registered at
runtime with Tink, so that Tink "knows" the desired implementations. Here’s how
you can register all implementations of all primitives in Tink:



After implementations of primitives have been registered, the basic use of Tink
proceeds in three steps:

  1. Load or generate the cryptographic key material (a Keyset in Tink terms).
  2. Use the key material to get an instance of the chosen primitive.
  3. Use that primitive to accomplish the cryptographic task.

Here is how these steps would look like when encrypting or decrypting with an
AEAD primitive in Java:


    // 1. Generate the key material.
    KeysetHandle keysetHandle = KeysetHandle.generateNew(

    // 2. Get the primitive.
    Aead aead = AeadFactory.getPrimitive(keysetHandle);

    // 3. Use the primitive.
    byte[] ciphertext = aead.encrypt(plaintext, aad);

Current Status

Learn More

Contact and mailing list

If you want to contribute, please read CONTRIBUTING
and send us pull requests. You can also report bugs or file feature requests.

If you’d like to talk to the developers or get notified about major new tests,
you may want to subscribe to our mailing
. To join, simply send
an empty email to [email protected]


Tink is maintained by (A-Z):

  • Haris Andrianakis
  • Daniel Bleichenbacher
  • Thai Duong
  • Charles Lee
  • Quan Nguyen
  • Bartosz Przydatek

Latest podspec

    "authors": "Google, Inc.",
    "dependencies": {
        "BoringSSL": "~> 10.0.5",
        "rapidjson": "~> 1.1.0"
    "description": "Tink is a crypto library that provides simple and secure APIs that can be used safely without needing a crypto background.",
    "homepage": "",
    "libraries": [
    "license": {
        "text": "Copyright 2018 Google",
        "type": "Copyright"
    "name": "Tink",
    "platforms": {
        "ios": "9.0"
    "preserve_paths": [
    "source": {
        "http": ""
    "summary": "Tink Crypto Library",
    "vendored_frameworks": [
    "version": "1.2.0-rc4"

Pin It on Pinterest

Share This