documentation/help update
This commit is contained in:
parent
1d605b6873
commit
b3f8f32cb1
|
@ -85,6 +85,7 @@ For completeness I add listing of all options here (also available from
|
||||||
Global options:
|
Global options:
|
||||||
-R, --in input file, default is stdin
|
-R, --in input file, default is stdin
|
||||||
-o, --out output file, default is stdout
|
-o, --out output file, default is stdout
|
||||||
|
-E, --err the same for stderr
|
||||||
-a, --armor use ascii-armored I/O
|
-a, --armor use ascii-armored I/O
|
||||||
-y, --yes assume that answer is `yes' everytime
|
-y, --yes assume that answer is `yes' everytime
|
||||||
|
|
||||||
|
|
63
man/ccr.1
63
man/ccr.1
|
@ -1,4 +1,4 @@
|
||||||
.TH CCR 1 2015-11-07 "ccr" "Codecrypt"
|
.TH CCR 1 2016-01-12 "ccr" "Codecrypt"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
.B ccr
|
.B ccr
|
||||||
\- The post-quantum cryptography encryption and signing tool
|
\- The post-quantum cryptography encryption and signing tool
|
||||||
|
@ -9,7 +9,7 @@
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
|
|
||||||
\fBccr\fR (short of Codecrypt) is a general purpose encryption/decryption
|
\fBccr\fR (short of Codecrypt) is a general purpose encryption/decryption
|
||||||
signing/verification tool that uses only quantum-computer resistant algorithms.
|
signing/verification tool that uses only quantum-computer-resistant algorithms.
|
||||||
|
|
||||||
.SS
|
.SS
|
||||||
General options:
|
General options:
|
||||||
|
@ -35,8 +35,16 @@ Redirect standard input to be read from \fIfile\fR instead from stdin. You can
|
||||||
still specify "-" to force reading from stdin.
|
still specify "-" to force reading from stdin.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-o\fR, \fB\-\-out\fR <\fIfile\fR> Redirect standard output to be written to
|
\fB\-o\fR, \fB\-\-out\fR <\fIfile\fR>
|
||||||
\fIfile\fR. You can specify "-" to force writing to stdout.
|
Redirect standard output to be written to \fIfile\fR. You can specify "-" to
|
||||||
|
force writing to stdout.
|
||||||
|
|
||||||
|
.TP
|
||||||
|
\fB\-E\fR, \fB\-\-err\fR <\fIfile\fR>
|
||||||
|
Redirect the standard error output to \fIfile\fR. You can specify "-" to force
|
||||||
|
writing to stderr. Error output does not carry any data, but provides useful
|
||||||
|
error messages and metadata about what is happening, e.g. the identity of
|
||||||
|
message signer or details about why decryption or verification fails.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-a\fR, \fB\-\-armor\fR
|
\fB\-a\fR, \fB\-\-armor\fR
|
||||||
|
@ -127,8 +135,8 @@ Purpose of the \fB\-\-symmetric\fR option is that symmetric cryptography is a
|
||||||
lot faster than asymmetric, and symmetric primitives usually work also on very
|
lot faster than asymmetric, and symmetric primitives usually work also on very
|
||||||
large files and data streams, as they don't need to be fully copied into
|
large files and data streams, as they don't need to be fully copied into
|
||||||
allocated memory for this purpose. Thus, if working with a large file, process
|
allocated memory for this purpose. Thus, if working with a large file, process
|
||||||
it symmetrically first, then process the resulting small \fIfile\fR
|
it symmetrically first, then sign/encrypt the (tiny) symmetric \fIfile\fR
|
||||||
asym,etrically and send it along with the large file.
|
asymmetrically and send it along with the (possibly encrypted) large file.
|
||||||
|
|
||||||
.SS
|
.SS
|
||||||
Key management:
|
Key management:
|
||||||
|
@ -143,11 +151,11 @@ work with them, and sometimes also attached a private key to form a secret
|
||||||
|
|
||||||
Keys can be specified using several methods:
|
Keys can be specified using several methods:
|
||||||
|
|
||||||
Using KeyID -- the key specification consists of @ and several first characters
|
Using KeyID -- the key specification starts with @ and continues with several
|
||||||
to identify a prefix of KeyID of a single key.
|
first characters of the KeyID that identify a single key with that prefix.
|
||||||
|
|
||||||
Using a name -- key specification consists of string and matches any key, that
|
Using a name -- key specification consists of a string, a key is then matched
|
||||||
has a name that contains that string.
|
if its name contains the specified string. Matching is case-insensitive.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-g\fR, \fB\-\-gen\-key\fR <\fIalgorithm\fR>
|
\fB\-g\fR, \fB\-\-gen\-key\fR <\fIalgorithm\fR>
|
||||||
|
@ -193,7 +201,7 @@ public keys.
|
||||||
.TP
|
.TP
|
||||||
\fB\-f\fR, \fB\-\-fingerprint\fR
|
\fB\-f\fR, \fB\-\-fingerprint\fR
|
||||||
When printing keys, format full KeyIDs. Note that full KeyIDs can be used in
|
When printing keys, format full KeyIDs. Note that full KeyIDs can be used in
|
||||||
similar way as fingerprints known from other cryptosystems.
|
similar way as fingerprints known from other crypto tools.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-p\fR, \fB\-\-export\fR
|
\fB\-p\fR, \fB\-\-export\fR
|
||||||
|
@ -234,10 +242,11 @@ and applying flock(2) to it.
