mirror of
https://github.com/HACKERALERT/Picocrypt.git
synced 2024-11-09 20:40:53 +00:00
Details
This commit is contained in:
parent
3f07c72fd8
commit
b11c06b5d4
1 changed files with 3 additions and 3 deletions
|
@ -4,8 +4,8 @@ If you're wondering about how Picocrypt handles cryptography, you've come to the
|
|||
# Core Cryptography
|
||||
Picocrypt uses the following cryptographic primitives:
|
||||
- XChaCha20 (cascaded with Serpent for paranoid mode)
|
||||
- HMAC-SHA3 for normal mode, keyed-BLAKE2b for fast mode (512 bits)
|
||||
- HKDF-SHA3 for deriving a subkey used with the MAC above
|
||||
- HMAC-SHA3 for normal mode, keyed-BLAKE2b for fast mode (256-bit key, 512-bit digest)
|
||||
- HKDF-SHA3-256 for deriving a subkey used with the MAC above
|
||||
- Argon2id (8 passes, 1 GiB memory, 8 threads) for normal mode, (4 passes, 128 MiB memory, 4 threads) for fast mode
|
||||
|
||||
All algorithms used are from the well-known golang.org/x/crypto module.
|
||||
All primitives used are from the well-known golang.org/x/crypto module.
|
||||
|
|
Loading…
Reference in a new issue