diff options
author | Paul Kehrer <paul.l.kehrer@gmail.com> | 2013-10-16 13:20:50 -0500 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2013-10-17 11:38:34 -0500 |
commit | 389892f8ad5700b152d20948ded9c540b2cdaff8 (patch) | |
tree | e72acedc2ca07b488c356b6289bd996dc3fa276a | |
parent | d0ec60e7d671bb1f927cd711949d95441d947933 (diff) | |
download | cryptography-389892f8ad5700b152d20948ded9c540b2cdaff8.tar.gz cryptography-389892f8ad5700b152d20948ded9c540b2cdaff8.tar.bz2 cryptography-389892f8ad5700b152d20948ded9c540b2cdaff8.zip |
update docs to roughly describe many time pad attack & link cbc
-rw-r--r-- | docs/primitives/symmetric-encryption.rst | 7 |
1 files changed, 5 insertions, 2 deletions
diff --git a/docs/primitives/symmetric-encryption.rst b/docs/primitives/symmetric-encryption.rst index 52bd6a40..9520d6eb 100644 --- a/docs/primitives/symmetric-encryption.rst +++ b/docs/primitives/symmetric-encryption.rst @@ -87,8 +87,11 @@ Modes message). Must be the same number of bytes as the ``block_size`` of the cipher. It is critical to never reuse a ``nonce`` with a given ``key``. Unlike - CBC, reusing a nonce compromises the security of - all data encrypted under the key (see: two time pad). + :class:`~cryptography.primitives.block.modes.CBC`, + reusing a nonce compromises the security of all data + encrypted under the key. Specifically, + (pt1 xor keystream) xor (pt2 xor keystream) is + equivalent to (pt1 xor pt2). .. class:: cryptography.primitives.block.modes.OFB(initialization_vector) |