diff options
author | Alex Gaynor <alex.gaynor@gmail.com> | 2013-10-31 15:59:41 -0700 |
---|---|---|
committer | Alex Gaynor <alex.gaynor@gmail.com> | 2013-10-31 15:59:41 -0700 |
commit | 0419e5ef5f8b4f068cc30e006c55158de914c366 (patch) | |
tree | d5f107bbb50842ab5bb61622b7c853f91d240da7 /docs/hazmat/primitives | |
parent | 6183977b8bcad36902c7ce73f63771a4efdee83f (diff) | |
parent | 3446d8103af433b0241b93850f2ff140eaf3cb11 (diff) | |
download | cryptography-0419e5ef5f8b4f068cc30e006c55158de914c366.tar.gz cryptography-0419e5ef5f8b4f068cc30e006c55158de914c366.tar.bz2 cryptography-0419e5ef5f8b4f068cc30e006c55158de914c366.zip |
Merge pull request #201 from reaperhulk/bf-support
Blowfish Support
Diffstat (limited to 'docs/hazmat/primitives')
-rw-r--r-- | docs/hazmat/primitives/symmetric-encryption.rst | 19 |
1 files changed, 19 insertions, 0 deletions
diff --git a/docs/hazmat/primitives/symmetric-encryption.rst b/docs/hazmat/primitives/symmetric-encryption.rst index 1e047b7c..31ceea8a 100644 --- a/docs/hazmat/primitives/symmetric-encryption.rst +++ b/docs/hazmat/primitives/symmetric-encryption.rst @@ -107,6 +107,25 @@ Ciphers ``56`` bits long), they can simply be concatenated to produce the full key. This must be kept secret. +Weak Ciphers +------------ + +.. warning:: + + These ciphers are considered weak for a variety of reasons. New + applications should avoid their use and existing applications should + strongly consider migrating away. + +.. class:: Blowfish(key) + + Blowfish is a block cipher developed by Bruce Schneier. It is known to be + susceptible to attacks when using weak keys. The author has recommended + that users of Blowfish move to newer algorithms like + :class:`AES`. + + :param bytes key: The secret key, 32-448 bits in length (in increments of + 8). This must be kept secret. + Modes ~~~~~ |