diff options
author | Paul Kehrer <paul.l.kehrer@gmail.com> | 2013-10-30 16:57:04 -0500 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2013-10-31 13:35:26 -0500 |
commit | 5df0abe1fe49c13d628a088c0caee2f6eed88a99 (patch) | |
tree | 1e9827409da2a88b4247b50a4563726cc1917e51 | |
parent | 6b7610d240b99c93c3f41fa4868eb0bcc3fa8a2b (diff) | |
download | cryptography-5df0abe1fe49c13d628a088c0caee2f6eed88a99.tar.gz cryptography-5df0abe1fe49c13d628a088c0caee2f6eed88a99.tar.bz2 cryptography-5df0abe1fe49c13d628a088c0caee2f6eed88a99.zip |
add bf docs
-rw-r--r-- | docs/hazmat/primitives/symmetric-encryption.rst | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/docs/hazmat/primitives/symmetric-encryption.rst b/docs/hazmat/primitives/symmetric-encryption.rst index 1e047b7c..94d58eee 100644 --- a/docs/hazmat/primitives/symmetric-encryption.rst +++ b/docs/hazmat/primitives/symmetric-encryption.rst @@ -107,6 +107,15 @@ Ciphers ``56`` bits long), they can simply be concatenated to produce the full key. This must be kept secret. +.. class:: Blowfish(key) + + Blowfish is a block cipher developed by Bruce Schneier. It is known to be + susceptible to attacks when using weak keys. The author has recommended + that users of Blowfish move to newer algorithms like AES. + + :param bytes key: The secret key, 32-448 bits in length (in increments of + 8). This must be kept secret. + Modes ~~~~~ |