aboutsummaryrefslogtreecommitdiffstats
path: root/docs/hazmat
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2013-11-20 21:27:00 -0600
committerPaul Kehrer <paul.l.kehrer@gmail.com>2013-11-29 17:19:45 -0600
commit22e80cb96e034679750a38702aaa55e30da05f69 (patch)
treea8fa871f152c83c03033f1dab8fed319eb3ec239 /docs/hazmat
parentbdb6debe4a9a3ccba6648c56028f849c0e5b6a12 (diff)
downloadcryptography-22e80cb96e034679750a38702aaa55e30da05f69.tar.gz
cryptography-22e80cb96e034679750a38702aaa55e30da05f69.tar.bz2
cryptography-22e80cb96e034679750a38702aaa55e30da05f69.zip
GCM support
Diffstat (limited to 'docs/hazmat')
-rw-r--r--docs/hazmat/primitives/symmetric-encryption.rst48
1 files changed, 48 insertions, 0 deletions
diff --git a/docs/hazmat/primitives/symmetric-encryption.rst b/docs/hazmat/primitives/symmetric-encryption.rst
index edf3c050..5b249c06 100644
--- a/docs/hazmat/primitives/symmetric-encryption.rst
+++ b/docs/hazmat/primitives/symmetric-encryption.rst
@@ -118,6 +118,27 @@ an "encrypt-then-MAC" formulation as `described by Colin Percival`_.
:meth:`update` and :meth:`finalize` will raise
:class:`~cryptography.exceptions.AlreadyFinalized`.
+.. class:: AEADCipherContext
+
+ When calling ``encryptor()`` or ``decryptor()`` on a ``Cipher`` object
+ with an AEAD mode you will receive a return object conforming to the
+ ``AEADCipherContext`` interface in addition to the ``CipherContext``
+ interface. ``AEADCipherContext`` contains an additional method ``add_data``
+ for adding additional authenticated by non-encrypted data. You should call
+ this before calls to ``update``. When you are done call ``finalize()`` to
+ finish the operation. Once this is complete you can obtain the tag value
+ from the ``tag`` property.
+
+ .. method:: add_data(data)
+
+ :param bytes data: The data you wish to authenticate but not encrypt.
+ :raises: :class:`~cryptography.exceptions.AlreadyFinalized`
+
+ .. method:: tag
+
+ :return bytes: Returns the tag value as bytes.
+ :raises: :class:`~cryptography.exceptions.NotFinalized`
+
.. _symmetric-encryption-algorithms:
Algorithms
@@ -295,6 +316,33 @@ Modes
reuse an ``initialization_vector`` with
a given ``key``.
+.. class:: GCM(initialization_vector, tag=None)
+
+ GCM (Galois Counter Mode) is a mode of operation for block ciphers. It
+ is an AEAD (authenticated encryption with additional data) mode.
+
+ :param bytes initialization_vector: Must be random bytes. They do not need
+ to be kept secret (they can be included
+ in a transmitted message). Recommended
+ to be 96-bit by NIST, but can be up to
+ 2\ :sup:`64` - 1 bits. Do not reuse an
+ ``initialization_vector`` with a given
+ ``key``.
+
+ .. doctest::
+
+ >>> from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
+ >>> cipher = Cipher(algorithms.AES(key), modes.GCM(iv))
+ >>> encryptor = cipher.encryptor()
+ >>> encryptor.add_data(b"authenticated but encrypted payload")
+ >>> ct = encryptor.update(b"a secret message") + encryptor.finalize()
+ >>> tag = encryptor.tag
+ >>> cipher = Cipher(algorithms.AES(key), modes.GCM(iv, tag))
+ >>> decryptor = cipher.decryptor()
+ >>> decryptor.add_data(b"authenticated but encrypted payload")
+ >>> decryptor.update(ct) + decryptor.finalize()
+ 'a secret message'
+
Insecure Modes
--------------