From 389892f8ad5700b152d20948ded9c540b2cdaff8 Mon Sep 17 00:00:00 2001 From: Paul Kehrer Date: Wed, 16 Oct 2013 13:20:50 -0500 Subject: update docs to roughly describe many time pad attack & link cbc --- docs/primitives/symmetric-encryption.rst | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) (limited to 'docs/primitives') diff --git a/docs/primitives/symmetric-encryption.rst b/docs/primitives/symmetric-encryption.rst index 52bd6a40..9520d6eb 100644 --- a/docs/primitives/symmetric-encryption.rst +++ b/docs/primitives/symmetric-encryption.rst @@ -87,8 +87,11 @@ Modes message). Must be the same number of bytes as the ``block_size`` of the cipher. It is critical to never reuse a ``nonce`` with a given ``key``. Unlike - CBC, reusing a nonce compromises the security of - all data encrypted under the key (see: two time pad). + :class:`~cryptography.primitives.block.modes.CBC`, + reusing a nonce compromises the security of all data + encrypted under the key. Specifically, + (pt1 xor keystream) xor (pt2 xor keystream) is + equivalent to (pt1 xor pt2). .. class:: cryptography.primitives.block.modes.OFB(initialization_vector) -- cgit v1.2.3