|
||||||
|
|
||||||
.SH RETURN VALUE
|
.SH RETURN VALUE
|
||||||
|
|
||||||
\fBccr\fR returns 0 if there was no error and all cryptography went fine, or 1
|
\fBccr\fR returns exit status 0 if there was no error and all cryptography went
|
||||||
on errors. If the error was that a missing public or private key was needed to
|
fine, or 1 on generic errors. If the error was that a missing hash algorithm or
|
||||||
complete the operation, 2 is returned. If signature verification fails (e.g.
|
a public or private key was needed to complete the operation, 2 is returned. If
|
||||||
the signature is bad or likely forged), the program returns 3.
|
signature or hash verification fails (e.g. the signature is bad or likely
|
||||||
|
forged), the program returns 3.
|
||||||
|
|
||||||
.SH ALGORITHMS
|
.SH ALGORITHMS
|
||||||
|
|
||||||
|
@ -270,15 +279,15 @@ speedup of 2^20 on a scheme with 2^80 bit security (which is fatal) with
|
||||||
getting the same speedup on a scheme with 2^128 security (where the resulting
|
getting the same speedup on a scheme with 2^128 security (where the resulting
|
||||||
2^108 is still strong).
|
2^108 is still strong).
|
||||||
|
|
||||||
For comparison, 2^128 security level is very roughly equivalent to that of
|
For comparison with existing schemes, 2^128 security level is very roughly
|
||||||
classical RSA with 3072bit modulus (which is, accordingly to the best results
|
equivalent to that of classical RSA with 3072bit modulus (which is, accordingly
|
||||||
available in June 2013 for general public, reported to provide roughly 2^112
|
to the best results available in June 2013 for general public, reported to
|
||||||
attack complexity).
|
provide roughly 2^112 attack complexity).
|
||||||
|
|
||||||
For another comparison, a very good idea about the insane amount of energy that
|
For another comparison, a very good idea about the unbelievably insane amount
|
||||||
is actually needed for brute-forcing 2^256 operations can be obtained from
|
of energy that is actually needed for brute-forcing 2^256 operations can be
|
||||||
wikipedia, which estimates the size of whole observable universe (!) to around
|
obtained from Wikipedia, which estimates the size of whole observable universe
|
||||||
2^270 atoms.
|
(!) to around 2^270 atoms.
|
||||||
|
|
||||||
All algorithms are believed to be resistant to quantum-computer-specific
|
All algorithms are believed to be resistant to quantum-computer-specific
|
||||||
attacks, except for the generic case of Grover search which (in a very
|
attacks, except for the generic case of Grover search which (in a very
|
||||||
|
@ -344,7 +353,7 @@ import of keys can bring serious inconsistencies into your key naming scheme.
|
||||||
In a distant universe after much computation, KeyIDs can collide. If you find
|
In a distant universe after much computation, KeyIDs can collide. If you find
|
||||||
someone who has a colliding KeyID, kiss him and generate another key.
|
someone who has a colliding KeyID, kiss him and generate another key.
|
||||||
|
|
||||||
.SH FAQ
|
.SH Troubleshooting/FAQ
|
||||||
|
|
||||||
Q: I can't read/verify messages from versions 1.3.1 and older!
|
Q: I can't read/verify messages from versions 1.3.1 and older!
|
||||||
|
|
||||||
|
@ -358,7 +367,7 @@ A: There was a slight mistake in padding of messages shorter than signature
|
||||||
hash function size (64 bytes in the 256-bit-secure signature types) with no
|
hash function size (64 bytes in the 256-bit-secure signature types) with no
|
||||||
security implications. It was decided not to provide backward compatibility for
|
security implications. It was decided not to provide backward compatibility for
|
||||||
this minor use-case. If you really need to verify such signatures, edit the
|
this minor use-case. If you really need to verify such signatures, edit the
|
||||||
msg_pad function in src/algos_sig.h so that the `load_key()' function os called
|
msg_pad function in src/algos_sig.h so that the `load_key()' function is called
|
||||||
on empty vector instead of `out'.
|
on empty vector instead of `out'.
|
||||||
|
|
||||||
Q: I want to sign/encrypt a large file but it took all my RAM and takes ages!
|
Q: I want to sign/encrypt a large file but it took all my RAM and takes ages!
|
||||||
|
@ -368,7 +377,7 @@ A: Use \fB--symmetric\fR option. See the `CAVEATS' section for more details.
|
||||||
Q: How much `broken' is the original quasi-dyadic McEliece?
|
Q: How much `broken' is the original quasi-dyadic McEliece?
|
||||||
|
|
||||||
A: The private key of proposed dyadic variant by Misoczki and Barreto can be
|
A: The private key of proposed dyadic variant by Misoczki and Barreto can be
|
||||||
derived from the public key with standard computer equipment.
|
derived from the public key with standard computer equipment pretty quickly.
|
||||||
|
|
||||||
.SH EXAMPLE
|
.SH EXAMPLE
|
||||||
Following commands roughly demonstrate command line usage of \fBccr\fR:
|
Following commands roughly demonstrate command line usage of \fBccr\fR:
|
||||||
|
@ -422,5 +431,5 @@ it with caution.
|
||||||
|
|
||||||
.SH AUTHORS
|
.SH AUTHORS
|
||||||
|
|
||||||
Codecrypt was written by Mirek Kratochvil in 2013-2015.
|
Codecrypt was written by Mirek Kratochvil in 2013-2016.
|
||||||
|
|
||||||
|
|
|
@ -300,7 +300,7 @@ int main (int argc, char**argv)
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* something will be happening, therefore init everything
|
* initialization
|
||||||
*/
|
*/
|
||||||
|
|
||||||
keyring KR;
|
keyring KR;
|
||||||
|
|
Loading…
Reference in a new issue