diff options
author | Paul Kehrer <paul.l.kehrer@gmail.com> | 2013-10-16 08:46:50 -0500 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2013-10-17 11:38:32 -0500 |
commit | d0ec60e7d671bb1f927cd711949d95441d947933 (patch) | |
tree | 98cd623e89a7569d9eaf552d903766502e98c850 /docs/primitives | |
parent | 169dee88faa7c46b5551b89cf97a1b30c0a1c6ea (diff) | |
download | cryptography-d0ec60e7d671bb1f927cd711949d95441d947933.tar.gz cryptography-d0ec60e7d671bb1f927cd711949d95441d947933.tar.bz2 cryptography-d0ec60e7d671bb1f927cd711949d95441d947933.zip |
AES Counter support
* vectors from RFC 3686
* Documentation for the mode
Diffstat (limited to 'docs/primitives')
-rw-r--r-- | docs/primitives/symmetric-encryption.rst | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/docs/primitives/symmetric-encryption.rst b/docs/primitives/symmetric-encryption.rst index c4bbf0a5..52bd6a40 100644 --- a/docs/primitives/symmetric-encryption.rst +++ b/docs/primitives/symmetric-encryption.rst @@ -77,6 +77,19 @@ Modes reuse an ``initialization_vector`` with a given ``key``. +.. class:: cryptography.primitives.block.modes.CTR(nonce) + + CTR (Counter) is a mode of operation for block ciphers. It is considered + cryptographically strong. + + :param bytes nonce: Must be random bytes. They do not need to be kept + secret (they can be included in a transmitted + message). Must be the same number of bytes as the + ``block_size`` of the cipher. It is critical to + never reuse a ``nonce`` with a given ``key``. Unlike + CBC, reusing a nonce compromises the security of + all data encrypted under the key (see: two time pad). + .. class:: cryptography.primitives.block.modes.OFB(initialization_vector) OFB (Output Feedback) is a mode of operation for block ciphers. It |