From 5df0abe1fe49c13d628a088c0caee2f6eed88a99 Mon Sep 17 00:00:00 2001 From: Paul Kehrer Date: Wed, 30 Oct 2013 16:57:04 -0500 Subject: add bf docs --- docs/hazmat/primitives/symmetric-encryption.rst | 9 +++++++++ 1 file changed, 9 insertions(+) (limited to 'docs/hazmat/primitives') diff --git a/docs/hazmat/primitives/symmetric-encryption.rst b/docs/hazmat/primitives/symmetric-encryption.rst index 1e047b7c..94d58eee 100644 --- a/docs/hazmat/primitives/symmetric-encryption.rst +++ b/docs/hazmat/primitives/symmetric-encryption.rst @@ -107,6 +107,15 @@ Ciphers ``56`` bits long), they can simply be concatenated to produce the full key. This must be kept secret. +.. class:: Blowfish(key) + + Blowfish is a block cipher developed by Bruce Schneier. It is known to be + susceptible to attacks when using weak keys. The author has recommended + that users of Blowfish move to newer algorithms like AES. + + :param bytes key: The secret key, 32-448 bits in length (in increments of + 8). This must be kept secret. + Modes ~~~~~ -- cgit v1.2.3 From 3446d8103af433b0241b93850f2ff140eaf3cb11 Mon Sep 17 00:00:00 2001 From: Paul Kehrer Date: Thu, 31 Oct 2013 17:15:03 -0500 Subject: move blowfish docs to new weak ciphers section, linkify aes --- docs/hazmat/primitives/symmetric-encryption.rst | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) (limited to 'docs/hazmat/primitives') diff --git a/docs/hazmat/primitives/symmetric-encryption.rst b/docs/hazmat/primitives/symmetric-encryption.rst index 94d58eee..31ceea8a 100644 --- a/docs/hazmat/primitives/symmetric-encryption.rst +++ b/docs/hazmat/primitives/symmetric-encryption.rst @@ -107,11 +107,21 @@ Ciphers ``56`` bits long), they can simply be concatenated to produce the full key. This must be kept secret. +Weak Ciphers +------------ + +.. warning:: + + These ciphers are considered weak for a variety of reasons. New + applications should avoid their use and existing applications should + strongly consider migrating away. + .. class:: Blowfish(key) Blowfish is a block cipher developed by Bruce Schneier. It is known to be susceptible to attacks when using weak keys. The author has recommended - that users of Blowfish move to newer algorithms like AES. + that users of Blowfish move to newer algorithms like + :class:`AES`. :param bytes key: The secret key, 32-448 bits in length (in increments of 8). This must be kept secret. -- cgit v1.2.3