aboutsummaryrefslogtreecommitdiffstats
path: root/docs/primitives/symmetric-encryption.rst
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2013-10-16 13:20:50 -0500
committerPaul Kehrer <paul.l.kehrer@gmail.com>2013-10-17 11:38:34 -0500
commit389892f8ad5700b152d20948ded9c540b2cdaff8 (patch)
treee72acedc2ca07b488c356b6289bd996dc3fa276a /docs/primitives/symmetric-encryption.rst
parentd0ec60e7d671bb1f927cd711949d95441d947933 (diff)
downloadcryptography-389892f8ad5700b152d20948ded9c540b2cdaff8.tar.gz
cryptography-389892f8ad5700b152d20948ded9c540b2cdaff8.tar.bz2
cryptography-389892f8ad5700b152d20948ded9c540b2cdaff8.zip
update docs to roughly describe many time pad attack & link cbc
Diffstat (limited to 'docs/primitives/symmetric-encryption.rst')
-rw-r--r--docs/primitives/symmetric-encryption.rst7
1 files changed, 5 insertions, 2 deletions
diff --git a/docs/primitives/symmetric-encryption.rst b/docs/primitives/symmetric-encryption.rst
index 52bd6a40..9520d6eb 100644
--- a/docs/primitives/symmetric-encryption.rst
+++ b/docs/primitives/symmetric-encryption.rst
@@ -87,8 +87,11 @@ Modes
message). Must be the same number of bytes as the
``block_size`` of the cipher. It is critical to
never reuse a ``nonce`` with a given ``key``. Unlike
- CBC, reusing a nonce compromises the security of
- all data encrypted under the key (see: two time pad).
+ :class:`~cryptography.primitives.block.modes.CBC`,
+ reusing a nonce compromises the security of all data
+ encrypted under the key. Specifically,
+ (pt1 xor keystream) xor (pt2 xor keystream) is
+ equivalent to (pt1 xor pt2).
.. class:: cryptography.primitives.block.modes.OFB(initialization_vector)