mirror of
https://github.com/HACKERALERT/Picocrypt.git
synced 2024-11-09 20:40:53 +00:00
Update links
This commit is contained in:
parent
8f403dbc48
commit
e4c032b5b2
1 changed files with 1 additions and 1 deletions
|
@ -10,7 +10,7 @@ Picocrypt uses the following cryptographic primitives:
|
||||||
- Normal mode: 4 passes, 1 GiB memory, 4 threads
|
- Normal mode: 4 passes, 1 GiB memory, 4 threads
|
||||||
- Paranoid mode: 8 passes, 1 GiB memory, 8 threads
|
- Paranoid mode: 8 passes, 1 GiB memory, 8 threads
|
||||||
|
|
||||||
All primitives used are from the well-known [golang.org/x/crypto](https://golang.org/x/crypto) module.
|
All primitives used are from the well-known [golang.org/x/crypto](https://pkg.go.dev/golang.org/x/crypto) module.
|
||||||
|
|
||||||
# Counter Overflow
|
# Counter Overflow
|
||||||
Since XChaCha20 has a max message size of 256 GiB, Picocrypt will use the HKDF-SHA3 mentioned above to generate a new nonce for XChaCha20 and a new IV for Serpent if the total encrypted data is more than 60 GiB. While this threshold can be increased up to 256 GiB, Picocrypt uses 60 GiB to prevent any edge cases with blocks or the counter used by Serpent.
|
Since XChaCha20 has a max message size of 256 GiB, Picocrypt will use the HKDF-SHA3 mentioned above to generate a new nonce for XChaCha20 and a new IV for Serpent if the total encrypted data is more than 60 GiB. While this threshold can be increased up to 256 GiB, Picocrypt uses 60 GiB to prevent any edge cases with blocks or the counter used by Serpent.
|
||||||
|
|
Loading…
Reference in a new issue