From 0ba2f9464693fe7ae0167eb47df9b1a96408ed9c Mon Sep 17 00:00:00 2001 From: Paul Kehrer Date: Thu, 17 Oct 2013 12:06:46 -0500 Subject: remove confusing explanation about reusing nonce in counter mode docs --- docs/primitives/symmetric-encryption.rst | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) (limited to 'docs/primitives') diff --git a/docs/primitives/symmetric-encryption.rst b/docs/primitives/symmetric-encryption.rst index 9520d6eb..21421d16 100644 --- a/docs/primitives/symmetric-encryption.rst +++ b/docs/primitives/symmetric-encryption.rst @@ -89,9 +89,7 @@ Modes never reuse a ``nonce`` with a given ``key``. Unlike :class:`~cryptography.primitives.block.modes.CBC`, reusing a nonce compromises the security of all data - encrypted under the key. Specifically, - (pt1 xor keystream) xor (pt2 xor keystream) is - equivalent to (pt1 xor pt2). + encrypted under the key. .. class:: cryptography.primitives.block.modes.OFB(initialization_vector) -- cgit v1.2.3