update docs
This commit is contained in:
parent
25cb1f081d
commit
91b12452d6
24
man/ccr.1
24
man/ccr.1
|
@ -48,7 +48,7 @@ message signer or details about why decryption or verification fails.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-a\fR, \fB\-\-armor\fR
|
\fB\-a\fR, \fB\-\-armor\fR
|
||||||
Where expecting input or output of data in codecrypt communication format, use
|
Where expecting input or output of data in Codecrypt communication format, use
|
||||||
ascii-armoring.
|
ascii-armoring.
|
||||||
|
|
||||||
Codecrypt otherwise usually generates raw binary data, that are very hard to
|
Codecrypt otherwise usually generates raw binary data, that are very hard to
|
||||||
|
@ -351,13 +351,25 @@ can rename or delete more keys at once. Used cryptography is relatively new,
|
||||||
therefore be sure to verify current state of cryptanalysis before you put your
|
therefore be sure to verify current state of cryptanalysis before you put your
|
||||||
data at risk.
|
data at risk.
|
||||||
|
|
||||||
|
.SS On-line use and side channels
|
||||||
|
|
||||||
|
Codecrypt does not do much to prevent attacks that rely on side channels that
|
||||||
|
are common on the internet. IF YOU DESPERATELY NEED TO PUT CODECRYPT TO E.G.
|
||||||
|
AN ON-LINE SERVICE, MAKE SURE THAT ANY POTENTIAL ATTACKER CAN NOT ACCESS THE SIDE
|
||||||
|
CHANNELS: Never execute Codecrypt directly from the server software. Sanitize
|
||||||
|
BOTH the input and output of Codecrypt. Make any way to gather usable
|
||||||
|
statistics about the running time of Codecrypt impossible. Make it hard for
|
||||||
|
anyone to collect side-channel information, and, in particular, ensure that
|
||||||
|
your application does not allow to repeatedly run Codecrypt in a way that makes
|
||||||
|
it fail on invalid or damaged outputs, or produces any statistical
|
||||||
|
information about timings and failures of the runs.
|
||||||
|
|
||||||
.SS Current state of cryptanalysis
|
.SS Current state of cryptanalysis
|
||||||
|
|
||||||
In a fashion similar to aforementioned `new cryptography', the original
|
In a fashion similar to aforementioned `new cryptography', the original
|
||||||
algebraic variant of quasi-dyadic McEliece that is still in codecrypt (MCEQD*
|
algebraic variant of quasi-dyadic McEliece that was in Codecrypt has been
|
||||||
algorithms, kept for compatibility purposes) has been broken by an algebraic
|
broken by an algebraic attack. Security was greatly reduced. Use the QC-MDPC
|
||||||
attack. Security is greatly reduced. Use the QC-MDPC variant which dodges
|
variant which dodges similar attacks.
|
||||||
similar attacks.
|
|
||||||
|
|
||||||
.SS Large files
|
.SS Large files
|
||||||
|
|
||||||
|
@ -512,7 +524,7 @@ ccr -L -S symkey2 -w @xsynd,cube512
|
||||||
|
|
||||||
.SH DISCLAIMER
|
.SH DISCLAIMER
|
||||||
|
|
||||||
Used cryptography is relatively new. For this reason, codecrypt eats data. Use
|
Used cryptography is relatively new. For this reason, Codecrypt eats data. Use
|
||||||
it with caution.
|
it with caution.
|
||||||
|
|
||||||
.SH AUTHORS
|
.SH AUTHORS
|
||||||
|
|
Loading…
Reference in a new issue